Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported w...
详细信息
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported worldwide ***,there is a pressing need to employ diverse landmine detection techniques for their *** effective approach for landmine detection is UAV(Unmanned Aerial Vehicle)based AirborneMagnetometry,which identifies magnetic anomalies in the local terrestrial magnetic *** can generate a contour plot or heat map that visually represents the magnetic field *** the effectiveness of this approach,landmine removal remains a challenging and resource-intensive task,fraughtwith *** computing,on the other hand,can play a crucial role in critical drone monitoring applications like landmine *** processing data locally on a nearby edge server,edge computing can reduce communication latency and bandwidth requirements,allowing real-time analysis of magnetic field *** enables faster decision-making and more efficient landmine detection,potentially saving lives and minimizing the risks involved in the ***,edge computing can provide enhanced security and privacy by keeping sensitive data close to the source,reducing the chances of data exposure during *** paper introduces the MAGnetometry Imaging based Classification System(MAGICS),a fully automated UAV-based system designed for landmine and buried object detection and *** have developed an efficient deep learning-based strategy for automatic image classification using magnetometry dataset *** simulating the proposal in various network scenarios,we have successfully detected landmine signatures present in themagnetometry *** trained models exhibit significant performance improvements,achieving a maximum mean average precision value of 97.8%.
This research article introduces a novel approach to text-independent speaker recognition by integrating Mel-Frequency Cepstral Coefficients (MFCC) and Bidirectional Long Short-Term Memory (Bi-LSTM) networks, with noi...
详细信息
Mobile apps have become widely adopted in our daily lives. To facilitate app discovery, most app markets provide recommendations for users, which may significantly impact how apps are accessed. However, little has bee...
详细信息
Mobile apps have become widely adopted in our daily lives. To facilitate app discovery, most app markets provide recommendations for users, which may significantly impact how apps are accessed. However, little has been known about the underlying relationships and how they reflect(or affect) user behaviors. To fill this gap, we characterize the app recommendation relationships in the i OS app store from the perspective of the complex network. We collect a dataset containing over 1.3 million apps and 50 million app recommendations. This dataset enables us to construct a complex network that captures app recommendation relationships. Through this, we explore the recommendation relationships between mobile apps and how these relationships reflect or affect user behavior patterns. The insights gained from our research can be valuable for understanding typical user behaviors and identifying potential policy-violating apps.
Damage to electrical equipment in an earthquake can lead to power outage of power *** fragility analysis is a common method to assess the seismic reliability of electrical *** further guarantee the efficiency of analy...
详细信息
Damage to electrical equipment in an earthquake can lead to power outage of power *** fragility analysis is a common method to assess the seismic reliability of electrical *** further guarantee the efficiency of analysis,multi-source uncertainties including the structure itself and seismic excitation need to be considered.A method for seismic fragility analysis that reflects structural and seismic parameter uncertainty was developed in this *** proposed method used a random sampling method based on Latin hypercube sampling(LHS)to account for the structure parameter uncertainty and the group structure characteristics of electrical ***,logistic Lasso regression(LLR)was used to find the seismic fragility surface based on double ground motion intensity measures(IM).The seismic fragility based on the finite element model of an±1000 kV main transformer(UHVMT)was analyzed using the proposed *** results show that the seismic fragility function obtained by this method can be used to construct the relationship between the uncertainty parameters and the failure *** seismic fragility surface did not only provide the probabilities of seismic damage states under different IMs,but also had better stability than the fragility ***,the sensitivity analysis of the structural parameters revealed that the elastic module of the bushing and the height of the high-voltage bushing may have a greater influence.
The Internet Of Things (IoT) is a network of heterogeneous nodes that exchange data and critical information amongst themselves with minimum human intervention. The utility of this technology is large, thus it is used...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature of Twitter makes cyberspace prominent (usually accessed via the dark web). The work used the datasets and considered the Scrape Twitter Data (Tweets) in Python using the SN-Scrape module and Twitter 4j API in JAVA to extract social data based on hashtags, which is used to select and access tweets for dataset design from a profile on the Twitter platform based on locations, keywords, and hashtags. The experiments contain two datasets. The first dataset has over 1700 tweets with a focus on location as a keypoint (hacking-for-fun data, cyber-violence data, and vulnerability injector data), whereas the second dataset only comprises 370 tweets with a focus on reposting of tweet status as a keypoint. The method used is focused on a new system model for analysing Twitter data and detecting terrorist attacks. The weights of susceptible keywords are found using a ternary search by the Aho-Corasick algorithm (ACA) for conducting signature and pattern matching. The result represents the ACA used to perform signature matching for assigning weights to extracted words of tweet. ML is used to evaluate Twitter data for classifying patterns and determining the behaviour to identify if a person is a terrorist. SVM (Support Vector Machine) proved to be a more accurate classifier for predicting terrorist attacks compared to other classifiers (KNN- K-Nearest Neighbour and NB-Naïve Bayes). The 1st dataset shows the KNN-Acc. -98.38% and SVM Accuracy as 98.85%, whereas the 2nd dataset shows the KNN-Acc. -91.68% and SVM Accuracy as 93.97%. The proposed work concludes that the generated weights are classified (cyber-violence, vulnerability injector, and hacking-for-fun) for further feature classification. Machine learning (ML) [KNN and SVM] is used to predict the occurrence and
A lot of research shows that there could be several reasons why the duality of agricultural products has been reduced. Plant diseases make up one of the most important components of this quality. Therefore, the reduct...
详细信息
Fuel-driven dissipative self-assembly,which is a well-established concept in recent years,refers to out-of-equilibrium molecular self-assembly initiated and supported by the addition of active molecules (chemical fuel...
详细信息
Fuel-driven dissipative self-assembly,which is a well-established concept in recent years,refers to out-of-equilibrium molecular self-assembly initiated and supported by the addition of active molecules (chemical fuel).It widely exists in nature since many temporary,active micro- or nanostructures in living bodies are generated by the dissipative self-assembly of ***,the study on dissipative self-assembly provides a good opportunity to have an insight into the microscopic mechanism of living *** the meantime,dissipative assembly is thought to be a potential pathway to achieve dynamic,temporary supramolecular ***,a number of temporary materials have been developed with the aid of strategies for realizing dissipative *** of their properties,including solubility,stiffness,turbidity,color,or self-healing ability,change upon the addition of chemical fuel but spontaneously restore with chemical fuel *** dynamic of these materials brings them various unprecedented *** this review,the principles of fabricating a fuel-driven temporary material are first ***,recent examples of fuel-driven temporary materials are emphatically summarized,including gels,self-erased inks,nanoreactors,self-healing materials,nanochannels,and ***,the challenges of developing fuel-driven temporary materials and some perspectives on the function and application of such kind of materials are discussed.
Task pricing is an important step for crowd-sourcing platforms to solve profit-driven task allocation and maximize profits. Most of the existing researches only carry out algorithm design on the premise of fully deter...
详细信息
Recently, the combination of a service function chain (SFC) with network function virtualization (NFV) and software-defined networking (SDN) has provided customers with flexible and efficient services. The emergence o...
详细信息
暂无评论