Resource-constrained edge nodes are ubiquitous in industrial settings yet are challenged by limited computing resources. Leveraging computational advantage and perceptual awareness of Gabor filters, a hybrid classifie...
详细信息
Pest attacks pose a serious threat to the production of jute and other significant crops. Jute farmers often utilize their visual sense and hands-on expertise to distinguish between multiple diseases that seem to be i...
详细信息
ISBN:
(数字)9798331518097
ISBN:
(纸本)9798331518103
Pest attacks pose a serious threat to the production of jute and other significant crops. Jute farmers often utilize their visual sense and hands-on expertise to distinguish between multiple diseases that seem to be identical. The intelligent model we built for the identification of jute pests was based on a deep convolutional neural network (DCNN). This practical difficulty led to the development of this concept. The proposed DCNN model can automatically identify jute pest concerns with high speed and accuracy based on image recognition. In addition, images of the four most common jute bugs are included in an organized image graphics collection. Our model yields a DCNN accuracy is 96.72% for the four most significant jute pest kinds. Further proof of the model's effectiveness is provided by the accuracy, recall, F1-score, and confusion matrix metrics.
The deployment of LoRaWAN on the Internet of Things (IoT) has increased since its advent and LoRaWAN now predominates the IoT market over other Low Powered Wide Area Networks (LPWAN). However, since LoRaWAN uses Chirp...
The deployment of LoRaWAN on the Internet of Things (IoT) has increased since its advent and LoRaWAN now predominates the IoT market over other Low Powered Wide Area Networks (LPWAN). However, since LoRaWAN uses Chirp Spread Spectrum (CSS), it is susceptible to wideband jamming attacks. In this paper, we demonstrate with experiments and concrete numerical results that jamming US915 LoRaWAN frequency is possible by the usual data transmission and reception process of 900MHz Canopy, one of the legacy 900MHz network device. Intentional attack is possible in the same manner. The experiments emulate the real-world environment operated in medical and agriculture industries, in outdoor and indoor conditions, respectively. In addition, this paper introduces and utilizes the novel metric, Jamming Effect (JE), that indicates the network performance of wireless networks that spread the data on air.
Pneumonia is one of the most cynical problems to human beings all over the world and detecting the presence of pneumonia in an early stage is very necessary to avoid Premature Death. According to the World Health Orga...
详细信息
To address the issues of low accuracy, high number of parameters and computational cost in strip steel surface defect detection algorithms, a lightweight strip steel surface defect detection algorithm based on YOLOv8s...
详细信息
ISBN:
(数字)9798350355413
ISBN:
(纸本)9798350355420
To address the issues of low accuracy, high number of parameters and computational cost in strip steel surface defect detection algorithms, a lightweight strip steel surface defect detection algorithm based on YOLOv8s is proposed. Initially, the Cross-stage Focused Linear Attention (C2F-FLA) module is introduced to enhance the feature extraction capability of the backbone network. Subsequently, to improve the capture of multi-scale defect contours and reduce the model’s parameters and computational complexity, a Wavelet Convolution-Bidirectional Weighted Feature Pyramid Network (WT-BiFPN) is employed in the model’s Neck section for adaptive fusion of features at different resolutions. Finally, Haar Wavelet Downsampling (HWD) is utilized to retain more defect-related information, further reducing the parameters and computational complexity. The proposed method was validated on the NEU-DET dataset, and the results demonstrate that compared to YOLOv8s, this approach achieves a 4.1% increase in mAP, a 44.4% reduction in parameters, and a 32.8% decrease in computational complexity. The method ensures lightweight implementation while improving detection accuracy, offering more possibilities for defect detection on edge terminal devices.
Background: Bug dependencies refer to the link relationships between bugs and related issues, which are commonly observed in software evolution. It has been found that bugs with bug dependencies often take longer time...
Background: Bug dependencies refer to the link relationships between bugs and related issues, which are commonly observed in software evolution. It has been found that bugs with bug dependencies often take longer time to be resolved than other bugs without any dependencies. Despite the potential impact of bug dependencies on bug-fixing time, previous studies use traditional metrics without considering bug dependencies to build bug-fixing time prediction models. As a result, there is currently little empirical evidence to support the use of bug dependencies in improving prediction accuracy. Aims: We aim to conduct a comprehensive empirical study to investigate the value of considering bug dependencies for bug-fixing time prediction. Method: We define a set of bug dependency metrics based on bug dependencies. We first investigate the correlation between bug dependency metrics and bug-fixing time to investigate whether bugs with more complex dependencies are more time-consuming to be fixed. Next, we employ principal component analysis to study whether bug dependency metrics capture additional dimensions of a bug compared to traditional metrics. Finally, we build multivariate prediction models to explore whether considering bug dependencies can improve the effectiveness of bug-fixing time prediction. Results: The experimental results suggest that: (1) bugs with more complex dependencies require more time to be fixed; (2) bug dependency metrics are complementary to traditional metrics; (3) considering bug dependencies can improve the effectiveness of bug-fixing time prediction. Conclusions: These findings highlight the importance of considering bug dependencies in bug-fixing time prediction, and provide valuable insights into the potential impact of bug dependencies on software development processes.
Federated Learning (FL) is proposed as a privacy-preserving distributed learning methodology that can better protect the privacy and reduce communication costs. To stimulate sufficient User Equipments (UEs) to partici...
Federated Learning (FL) is proposed as a privacy-preserving distributed learning methodology that can better protect the privacy and reduce communication costs. To stimulate sufficient User Equipments (UEs) to participate in FL, proper incentives need to be designed for FL. Existing incentive mechanisms do not jointly consider UE selection and local learning accuracy optimization to reduce the training expenditure. This paper designs a reverse auction-based incentive mechanism for FL to minimize the training expenditure of Base Station (BS). To this end, we first propose a Greedy Winner Determination (GWD) algorithm to select UEs with the minimum bidding prices. Then, we incorporate the Particle Swarm Optimization (PSO)-based local learning accuracy optimization into UE selection to further reduce the training expenditure of BS. In addition, we design a Vickrey Clarke Groves (VCG)-based payment rule to determine the payment to each participating UE. The simulation experiments show that our proposed PSO with Winner Determination (PSOWD) algorithm is superior to other existing methods in different scenarios.
The integration of the Internet of Drone Things (IoDT) with spatial crowdsourcing, enhanced by 6G technology, has revolutionized environmental monitoring, particularly in managing Australian bushfires. This approach l...
详细信息
ISBN:
(数字)9798331517786
ISBN:
(纸本)9798331517793
The integration of the Internet of Drone Things (IoDT) with spatial crowdsourcing, enhanced by 6G technology, has revolutionized environmental monitoring, particularly in managing Australian bushfires. This approach leverages drones’ mobility, multidimensional motion, and ease of deployment to gather real-time data from hazardous or inaccessible areas. However, the unsecured wireless communication channels and limited computational resources of drones in typical IoDT scenarios make them susceptible to cyber-attacks, including spoofing, GPS manipulation, impersonation, man-in-the-middle, and hijacking. To counter these threats, we propose a robust security protocol that utilizes blockchain technology augmented by Hyperelliptic Curve Cryptography (HECC). By employing blockchain as a Certificate Authority (CA) and treating transactions as certifications, our framework, DronCert, eliminates the need for traditional CAs or Trusted Third Parties (TTP). This decentralized approach, combined with the high-speed, low-latency capabilities of 6G, significantly enhances data transmission security within the IoDT network. A comprehensive security analysis demonstrates DronCert’s resilience against various attacks, such as Denial-of-Service (DoS), man-in-the-middle, replay, and unauthorized device representation.
After designing a simulation and running it locally on a small network instance, the implementation can be scaled-up via parallel and distributed computing (e.g., a cluster) to cope with massive networks. However, imp...
After designing a simulation and running it locally on a small network instance, the implementation can be scaled-up via parallel and distributed computing (e.g., a cluster) to cope with massive networks. However, implementation changes can create errors (e.g., parallelism errors), which are difficult to identify since the aggregate behavior of an incorrect implementation of a stochastic network simulation can fall within the distributions expected from correct implementations. In this paper, we propose the first approach that applies machine learning to traces of network simulations to detect errors. Our technique transforms simulation traces into images by reordering the network's adjacency matrix, and then training supervised machine learning models. Our evaluation on three simulation models shows that we can easily detect previously encountered types of errors and even confidently detect new errors. This work opens up numerous opportunities by examining other simulation models, representations (i.e., matrix reordering algorithms), or machine learning techniques.
Skin cancer is a major concern to public health, accounting for one-third of the reported cancers. If not detected early, the cancer has the potential for severe consequences. Recognizing the critical need for effecti...
详细信息
暂无评论