Dear editor,Visual object tracking, which has attracted increasing attention in the field of general visual understanding, aims to track each temporally changing object in a video sequence, with the target specified o...
Dear editor,Visual object tracking, which has attracted increasing attention in the field of general visual understanding, aims to track each temporally changing object in a video sequence, with the target specified only in the first *** most tracking algorithms have facilitated significant advances in RGB video sequences, object tracking using only RGB information is unreliable under extreme lighting conditions(e.g., dark night, rain, and foggy).
The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other. In this article, a blo...
详细信息
The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other. In this article, a blockchain-enabled manufacturing collaboration framework is proposed, with a focus on the production capacity matching problem for blockchainbased peer-to-peer(P2P) collaboration. First, a digital model of production capacity description is built for trustworthy and transparent sharing over the blockchain. Second, an optimization problem is formulated for P2P production capacity matching with objectives to maximize both social welfare and individual benefits of all participants. Third, a feasible solution based on an iterative double auction mechanism is designed to determine the optimal price and quantity for production capacity matching with a lack of personal information. It facilitates automation of the matching process while protecting users' privacy via blockchainbased smart contracts. Finally, simulation results from the Hyperledger Fabric-based prototype show that the proposed approach increases social welfare by 1.4% compared to the Bayesian game-based approach, makes all participants profitable,and achieves 90% fairness of enterprises.
Image copy-move forgery detection (CMFD) has become a challenging problem due to increasingly powerful editing software that makes forged images increasingly realistic. Existing algorithms that directly connect multip...
详细信息
Miniaturization and flexibility are becoming the trend in the development of electronic products. These key features are driving new methods in the manufacturing of such products. Printed electronics technology is a n...
详细信息
Miniaturization and flexibility are becoming the trend in the development of electronic products. These key features are driving new methods in the manufacturing of such products. Printed electronics technology is a novel additive manufacturing technique that uses active inks to print onto a diverse set of substrates, realizing large-area, low-cost, flexible and green manufacturing of electronic products. These advantageous properties make it extremely compatible with flexible electronics fabrication and extend as far as offering revolutionary methods in the production of flexible electronic devices. In this paper, the details of a printing process system are introduced, including the materials that can be employed as inks, common substrates, and the most recently reported printing strategies. An assessment of future setbacks and developments of printed flexible electronics is also presented.
The rapid growth in the smart era of Internet of Things (IoT) relies on the various applications that lead to the design wide range of routing protocols utilizing Machine learning techniques. Third party interference ...
详细信息
The rapid growth in the smart era of Internet of Things (IoT) relies on the various applications that lead to the design wide range of routing protocols utilizing Machine learning techniques. Third party interference in the open network to perform malicious activities by using location information of the node is high. Many researchers have designed a wide range of protocols to improve security and energy efficiency but the dynamic nature of the Internet of Things suppressed the performance of those algorithms. This may lead to data drop, node death, delay, less network lifetime, and increased third party malicious activities. In this paper, a novel routing mechanism is developed to preserve source location privacy and prevent adversaries from doing backtracking attacks and traffic analysis for energy preservation. The proposed model consists of two key functions Node/Network Condition based Dynamic Phantom Node selection (NCDPNS) and Ant colony optimization Algorithm Aided Multi-Path based Routing (ACOMPR). Here, NCDPNS selects the phantom node based on the node/network conditions like node availability, link availability, node energy level, distance from other nodes in the network, and number of neighboring hops to preserve the location privacy. ACOMPR selects the path based on the ant colony optimization algorithm to choose more than one path for data transmission with very less common resources shared among multiple paths between the source and destination for energy efficient data transmission. The proposed mechanism is achieving the source location privacy at the first stage and energy efficient routing at the second stage. The proposed mechanism is implemented using a Network Simulator-2 (NS2) simulator with predefined network parameters. The results depict that it achieves high throughput, less delay, increased network lifetime, and low energy dissipation for data transmission by preserving the location of the node. The dynamic nature of the IoT is considered
作者:
Baowei WangWen YouSchool of Computer
Nanjing University of Information Science and TechnologyCollaborative Innovation Center of Jiangsu Atmospheric Environment and Equipment TechnologyDigital Forensics Engineering Research Center of Digital Forensics Ministry of EducationNanjing210044China School of Software
Nanjing University of Information Science and TechnologyNanjing210044China
As computer graphics technology continues to advance,Collision Detection(CD)has emerged as a critical element in fields such as virtual reality,computer graphics,and interactive *** is indispensable for ensuring the f...
详细信息
As computer graphics technology continues to advance,Collision Detection(CD)has emerged as a critical element in fields such as virtual reality,computer graphics,and interactive *** is indispensable for ensuring the fidelity of physical interactions and the realism of virtual environments,particularly within complex scenarios like virtual assembly,where both high precision and real-time responsiveness are *** ongoing developments,current CD techniques often fall short in meeting these stringent requirements,resulting in inefficiencies and inaccuracies that impede the overall performance of virtual assembly *** address these limitations,this study introduces a novel algorithm that leverages the capabilities of a Backpropagation Neural Network(BPNN)to optimize the structural composition of the Hybrid Bounding Volume Tree(HBVT).Through this optimization,the research proposes a refined Hybrid Hierarchical Bounding Box(HHBB)framework,which is specifically designed to enhance the computational efficiency and precision of CD *** HHBB framework strategically reduces the complexity of collision detection computations,thereby enabling more rapid and accurate responses to collision *** experimental validation within virtual assembly environments reveals that the proposed algorithm markedly improves the performance of CD,particularly in handling complex *** optimized HBVT architecture not only accelerates the speed of collision detection but also significantly diminishes error rates,presenting a robust and scalable solution for real-time applications in intricate virtual *** findings suggest that the proposed approach offers a substantial advancement in CD technology,with broad implications for its application in virtual reality,computer graphics,and related fields.
With the rapid development of the Internet of Things(Io T),the amount of data from intelligent devices is propagating at unprecedented scales. Meanwhile, machine learning(ML),which relies heavily on such data, is revo...
详细信息
With the rapid development of the Internet of Things(Io T),the amount of data from intelligent devices is propagating at unprecedented scales. Meanwhile, machine learning(ML),which relies heavily on such data, is revolutionizing many aspects of our lives [1]. However, conventional centralized ML offers little scalability for efficiently processing this huge amount of data.
1 Introduction As an emerging machine learning paradigm,unsupervised domain adaptation(UDA)aims to train an effective model for unlabeled target domain by leveraging knowledge from related but distribution-inconsisten...
详细信息
1 Introduction As an emerging machine learning paradigm,unsupervised domain adaptation(UDA)aims to train an effective model for unlabeled target domain by leveraging knowledge from related but distribution-inconsistent source *** of the existing UDA methods[2]align class-wise distributions resorting to target domain pseudo-labels,for which hard labels may be misguided by misclassifications while soft labels are confusing with trivial noises so that both of them tend to cause frustrating *** overcome such drawbacks,as shown in Fig.1,we propose to achieve UDA by performing self-adaptive label filtering learning(SALFL)from both the statistical and the geometrical perspectives,which filters out the misclassified pseudo-labels to reduce negative ***,the proposed SALFL firstly predicts labels for the target domain instances by graph-based random walking and then filters out those noise labels by self-adaptive learning strategy.
In recent years,various adversarial defense methods have been proposed to improve the robustness of deep neural *** training is one of the most potent methods to defend against adversarial ***,the difference in the fe...
详细信息
In recent years,various adversarial defense methods have been proposed to improve the robustness of deep neural *** training is one of the most potent methods to defend against adversarial ***,the difference in the feature space between natural and adversarial examples hinders the accuracy and robustness of the model in adversarial *** paper proposes a learnable distribution adversarial training method,aiming to construct the same distribution for training data utilizing the Gaussian mixture *** distribution centroid is built to classify samples and constrain the distribution of the sample *** natural and adversarial examples are pushed to the same distribution centroid to improve the accuracy and robustness of the *** proposed method generates adversarial examples to close the distribution gap between the natural and adversarial examples through an attack algorithm explicitly designed for adversarial *** algorithm gradually increases the accuracy and robustness of the model by scaling ***,the proposed method outputs the predicted labels and the distance between the sample and the distribution *** distribution characteristics of the samples can be utilized to detect adversarial cases that can potentially evade the model *** effectiveness of the proposed method is demonstrated through comprehensive experiments.
Real-time perception of rock conditions based on continuously collected data to meet the requirements of continuous Tunnel Boring Machine(TBM)construction presents a critical challenge that warrants increased *** achi...
详细信息
Real-time perception of rock conditions based on continuously collected data to meet the requirements of continuous Tunnel Boring Machine(TBM)construction presents a critical challenge that warrants increased *** achieve this goal,this paper establishes real-time prediction models for fractured and weak rock mass by comparing 6 different algorithms using real-time data collected by the *** models are optimized in terms of selecting metric,selecting input features,and processing imbalanced *** results demonstrate the following points.(1)The Youden's index and area under the ROC curve(AUC)are the most appropriate performance metrics,and the XGBoost Random Forest(XGBRF)algorithm exhibits superior prediction and generalization performance.(2)The duration of the TBM loading phase is short,usually within a few minutes after the disc cutter contacts the tunnel face.A model based on the features during the loading phase has a miss rate of 21.8%,indicating that it can meet the early warning needs of TBM construction *** the TBM continues to operate,the inclusion of features calculated from subsequent data collection can continuously correct the results of the real-time prediction model,ultimately reducing the miss rate to 16.1%.(3)Resampling the imbalanced data set can effectively improve the prediction by the model,while the XGBRF algorithm has certain advantages in dealing with the imbalanced data *** the model gives an alarm,the TBM operator and on-site engineer can be reminded and take some necessary measures for avoiding potential tunnel *** real-time predication model can be a useful tool to increase the safety of TBM excavation.
暂无评论