The article is devoted to the problem of automatic monitoring of the driver's physical conditions while driving. The purpose of this article is to describe an approach to recognizing driver fatigue using a video c...
ISBN:
(数字)9781728199573
ISBN:
(纸本)9781728199580
The article is devoted to the problem of automatic monitoring of the driver's physical conditions while driving. The purpose of this article is to describe an approach to recognizing driver fatigue using a video camera mounted on the front panel of a vehicle, which allows recording facial expressions of a driver's face for further analysis by managers of logistic company and using of the received information by Internet of Things objects in the freight management system. The system will allow managers of the logistics company to gain access to the movements of each driver and to statistics of dangerous conditions recorded during the trip, which, in turn, will allow to control the routes, compliance with traffic rules, as well as the work and rest of the drivers of the logistics companies.
The smart grid faces with increasingly sophisticated cyber-physical threats, against which machine learning (ML)-based intrusion detection systems have become a powerful and promising solution to smart grid security m...
详细信息
ISBN:
(数字)9781728169262
ISBN:
(纸本)9781728169279
The smart grid faces with increasingly sophisticated cyber-physical threats, against which machine learning (ML)-based intrusion detection systems have become a powerful and promising solution to smart grid security monitoring. However, many ML algorithms presume that training and testing data follow the same or similar data distributions, which may not hold in the dynamic time-varying systems like the smart grid. As operating points may change dramatically over time, the resulting data distribution shifts could lead to degraded detection performance and delayed incidence responses. To address this challenge, this paper proposes a semi-supervised framework based on domain-adversarial training to transfer the knowledge of known attack incidences to detect returning threats at different hours and load patterns. Using normal operation data of the ISO New England grids, the proposed framework leverages adversarial training to adapt learned models against new attacks launched at different times of the day. Effectiveness of the proposed detection framework is evaluated against the well-studied false data injection attacks synthesized on the IEEE 30-bus system, and the results demonstrated the superiority of the framework against persistent threats recurring in the highly dynamic smart grid.
Global software development (GSD) is basically a development which is done through low cost in given time frame by sitting in remote areas within cities, countries and around the globe. The global software development...
详细信息
In this paper, a simple and robust watermarking algorithm is presented by using the first, second, third and the fourth Least Significant Bits (LSBs). We embed two bits in two places out of four LSBs according to the ...
详细信息
ISBN:
(纸本)9781450372800
In this paper, a simple and robust watermarking algorithm is presented by using the first, second, third and the fourth Least Significant Bits (LSBs). We embed two bits in two places out of four LSBs according to the local variance value. Compared to the simple LSB algorithm where we use bits 7 and 8 to embed information, the proposed algorithm is more robust to white noise and JPEG compression. Experimental results show that the quality of the watermarked image is high in terms of Peak Signal-to-Noise (PSNR) and Structural Similarity Index (SSIM).
In this paper, a simple and robust watermarking algorithm is presented by using the first, second, third and the fourth Least Significant Bits (LSBs). We embed two bits in two places out of four LSBs according to the ...
详细信息
Recently, federated learning (FL) has emerged as a promising distributed machine learning (ML) technology, owing to the advancing computational and sensing capacities of end-user devices, as well as the increasing con...
详细信息
Entity resolution is a challenging and hot research area in the field of Information systems since last decade. Author Name Disambiguation (AND) in Bibliographic Databases (BD) like DBLP1, Citeseer2, and Scopus3 is a ...
详细信息
In the era of edge computing, real-time data preprocessing on the edge node has the potential to improve computational efficiency and data accuracy. However, a significant challenge is private data disclosure, particu...
详细信息
From home appliances to industrial enterprises, the Information and Communication Technology (ICT) industry is revolutionizing the world. We are witnessing the emergence of new technologies (e.g, Cloud computing, Fog ...
详细信息
Detecting suspicious objects contained within passenger baggage is one of the most difficult tasks, even for the security experts. To address this problem, many researchers have developed computer-aided screening meth...
Detecting suspicious objects contained within passenger baggage is one of the most difficult tasks, even for the security experts. To address this problem, many researchers have developed computer-aided screening methods employing deep learning models to detect the presence of contraband items using X-ray imagery. However, all of these models have limitations or bottlenecks when it comes to detecting prohibited objects that are heavily obscured, cluttered, overlapping, and well concealed within the baggage. To overcome these challenges, we present a novel instance segmentation framework that transforms the conventional semantic segmentation models to perform instance-aware segmentation, via incremental learning, to automatically detect suspicious baggage items. This framework leverages knowledge distillation, enabling the model to iteratively learn and retain multiple instances of threat items. By continuously adapting, the model improves its ability to distinguish between different instances, showcasing significant advancements in security and threat detection. To overcome the under-segmentation and over-segmentation problem of the incremental instance segmentation, we introduced the use of a lightweight regressor model that can accurately identify the overlapping instances of the suspicious objects which enables the optimal selection of the segmentation model to perform the required task. Moreover, the proposed framework has been rigorously tested on two publicly available datasets on which it achieved the mask mean average precision scores of 0.54 and 0.51, respectively, at the inference stage. Similarly, the proposed method outperformed the state-of-the-art methods by 5.88%, and 8.51% in terms of mask mean average precision scores across both datasets, respectively. In addition to this, the proposed framework provides an optimal trade-off between performance and efficiency as compared to its competitors.
暂无评论