Utilizing interpolation techniques (IT) within reversible data hiding (RDH) algorithms presents the advantage of a substantial embedding capacity. Nevertheless, prevalent algorithms often straightforwardly embed confi...
详细信息
With the development of communication systems, modulation methods are becoming more and more diverse. Among them, quadrature spatial modulation(QSM) is considered as one method with less capacity and high efficiency. ...
详细信息
With the development of communication systems, modulation methods are becoming more and more diverse. Among them, quadrature spatial modulation(QSM) is considered as one method with less capacity and high efficiency. In QSM, the traditional signal detection methods sometimes are unable to meet the actual requirement of low complexity of the system. Therefore, this paper proposes a signal detection scheme for QSM systems using deep learning to solve the complexity problem. Results from the simulations show that the bit error rate performance of the proposed deep learning-based detector is better than that of the zero-forcing(ZF) and minimum mean square error(MMSE) detectors, and similar to the maximum likelihood(ML) detector. Moreover, the proposed method requires less processing time than ZF, MMSE,and ML.
The Wireless Sensor Network(WSN)is a network that is constructed in regions that are inaccessible to human *** widespread deployment of wireless micro sensors will make it possible to conduct accurate environmental mo...
详细信息
The Wireless Sensor Network(WSN)is a network that is constructed in regions that are inaccessible to human *** widespread deployment of wireless micro sensors will make it possible to conduct accurate environmental monitoring for a use in both civil and military *** make use of these data to monitor and keep track of the physical data of the surrounding environment in order to ensure the sustainability of the *** data have to be picked up by the sensor,and then sent to the sink node where they may be *** nodes of the WSNs are powered by batteries,therefore they eventually run out of *** energy restriction has an effect on the network life span and environmental *** objective of this study is to further improve the Engroove Leach(EL)protocol’s energy efficiency so that the network can operate for a very long time while consuming the least amount of *** lifespan of WSNs is being extended often using clustering and routing *** Meta Inspired Hawks Fragment Optimization(MIHFO)system,which is based on passive clustering,is used in this study to do *** cluster head is chosen based on the nodes’residual energy,distance to neighbors,distance to base station,node degree,and node *** on distance,residual energy,and node degree,an algorithm known as Heuristic Wing Antfly Optimization(HWAFO)selects the optimum path between the cluster head and Base Station(BS).They examine the number of nodes that are active,their energy consumption,and the number of data packets that the BS *** overall experimentation is carried out under the MATLAB *** the analysis,it has been discovered that the suggested approach yields noticeably superior outcomes in terms of throughput,packet delivery and drop ratio,and average energy consumption.
The earthquake early warning (EEW) system provides advance notice of potentially damaging ground shaking. In EEW, early estimation of magnitude is crucial for timely rescue operations. A set of thirty-four features is...
详细信息
The earthquake early warning (EEW) system provides advance notice of potentially damaging ground shaking. In EEW, early estimation of magnitude is crucial for timely rescue operations. A set of thirty-four features is extracted using the primary wave earthquake precursor signal and site-specific information. In Japan's earthquake magnitude dataset, there is a chance of a high imbalance concerning the earthquakes above strong impact. This imbalance causes a high prediction error while training advanced machine learning or deep learning models. In this work, Conditional Tabular Generative Adversarial Networks (CTGAN), a deep machine learning tool, is utilized to learn the characteristics of the first arrival of earthquake P-waves and generate a synthetic dataset based on this information. The result obtained using actual and mixed (synthetic and actual) datasets will be used for training the stacked ensemble magnitude prediction model, MagPred, designed specifically for this study. There are 13295, 3989, and 1710 records designated for training, testing, and validation. The mean absolute error of the test dataset for single station magnitude detection using early three, four, and five seconds of P wave are 0.41, 0.40, and 0.38 MJMA. The study demonstrates that the Generative Adversarial Networks (GANs) can provide a good result for single-station magnitude prediction. The study can be effective where less seismic data is available. The study shows that the machine learning method yields better magnitude detection results compared with the several regression models. The multi-station magnitude prediction study has been conducted on prominent Osaka, Off Fukushima, and Kumamoto earthquakes. Furthermore, to validate the performance of the model, an inter-region study has been performed on the earthquakes of the India or Nepal region. The study demonstrates that GANs can discover effective magnitude estimation compared with non-GAN-based methods. This has a high potential
Recent achievements in deep learning(DL)have demonstrated its potential in predicting traffic *** predictions are beneficial for understanding the situation and making traffic control ***,most state-of-the-art DL mode...
详细信息
Recent achievements in deep learning(DL)have demonstrated its potential in predicting traffic *** predictions are beneficial for understanding the situation and making traffic control ***,most state-of-the-art DL models are consi-dered“black boxes”with little to no transparency of the underlying mechanisms for end *** previous studies attempted to“open the black box”and increase the interpretability of generated ***,handling complex models on large-scale spatiotemporal data and discovering salient spatial and temporal patterns that significantly influence traffic flow remain *** overcome these challenges,we present TrafPS,a visual analytics approach for interpreting traffic prediction outcomes to support decision-making in traffic management and urban *** measurements region SHAP and trajectory SHAP are proposed to quantify the impact of flow patterns on urban traffic at different *** on the task requirements from domain experts,we employed an interactive visual interface for the multi-aspect exploration and analysis of significant flow *** real-world case studies demonstrate the effectiveness of TrafPS in identifying key routes and providing decision-making support for urban planning.
Wide field of view and light weight optics are critical for advanced eyewear,with applications in augmented/virtual reality and night *** refractive lenses are often stacked to correct aberrations at a wide field of v...
详细信息
Wide field of view and light weight optics are critical for advanced eyewear,with applications in augmented/virtual reality and night *** refractive lenses are often stacked to correct aberrations at a wide field of view,leading to limited performance and increased size and *** particular,simultaneously achieving a wide field of view and large aperture for light collection is desirable but challenging to realize in a compact ***,we demonstrate a wide field of view(greater than 60°)meta-optic doublet eyepiece with an entrance aperture of 2.1 *** the design wavelength of 633 nm,the meta-optic doublet achieves comparable performance to a refractive lens-based eyepiece *** meta-doublet eyepiece illustrates the potential for meta-optics to play an important role in the development of high-quality monochrome near-eye displays and night vision systems.
Breast cancer poses a significant global threat, highlighting the urgent need for early detection to reduce mortality rates. Researchers are working to minimize the occurrence of false positives and false negatives, t...
详细信息
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, f...
详细信息
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, fingerprintsand faces have been widely used for person identification, which has the risk of information leakage as a resultof reproducing fingers or faces by taking a snapshot. Recently, people have focused on creating an identifiablepattern, which will not be reproducible falsely by capturing psychological and behavioral information of a personusing vision and sensor-based techniques. In existing studies, most of the researchers used very complex patternsin this direction, which need special training and attention to remember the patterns and failed to capturethe psychological and behavioral information of a person properly. To overcome these problems, this researchdevised a novel dynamic hand gesture-based person identification system using a Leap Motion sensor. Thisstudy developed two hand gesture-based pattern datasets for performing the experiments, which contained morethan 500 samples, collected from 25 subjects. Various static and dynamic features were extracted from the handgeometry. Randomforest was used to measure feature importance using the Gini Index. Finally, the support vectormachinewas implemented for person identification and evaluate its performance using identification accuracy. Theexperimental results showed that the proposed system produced an identification accuracy of 99.8% for arbitraryhand gesture-based patterns and 99.6% for the same dynamic hand gesture-based patterns. This result indicatedthat the proposed system can be used for person identification in the field of security.
Co-saliency detection within a single image is a common vision problem that has not yet been well addressed. Existing methods often used a bottom-up strategy to infer co-saliency in an image in which salient regions a...
详细信息
Co-saliency detection within a single image is a common vision problem that has not yet been well addressed. Existing methods often used a bottom-up strategy to infer co-saliency in an image in which salient regions are firstly detected using visual primitives such as color and shape and then grouped and merged into a co-saliency map. However, co-saliency is intrinsically perceived complexly with bottom-up and top-down strategies combined in human vision. To address this problem, this study proposes a novel end-toend trainable network comprising a backbone net and two branch nets. The backbone net uses ground-truth masks as top-down guidance for saliency prediction, whereas the two branch nets construct triplet proposals for regional feature mapping and clustering, which drives the network to be bottom-up sensitive to co-salient regions. We construct a new dataset of 2019 natural images with co-saliency in each image to evaluate the proposed method. Experimental results show that the proposed method achieves state-of-the-art accuracy with a running speed of 28 fps.
In the past decade, studies on illegal fishing have neglected to consider illegal underwater fishing. Traditionally, supervisor-based methods have been used to manually interpret underwater behavior;however, existing ...
详细信息
暂无评论