In foggy traffic scenarios, existing object detection algorithms face challenges such as low detection accuracy, poor robustness, occlusion, missed detections, and false detections. To address this issue, a multi-scal...
详细信息
In foggy traffic scenarios, existing object detection algorithms face challenges such as low detection accuracy, poor robustness, occlusion, missed detections, and false detections. To address this issue, a multi-scale object detection algorithm based on an improved YOLOv8 has been proposed. Firstly, a lightweight attention mechanism, Triplet Attention, is introduced to enhance the algorithm’s ability to extract multi-dimensional and multi-scale features, thereby improving the receptive capability of the feature maps. Secondly, the Diverse Branch Block (DBB) is integrated into the CSP Bottleneck with two Convolutions (C2F) module to strengthen the fusion of semantic information across different layers. Thirdly, a new decoupled detection head is proposed by redesigning the original network head based on the Diverse Branch Block module to improve detection accuracy and reduce missed and false detections. Finally, the Minimum Point Distance based Intersection-over-Union (MPDIoU) is used to replace the original YOLOv8 Complete Intersection-over-Union (CIoU) to accelerate the network’s training convergence. Comparative experiments and dehazing pre-processing tests were conducted on the RTTS and VOC-Fog datasets. Compared to the baseline YOLOv8 model, the improved algorithm achieved mean Average Precision (mAP) improvements of 4.6% and 3.8%, respectively. After defogging pre-processing, the mAP increased by 5.3% and 4.4%, respectively. The experimental results demonstrate that the improved algorithm exhibits high practicality and effectiveness in foggy traffic scenarios.
Irrigation plays a significant role in various agricultural cropping methods deployed in semiarid and arid regions where valuable water applications and managing are considered crucial *** factors such as weather,soil...
详细信息
Irrigation plays a significant role in various agricultural cropping methods deployed in semiarid and arid regions where valuable water applications and managing are considered crucial *** factors such as weather,soil,water,and crop data need to be considered for irrigation maintenance in an efficient besides uniform manner from multifaceted and different information-based systems.A Multi-Agent System(MAS)has been proposed recently based on diverse agent subsystems with definite objectives for attaining global MAS objective and is deployed on Cloud Computing paradigm capable of gathering information from Wireless Sensor Networks(WSNs)positioned in rice,cotton,cassava crops for knowledge discovery and decision *** radial basis function network has been used for irrigation ***,in recent work,the security of data has not focused on where intruder involvement might corrupt the data at the time of data transferring to the cloud,which would affect the accuracy of decision *** handle the above mentioned issues,an efficient method for irrigation prediction is used in this *** factors considered for decision making are soil moisture,temperature,plant height,root *** above-mentioned data will be gathered from the sensors that are attached to the *** data will be forwarded to the local server,where data encryption will be performed using Adaptive Elliptic Curve Cryptography(AECC).After the encryption process,the data will be forwarded to the *** the data stored in the cloud will be decrypted key before being given to the deci-sion-making ***,the uniform distribution-based fuzzy neural network is formulated based on the received data information in the decisionmaking *** decision regarding the level of water required for cropfields would be *** on this outcome,the water volve opening duration and the level of fertilizers required will be *** results demons
This research work explores the effects of dry, liquid N2-based cryogenic cooling and cryogenic plus MQL hybrid strategy on surface roughness, rake surface temperature, principal cutting-edge temperature, auxiliary cu...
详细信息
Thereis an urgent need for strong security measures to protect Body Area Networks (BANs) from malicious threats, as their use in health monitoring and telemedicine continues to grow. To improve BAN security, this rese...
详细信息
Ambient vibration measurements of a cable-stayed bridge in Taiwan were first conducted to identify its dominant modal parameters with a reliable stochastic subspace identification algorithm recently developed. A finit...
详细信息
In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player ga...
详细信息
In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player game model and derive Nash equilibria in response to different types of insider *** analyzing these Nash equilibria,we provide quantitative solutions to advanced persistent threat problems pertaining to insider ***,we have conducted a comparative assessment of the optimal defense strategy and corresponding defender's costs between two types of insider ***,our findings advocate a more proactive defense strategy against inadvertent insider threats in contrast to malicious ones,despite the latter imposing a higher burden on the *** theoretical results are substantiated by numerical results,which additionally include a detailed exploration of the conditions under which different insiders adopt risky *** conditions can serve as guiding indicators for the defender when calibrating their monitoring intensities and devising defensive strategies.
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly promin...
详细信息
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly prominent.A piece of code,known as a Webshell,is usually uploaded to the target servers to achieve multiple *** Webshell attacks has become a hot spot in current ***,the traditional Webshell detectors are not built for the cloud,making it highly difficult to play a defensive role in the cloud ***,a Webshell detection system based on deep learning that is successfully applied in various scenarios,is proposed in this *** system contains two important components:gray-box and neural network *** gray-box analyzer defines a series of rules and algorithms for extracting static and dynamic behaviors from the code to make the decision *** neural network analyzer transforms suspicious code into Operation Code(OPCODE)sequences,turning the detection task into a classification *** experiment results show that SmartEagleEye achieves an encouraging high detection rate and an acceptable false-positive rate,which indicate its capability to provide good protection for the cloud environment.
Nomadic Vehicular Cloud(NVC)is envisaged in this *** predo-minant aspects of NVC is,it moves along with the vehicle that initiates it and functions only with the resources of moving vehicles on the heavy traffic road ...
详细信息
Nomadic Vehicular Cloud(NVC)is envisaged in this *** predo-minant aspects of NVC is,it moves along with the vehicle that initiates it and functions only with the resources of moving vehicles on the heavy traffic road without relying on any of the static infrastructure and NVC decides the initiation time of container migration using cell transmission model(CTM).Containers are used in the place of Virtual Machines(VM),as containers’features are very apt to NVC’s dynamic *** specifications of 5G NR V2X PC5 interface are applied to NVC,for the feature of not relying on the network ***-days,the peak traffic on the road and the bottlenecks due to it are inevitable,which are seen here as the benefits for VC in terms of resource availability and residual in-network *** speed range of high-end vehicles poses the issue of dis-connectivity among VC participants,that results the container migration *** the entire VC participants are on the move,to maintain proximity of the containers hosted by them,estimating their movements plays a vital *** infer the vehicle movements on the road stretch and initiate the container migration prior enough to avoid the migration failure due to vehicles dynamicity,this paper proposes to apply the CTM to the container based and 5G NR V2X enabled *** simulation results show that there is a significant increase in the success rate of vehicular cloud in terms of successful container migrations.
Partitional clustering techniques such as K-Means(KM),Fuzzy C-Means(FCM),and Rough K-Means(RKM)are very simple and effective techniques for image ***,because their initial cluster centers are randomly determined,it is...
详细信息
Partitional clustering techniques such as K-Means(KM),Fuzzy C-Means(FCM),and Rough K-Means(RKM)are very simple and effective techniques for image ***,because their initial cluster centers are randomly determined,it is often seen that certain clusters converge to local *** addition to that,pathology image segmentation is also problematic due to uneven lighting,stain,and camera settings during the microscopic image capturing ***,this study proposes an Improved Slime Mould Algorithm(ISMA)based on opposition based learning and differential evolution’s mutation strategy to perform illumination-free White Blood Cell(WBC)*** ISMA helps to overcome the local optima trapping problem of the partitional clustering techniques to some *** paper also performs a depth analysis by considering only color components of many well-known color spaces for clustering to find the effect of illumination over color pathology image *** and visual results encourage the utilization of illumination-free or color component-based clustering approaches for image ***-KM and“ab”color channels of CIELab color space provide best results with above-99%accuracy for only nucleus ***,for entire WBC segmentation,ISMA-KM and the“CbCr”color component of YCbCr color space provide the best results with an accuracy of above 99%.Furthermore,ISMA-KM and ISMA-RKM have the lowest and highest execution times,*** the other hand,ISMA provides competitive outcomes over CEC2019 benchmark test functions compared to recent well-established and efficient Nature-Inspired Optimization Algorithms(NIOAs).
Behavior-Driven Development (BDD) user stories are widely used in agile methods for capturing user requirements and acceptance criteria due to their simplicity and clarity. However, the concise structure of BDD-based ...
详细信息
暂无评论