The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection *** recent studies have...
详细信息
The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection *** recent studies have made progress,a common challenge is the low accuracy of existing detection *** models often struggle to reliably identify corrosion tendencies,which are crucial for minimizing industrial risks and optimizing resource *** proposed study introduces an innovative approach that significantly improves the accuracy of corrosion detection using a convolutional neural network(CNN),as well as two pretrained models,namely YOLOv8 and *** leveraging advanced technologies and methodologies,we have achieved high accuracies in identifying and managing the hazards associated with corrosion across various industrial *** advancement not only supports the overarching goals of enhancing safety and efficiency,but also sets a new benchmark for future research in the *** results demonstrate a significant improvement in the ability to detect and mitigate corrosion-related concerns,providing a more accurate and comprehensive solution for industries facing these *** CNN and EfficientNetB0 exhibited 100%accuracy,precision,recall,and F1-score,followed by YOLOv8 with respective metrics of 95%,100%,90%,and 94.74%.Our approach outperformed state-of-the-art with similar datasets and methodologies.
The smart distribution network(SDN)is integrat ing increasing distributed generation(DG)and energy storage(ES).Hosting capacity evaluation is important for SDN plan ning with *** and ES are usually invested by users o...
详细信息
The smart distribution network(SDN)is integrat ing increasing distributed generation(DG)and energy storage(ES).Hosting capacity evaluation is important for SDN plan ning with *** and ES are usually invested by users or a third party,and they may form friendly microgrids(MGs)and operate *** centralized dispatching meth od no longer suits for hosting capacity evaluation of SDN.A quick hosting capacity evaluation method based on distributed optimal dispatching is ***,a multi-objective DG hosting capacity evaluation model is established,and the host ing capacity for DG is determined by the optimal DG planning *** steady-state security region method is applied to speed up the solving process of the DG hosting capacity evalua tion ***,the optimal dispatching models are estab lished for MG and SDN respectively to realize the operating *** the distributed dispatching strategy,the dual-side optimal operation of SDN-MGs can be realized by several iterations of power exchange ***,an SDN with four MGs is conducted considering multiple flexible *** shows that the DG hosting capacity of SDN oversteps the sum of the maximum active power demand and the rated branch ***,the annual DG electricity oversteps the maximum active power demand value.
Scanning microscopy systems, such as confocal and multiphoton microscopy, are powerful imaging tools for probing deep into biological tissue. However, scanning systems have an inherent trade-off between acquisition ti...
详细信息
Handwritten character segmentation plays a pivotal role in the performance of Optical Character Recognition (OCR) systems. This paper introduces an innovative approach to enhancing segmentation accuracy using Region-B...
详细信息
Nowadays, medical image fusion plays a crucial role in enhancing the diagnosis accuracy and the clinical decision-making process in various healthcare applications. This research work presents a comprehensive stu...
详细信息
Nowadays, medical image fusion plays a crucial role in enhancing the diagnosis accuracy and the clinical decision-making process in various healthcare applications. This research work presents a comprehensive study of the design and implementation of optimized medical image fusion techniques using a combination of software and Field-Programmable Gate Array (FPGA) technologies. The proposed medical image fusion strategy is based on the utilization of Discrete Wavelet Transform (DWT) and Modified Central Force Optimization (MCFO). The implementation of the proposed technique as well as the traditional medical image fusion techniques is considered using an appropriate software design and FPGA. The presented techniques aim to overcome the limitations of traditional fusion techniques by integrating advanced image processing algorithms, optimization algorithms, and parallel computing capabilities offered by FPGA platforms. The first step in the proposed framework is to match the histogram of one of the images with that of the other, so that both images will have the same dynamic range. After that, the DWT is used to decompose the images that should be fused together. Based on some constraints, the MCFO optimization algorithm is used to evaluate the optimum level of decomposition and the optimum parameters for the best fusion quality. Finally, to improve the obtained visual quality and reinforce the information in the fusion result, an additional contrast enhancement step using adaptive histogram equalization is applied to the fusion result. Comparative study between the proposed optimized DWT-based fusion framework, the traditional Principal Component Analysis (PCA), Additive Wavelet Transform (AWT), and DWT-based fusion techniques is presented. Various metrics of fusion quality are considered, including average gradient, standard deviation, local contrast, entropy, edge strength, Peak Signal-to-Noise Ratio (PSNR), Qab/f, and processing time. The proposed optimized DWT-ba
Implementing defensive deception in the cloud is promising to proactively counter reconnaissance attack. This technique presents decoys to camouflage cloud assets and distracts attack resource. However,the major chall...
详细信息
Implementing defensive deception in the cloud is promising to proactively counter reconnaissance attack. This technique presents decoys to camouflage cloud assets and distracts attack resource. However,the major challenge is to develop an effective deception strategy to orchestrate digital decoys. To address this issue, we propose a deep reinforcement learning(DRL)-based defensive deception framework. First,we formulate a utility function, which mathematically models underlying threats associated with common vulnerabilities among virtual machines in the cloud. Then, we customize training interfaces and the neural networks for a DRL agent. The reward function reflects the effectiveness of asset concealment and the waste of attack resources, referring to a comprehensive defense goal. Finally, the well-trained DRL agent generates the optimal defense strategy. It specifies a more granular deception strategy than existing proposals. Simulation results show that the proposed framework leads to a 7.87% average advantage in realizing the comprehensive defense goal. Moreover, it can stably improve the concealment degree of cloud assets up to 20.58%, and increase the attack cost up to 40.40%. This study shows that it is promising to improve cloud security with deception defense and artificial intelligence techniques.
In the realm of smart healthcare, vast amounts of valuable patient data are generated worldwide. However, healthcare providers face challenges in data sharing due to privacy concerns. Federated learning (FL) offers a ...
详细信息
A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are con...
详细信息
A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc.
In recent years, there has been a rapid development of intelligent driving assistance systems. Although most vehicles nowadays are equipped with driving assistance systems, the number of car accidents continues to ris...
详细信息
Artificial intelligence (AI)-based learning control plays a critical role in the evolution of intelligent control, particularly for complex network systems. Traditional intelligent control methods assume the agent can...
详细信息
暂无评论