With the exponential rise in global air traffic,ensuring swift passenger processing while countering potential security threats has become a paramount concern for aviation *** X-ray baggage monitoring is now standard,...
详细信息
With the exponential rise in global air traffic,ensuring swift passenger processing while countering potential security threats has become a paramount concern for aviation *** X-ray baggage monitoring is now standard,manual screening has several limitations,including the propensity for errors,and raises concerns about passenger *** address these drawbacks,researchers have leveraged recent advances in deep learning to design threatsegmentation ***,these models require extensive training data and labour-intensive dense pixelwise annotations and are finetuned separately for each dataset to account for inter-dataset ***,this study proposes a semi-supervised contour-driven broad learning system(BLS)for X-ray baggage security threat instance segmentation referred to as *** research methodology involved enhancing representation learning and achieving faster training capability to tackle severe occlusion and class imbalance using a single training routine with limited baggage *** proposed framework was trained with minimal supervision using resource-efficient image-level labels to localize illegal items in multi-vendor baggage *** specifically,the framework generated candidate region segments from the input X-ray scans based on local intensity transition cues,effectively identifying concealed prohibited items without entire baggage *** multi-convolutional BLS exploits the rich complementary features extracted from these region segments to predict object categories,including threat and benign *** contours corresponding to the region segments predicted as threats were then utilized to yield the segmentation *** proposed C-BLX system was thoroughly evaluated on three highly imbalanced public datasets and surpassed other competitive approaches in baggage-threat segmentation,yielding 90.04%,78.92%,and 59.44%in terms of mIoU on GDXray,SIXray,and Compass-XP,***,the lim
This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactiv...
详细信息
This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactively reconfigure wireless environments to improve both sensing and communication(S&C) performance. First, we exploit a single IRS to enable wireless sensing in the base station's(BS's) non-line-of-sight(NLoS) area. In particular, we present three IRS-enabled NLoS target sensing architectures with fully-passive, semi-passive, and active IRSs, respectively. We compare their pros and cons by analyzing the fundamental sensing performance limits for target detection and parameter estimation. Next, we consider a single IRS to facilitate integrated sensing and communication(ISAC), in which the transmit signals at the BS are used for achieving both S&C functionalities, aided by the IRS through reflective beamforming. We present joint transmit signal and receiver processing designs for realizing efficient ISAC, and jointly optimize the transmit beamforming at the BS and reflective beamforming at the IRS to balance the fundamental performance tradeoff between S&C. Furthermore, we discuss multi-IRS networked ISAC, by particularly focusing on multi-IRS-enabled multi-link ISAC, multi-region ISAC, and ISAC signal routing, respectively. Finally, we highlight various promising research topics in this area to motivate future work.
In this paper, we present a multi-agent deep reinforcement learning (deep RL) framework for network slicing in a dynamic environment with multiple base stations and multiple users. In particular, we propose a novel de...
详细信息
Machining centers (MCs) are crucial high-technology machine tools that are widely used in the manufacturing industry. Since their high investment necessities, the selection of the appropriate MC for a company is an im...
详细信息
The ensemble is a technique that strategically combines basic models to achieve better accuracy ***,combination methods,and selection topology are the main factors determining ensemble ***,it is a challenging task to ...
详细信息
The ensemble is a technique that strategically combines basic models to achieve better accuracy ***,combination methods,and selection topology are the main factors determining ensemble ***,it is a challenging task to design an efficient ensemble *** though numerous paradigms have been proposed to classify ensemble schemes,there is still much room for *** paper proposes a general framework for creating ensembles in the context of ***,the ensemble framework consists of four stages:objectives,data preparing,model training,and model *** is comprehensive to design diverse *** proposed ensemble approach can be used for a wide variety of machine learning *** validate our approach on real-world *** experimental results show the efficiency of the proposed approach.
Global navigation satellite systems (GNSS) face significant challenges in urban and sub-urban areas due to non-line-of-sight (NLOS) propagation, multipath effects, and low received power levels, resulting in highly no...
详细信息
In this paper, we propose feature-based federated transfer learning as a novel approach to improve communication efficiency by reducing the uplink payload by multiple orders of magnitude compared to that of existing a...
详细信息
Person re-identification (ReID) aims to identify pedestrian images with the same identity across non-overlapping camera views. Intra-camera supervised person re-identification (ICS-ReID) is a new paradigm that trains ...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
The magnonic excitations of a dimerized, one-dimensional, antiferromagnetic chain can be trivial or topological depending on the signs and magnitudes of the alternating exchange couplings and the anisotropy. The topol...
详细信息
The magnonic excitations of a dimerized, one-dimensional, antiferromagnetic chain can be trivial or topological depending on the signs and magnitudes of the alternating exchange couplings and the anisotropy. The topological phase that occurs when the signs of the two different exchange couplings alternate is qualitatively different from that of the Su-Schrieffer-Heeger model. A material that may exhibit these properties is the quasi-one-dimensional material MoI3 that consists of dimerized chains weakly coupled to adjacent chains. The magnetic ground state and its excitations are analyzed both analytically and numerically using exchange and anisotropy parameters extracted from density functional theory calculations.
暂无评论