Thetransformer-based semantic segmentation approaches,which divide the image into different regions by sliding windows and model the relation inside each window,have achieved outstanding ***,since the relation modelin...
详细信息
Thetransformer-based semantic segmentation approaches,which divide the image into different regions by sliding windows and model the relation inside each window,have achieved outstanding ***,since the relation modeling between windows was not the primary emphasis of previous work,it was not fully *** address this issue,we propose a Graph-Segmenter,including a graph transformer and a boundary-aware attention module,which is an effective network for simultaneously modeling the more profound relation between windows in a global view and various pixels inside each window as a local one,and for substantial low-cost boundary ***,we treat every window and pixel inside the window as nodes to construct graphs for both views and devise the graph *** introduced boundary-awareattentionmoduleoptimizes theedge information of the target objects by modeling the relationship between the pixel on the object's *** experiments on three widely used semantic segmentation datasets(Cityscapes,ADE-20k and PASCAL Context)demonstrate that our proposed network,a Graph Transformer with Boundary-aware Attention,can achieve state-of-the-art segmentation performance.
Semantic Communication(SC)has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput in wireless networ...
详细信息
Semantic Communication(SC)has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput in wireless networks,beyond the theoretical capacity *** the extensive research on SC,there is a lack of comprehensive survey on technologies,solutions,applications,and challenges for *** this article,the development of SC is first reviewed and its characteristics,architecture,and advantages are ***,key technologies such as semantic extraction,semantic encoding,and semantic segmentation are discussed and their corresponding solutions in terms of efficiency,robustness,adaptability,and reliability are *** of SC to UAV communication,remote image sensing and fusion,intelligent transportation,and healthcare are also presented and their strategies are ***,some challenges and future research directions are presented to provide guidance for further research of SC.
Amplitude death has the potential to suppress unwanted oscillations in various engineering applications. However, in some engineering applications, such as dc microgrids, airfoil systems, and thermoacoustic systems, o...
详细信息
Amplitude death has the potential to suppress unwanted oscillations in various engineering applications. However, in some engineering applications, such as dc microgrids, airfoil systems, and thermoacoustic systems, oscillation frequency is highly susceptible to external influences, leading to considerable variations. To maintain amplitude death amidst these frequency variations, we propose a design procedure that is robust against frequency variation for inducing amplitude death in delay-coupled oscillators. We first analytically derive the oscillator frequency band in which amplitude death can occur. The frequency bandwidth is maximized when the coupling strength is inversely proportional to the connection delay. Furthermore, our analysis reveals that the oscillator frequency band is influenced by the minimum eigenvalue of the normalized adjacency matrix (i.e., network topology) and that bipartite networks exhibit limited robustness to frequency variations. Our design procedure maintains the stability of amplitude death even under substantial frequency variations and is applicable to various network topologies. Numerical simulations confirm the validity of the proposed design.
Controlling an active distribution network(ADN)from a single PCC has been advantageous for improving the performance of coordinated Intermittent RESs(IRESs).Recent studies have proposed a constant PQ regulation approa...
详细信息
Controlling an active distribution network(ADN)from a single PCC has been advantageous for improving the performance of coordinated Intermittent RESs(IRESs).Recent studies have proposed a constant PQ regulation approach at the PCC of ADNs using coordination of non-MPPT based ***,due to the intermittent nature of DGs coupled with PCC through uni-directional broadcast communication,the PCC becomes vulnerable to transient *** address this challenge,this study first presents a detailed mathematical model of an ADN from the perspective of PCC regulation to realize rigidness of PCC against ***,an H_(∞)controller is formulated and employed to achieve optimal performance against disturbances,consequently,ensuring the least oscillations during transients at ***,an eigenvalue analysis is presented to analyze convergence speed limitations of the newly derived system ***,simulation results show the proposed method offers superior performance as compared to the state-of-the-art methods.
The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia ***-quality images require well-tuned communication *** Single C...
详细信息
The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia ***-quality images require well-tuned communication *** Single Carrier Frequency Division Multiple Access(SC-FDMA)is adopted for broadband wireless communications,because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio(PAPR).Data transmission through open-channel networks requires much concentration on security,reliability,and *** data need a space away fromunauthorized access,modification,or *** requirements are to be fulfilled by digital image watermarking and *** paper ismainly concerned with secure image communication over the wireless SC-FDMA systemas an adopted communication *** introduces a robust image communication framework over SC-FDMA that comprises digital image watermarking and encryption to improve image security,while maintaining a high-quality reconstruction of images at the receiver *** proposed framework allows image watermarking based on the Discrete Cosine Transform(DCT)merged with the Singular Value Decomposition(SVD)in the so-called DCT-SVD *** addition,image encryption is implemented based on chaos and DNA *** encrypted watermarked images are then transmitted through the wireless SC-FDMA *** linearMinimumMean Square Error(MMSE)equalizer is investigated in this paper to mitigate the effect of channel fading and noise on the transmitted *** subcarrier mapping schemes,namely localized and interleaved schemes,are compared in this *** study depends on different channelmodels,namely PedestrianAandVehicularA,with a modulation technique namedQuadratureAmplitude Modulation(QAM).Extensive simulation experiments are conducted and introduced in this paper for efficient transmission of encrypted watermarked *** addition,different variants of SC-FDMA bas
The IEEE802.15.4 standard has been widely used in modern industry due to its several benefits for stability,scalability,and enhancement of wireless mesh *** standard uses a physical layer of binary phase-shift keying(...
详细信息
The IEEE802.15.4 standard has been widely used in modern industry due to its several benefits for stability,scalability,and enhancement of wireless mesh *** standard uses a physical layer of binary phase-shift keying(BPSK)modulation and can be operated with two frequency bands,868 and 915 *** frequency noise could interfere with the BPSK signal,which causes distortion to the signal before its arrival at ***,filtering the BPSK signal from noise is essential to ensure carrying the signal from the sen-der to the receiver with less ***,removing signal noise in the BPSK signal is necessary to mitigate its negative sequences and increase its capability in industrial wireless sensor ***,researchers have reported a posi-tive impact of utilizing the Kalmen filter in detecting the modulated signal at the receiver side in different communication systems,including ***-while,artificial neural network(ANN)and machine learning(ML)models outper-formed results for predicting signals for detection and classification *** paper develops a neural network predictive detection method to enhance the performance of BPSK ***,a simulation-based model is used to generate the modulated signal of BPSK in the IEEE802.15.4 wireless personal area network(WPAN)***,Gaussian noise was injected into the BPSK simulation *** reduce the noise of BPSK phase signals,a recurrent neural networks(RNN)model is implemented and integrated at the receiver side to esti-mate the BPSK’s phase *** evaluated our predictive-detection RNN model using mean square error(MSE),correlation coefficient,recall,and F1-score *** result shows that our predictive-detection method is superior to the existing model due to the low MSE and correlation coefficient(R-value)metric for different signal-to-noise(SNR)*** addition,our RNN-based model scored 98.71%and 96.34%based on recall and F1-score,respectively.
The article deals with the integration of Lo(ng) Ra(nge) Wide Area Network (LoRaWAN) sensors with generic manufacturing applications and Industrial Internet of Things (IIoT) use-cases. The focus is on creating a suita...
详细信息
Passive localization using visible light (VL) sensing has been considered as a promising solution for indoor human detection. A major challenge is to avoid false target positioning in multitarget positioning scenarios...
详细信息
This letter presents a novel method to enable beam steering optimization for secure communications and resilience against radio tracking in an intelligent reflecting surfaces-enabled multiple-input multiple-output dua...
详细信息
Smartphones contain a vast amount of information about their users, which can be used as evidence in criminal cases. However, the sheer volume of data can make it challenging for forensic investigators to identify and...
详细信息
暂无评论