Anomaly detection is the identification of instances that substantially deviate from the majority of the data and do not conform to a well-defined normal behavior. Investigating time series anomalies has become increa...
详细信息
Intelligent plant factories must continuously collect sensing data from other factories to update parameters in real time and obtain the best plant growth environment. However, if the collected sensing data is forged ...
详细信息
The global food supply heavily relies on fisheries, highlighting the crucial importance of ensuring the safety of fish products. However, the widespread application of antibiotics and the existence of compounds such a...
详细信息
Landscape analysis has received increasing attention in the literature, with a major focus on producing feature data to be used in a machine learning pipeline for automatic algorithm selection and configuration. In co...
详细信息
The analytical and modelling precision required to build modern wind turbines makes them stable, controlled, and observable. This article presents a state-of-the-art method for lowering the model order of a wind turbi...
详细信息
6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous *** tandem with these advancements,blockchain technology is leveraged t...
详细信息
6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous *** tandem with these advancements,blockchain technology is leveraged to enhance computer vision applications’security,trustworthiness,and *** the widespread use of mobile devices equipped with cameras,the ability to capture and recognize Chinese characters in natural scenes has become increasingly *** can facilitate privacy-preserving mechanisms in applications where privacy is paramount,such as facial recognition or personal healthcare *** can control their visual data and grant or revoke access as *** Chinese characters from images can provide convenience in various aspects of people’s ***,traditional Chinese character text recognition methods often need higher accuracy,leading to recognition failures or incorrect character *** contrast,computer vision technologies have significantly improved image recognition *** paper proposed a Secure end-to-end recognition system(SE2ERS)for Chinese characters in natural scenes based on convolutional neural networks(CNN)using 6G *** proposed SE2ERS model uses the Weighted Hyperbolic Curve Cryptograph(WHCC)of the secure data transmission in the 6G network with the blockchain *** data transmission within the computer vision system,with a 6G gradient directional histogram(GDH),is employed for character *** the deployment of WHCC and GDH in the constructed SE2ERS model,secure communication is achieved for the data transmission with the 6G *** proposed SE2ERS compares the performance of traditional Chinese text recognition methods and data transmission environment with 6G *** results demonstrate that SE2ERS achieves an average recognition accuracy of 88%for simple Chinese characters,compared to 81.2%with traditional ***
Intermittent deep neural network (DNN) inference is a promising technique to enable intelligent applications on tiny devices powered by ambient energy sources. Nonetheless, intermittent execution presents inherent cha...
详细信息
Mobile networks have seen more than a thousand times traffic increases in the past decade. Network operators face an ever increasing demand and cost to deploy denser networks in order to maintain the quality of servic...
详细信息
Based on a comparative analysis of the Long Short-Term Memory(LSTM)and Gated Recurrent Unit(GRU)networks,we optimize the structure of the GRU network and propose a new modulation recognition method based on feature ex...
详细信息
Based on a comparative analysis of the Long Short-Term Memory(LSTM)and Gated Recurrent Unit(GRU)networks,we optimize the structure of the GRU network and propose a new modulation recognition method based on feature extraction and a deep learning ***-order cumulant,Signal-to-Noise Ratio(SNR),instantaneous feature,and the cyclic spectrum of signals are extracted firstly,and then input into the Convolutional Neural Network(CNN)and the parallel network of GRU for *** modulation modes of communication signals are recognized *** results show that the proposed method can achieve high recognition rate at low SNR.
暂无评论