Two approaches are available for WSOD: MIL and CAM. MIL-based methods are capable of addressing multiple targets and multiple class problems. However, these methods require the input of region proposals. In contrast, ...
详细信息
Road mark detection is a critical component of Advanced Driver Assistance Systems (ADAS), ensuring accurate lane-keeping, navigation, and driver safety. However, the high cost of acquiring fully annotated datasets for...
详细信息
ISBN:
(数字)9798331504120
ISBN:
(纸本)9798331504137
Road mark detection is a critical component of Advanced Driver Assistance Systems (ADAS), ensuring accurate lane-keeping, navigation, and driver safety. However, the high cost of acquiring fully annotated datasets for supervised learning poses a significant challenge for real-world applications. This paper proposes a novel weakly supervised learning method for road mark detection tailored to consumer automotive technology. Leveraging weak annotations, the method efficiently learns to detect and classify road marks with minimal human intervention. The approach was evaluated on the publicly available CeyMo dataset, achieving a classification accuracy of 99.3% and a localization accuracy of 71.5%, demonstrating its effectiveness and practicality. The proposed method reduces the dependency on fully annotated data while maintaining competitive performance, making it a scalable solution for consumer-level ADAS applications. This work contributes to advancing cost-effective, reliable, and scalable ADAS technologies, paving the way for broader adoption in intelligent vehicles.
Sounds carry a huge amount of information of our daily life and physical events. We hear sounds in complex environment and from increased amounts of electric devices, so audio recognition is definitely an important te...
详细信息
Two approaches are available for WSOD: MIL and CAM. MIL-based methods are capable of addressing multiple targets and multiple class problems. However, these methods require the input of region proposals. In contrast, ...
详细信息
ISBN:
(数字)9798331521165
ISBN:
(纸本)9798331521172
Two approaches are available for WSOD: MIL and CAM. MIL-based methods are capable of addressing multiple targets and multiple class problems. However, these methods require the input of region proposals. In contrast, CAM-based methods are straightforward and more efficient, yet they are constrained by limited localization accuracy and are likely to be applicable only to single target classes. This study proposes a CAM-based WSOD method that is capable of addressing multi-object, multi-class tasks with high efficiency, which could prove beneficial for the development of specific consumer electronic applications, such as smart cameras and smart home devices. The proposed method was evaluated on two public datasets, demonstrating that it is significantly more efficient than the baseline method.
The detection of reconnaissance attacks is crucial for safeguarding Internet of Things (IoT) environments, which are inherently more vulnerable and resource-constrained compared to traditional computing systems. Tradi...
详细信息
ISBN:
(数字)9798350391725
ISBN:
(纸本)9798350391732
The detection of reconnaissance attacks is crucial for safeguarding Internet of Things (IoT) environments, which are inherently more vulnerable and resource-constrained compared to traditional computing systems. Traditional centralised detection methods face significant challenges, such as privacy concerns and limited scalability due to the need to aggregate raw data on a central server. These issues become particularly pronounced in IoT environments where devices are diverse and geographically distributed. To address these challenges, we propose ReconGuard, a novel approach leveraging Model Contrastive Federated Learning (MCFL). ReconGuard enables collaborative training across multiple IoT devices without the necessity of sharing raw data, thereby preserving user privacy and enhancing data security. The approach integrates contrastive learning techniques, which improve the model’s ability to discriminate between benign and malicious activities by contrasting positive (similar) and negative (dissimilar) data pairs. Our experimental results demonstrate that the ReconGuard-based detection system provides a scalable and privacy-preserving solution for identifying reconnaissance activities. These activities are often the initial step in more severe cyber threats, such as botnet attacks, which can lead to significant disruption and damage. By effectively detecting reconnaissance activities, ReconGuard enhances the overall cybersecurity framework of IoT environments. This research presents a viable and innovative method for improving cybersecurity in IoT systems, addressing the critical need for scalable, efficient, and privacy-preserving intrusion detection solutions. The use of MCFL in ReconGuard not only mitigates the challenges of data centralisation but also leverages the distributed nature of IoT networks to enhance robustness against cyber threats.
the design decisions made in the architecture of a software system are essential to its maintainability, and thus its quality is of great importance. Architecture smells (ASs) can be used to identify any quality issue...
详细信息
Due to immense pressure on the medical sector, there is a huge chance of human error in diagnosing the report of COVID-19 patients. For the detection of COVID-19, many Artificial Intelligence-based methodologies have ...
详细信息
Data mining technology plays a crucial role in the area of data analysis. Mining frequent episodes stands out as a pivotal task within this domain, enabling users to forecast future events based on present occurrences...
Data mining technology plays a crucial role in the area of data analysis. Mining frequent episodes stands out as a pivotal task within this domain, enabling users to forecast future events based on present occurrences. Conventional methods for discovering frequent episodes typically follow a hierarchical approach, involving the generation of candidate episodes and subsequent scanning of sequence data to count their frequency, which can be quite time-consuming, as it necessitates repeated scans of the sequence data and the search for candidate episodes. In this paper, we introduce a novel approach for episode mining in a data stream. Our method distinguishes itself by scanning newly added data to update existing frequent episodes, all without the need for scanning the original data or searching for candidate episodes. The experiments also show that our approach is more efficient compared to other existing methods.
In today’s rapidly advancing technological land-scape, the widespread adoption of mobile applications has become a defining feature of our digital age. This research study presents a on the development of a mobile no...
详细信息
ISBN:
(数字)9798350359299
ISBN:
(纸本)9798350359305
In today’s rapidly advancing technological land-scape, the widespread adoption of mobile applications has become a defining feature of our digital age. This research study presents a on the development of a mobile notes application using Android Studio, with the primary goal of offering users a versatile platform for creating and managing notes. The proposed notes application is designed with a simple and user-friendly interface, facilitating effortless note creation, editing, and deletion. Moreover, it has features like voice-to-text for making notes, text-to-speech for reading the notes aloud, note sharing for easily sharing ideas with others and image insertion for storing the photocopy of the written notes or diagrams based on user interest. This research work uses Android Studio as the integrated development environment (IDE) and utilizes the Java programming language for the app’s core functionalities. Furthermore, it incorporates Firebase Authentication to ensure secure user account management and the Firestore for Database for seamless storage and retrieval of notes. This research study provides an essential tool for students, professionals, and anyone seeking a convenient means to keep track of vital information. By combining mobile application development tools and cloud-based data management like Firebase, the application simplifies how information is managed, aligning with the way we live in the digital age.
Face verification is a well-known image analysis application and is widely used to recognize individuals in contemporary society. However, most real-world recognition systems ignore the importance of protecting the id...
详细信息
暂无评论