This paper proposes a thermal design method for transmission coils with thermally conductive plastic plates considering load fluctuation of high-power wireless power transfer (WPT) systems. The high power transmission...
详细信息
Reliable face recognition starts with the analysis of accurate and robust facial localization component and poses an unresolved challenging computer vision problem in unconstrained settings in the backdrop of clutter,...
详细信息
Based on the digitalization of the world and the increasing use of data, we can say that the next ten years will see a huge leap in the use of data in virtualization, automation, health and more. One of the infrastruc...
详细信息
ISBN:
(数字)9781728193748
ISBN:
(纸本)9781728193755
Based on the digitalization of the world and the increasing use of data, we can say that the next ten years will see a huge leap in the use of data in virtualization, automation, health and more. One of the infrastructures to reach the digitalization goals of the world is new communication networks with more capabilities, including high speed, low latency, more coverage and more. 5G networks and later 6G can provide us with this infrastructure. According to 6G (KPIS) targeting, IoT equipment, and distributed systems, data volumes are beyond the tolerance of cyber systems for data analysis. On the other hand, as technology evolves, its abuse will increase, and attacks on data exploitation will become more and more diverse. The main weaknesses of distributed and IoT systems, which are their computing power and power, will remain the same, and hackers will make the most of these weaknesses and will use new methods and ways to anonymize their activities. So there is a need for a system to identify and counter potential abuses of capabilities and data volume in next generation networks, especially 5G and 6G, more than ever. In this paper, we present a theory for work and activity on the creation of malicious traffic identification modeling in 5G and 6G networks. And finally we can come up with a solution to create more security in the future.
Vehicular Ad-hoc Networks (VANETs) is consid-ered as an extension of Mobile Ad-hoc Networks (MANETs) which the vehicles have high mobility on the street and in-Termittent connectivity. The vehicles move on the street ...
详细信息
Precise single tree delineation allows for a more reliable determination of essential parameters such as tree species, height and vitality. Methods of instance segmentation are powerful neural networks for detecting a...
详细信息
Precise single tree delineation allows for a more reliable determination of essential parameters such as tree species, height and vitality. Methods of instance segmentation are powerful neural networks for detecting and segmenting single objects and have the potential to push the accuracy of tree segmentation methods to a new level. In this study, two instance segmentation methods, Mask R–CNN and DETR, were applied to precisely delineate single tree crowns using multispectral images and images generated from UAV lidar data. The study area was in Bavaria, 35 km north of Munich (Germany), comprising a mixed forest stand of around 7 ha characterised mainly by Norway spruce (Picea abies) and large groups of European beeches (Fagus sylvatica) with 181–236 trees per ha. The data set, consisting of multispectral images and lidar data, was acquired using a Micasense RedEdge-MX dual camera system and a Riegl miniVUX-1UAV lidar scanner, both mounted on a hexacopter (DJI Matrice 600 Pro). At an altitude of approximately 85 m, two flight missions were conducted at an airspeed of 5 m/s, leading to a ground resolution of 5 cm and a lidar point density of 560 points/m2. In total, 1408 trees were marked by visual interpretation of the remote sensing data for training and validating the classifiers. Additionally, 125 trees were surveyed by tacheometric means used to test the optimized neural networks. The evaluations showed that segmentation using only multispectral imagery performed slightly better than with images generated from lidar data. In terms of F1 score, Mask R–CNN with color infrared (CIR) images achieved 92% in coniferous, 85% in deciduous and 83% in mixed stands. Compared to the images generated by lidar data, these scores are the same for coniferous and slightly worse for deciduous and mixed plots, by 4% and 2%, respectively. DETR with CIR images achieved 90% in coniferous, 81% in deciduous and 84% in mixed stands. These scores were 2%, 1%, and 2% worse, res
In this paper, we address a design problem of nudging mechanism for dynamical decision makers with bounded rationality. We first present a mathematical model for dynamic decision makers with psychological biases. We t...
详细信息
In this paper, we address a design problem of nudging mechanism for dynamical decision makers with bounded rationality. We first present a mathematical model for dynamic decision makers with psychological biases. We then analyze the dynamics based on so-called δ -passivity, and reveal that the bias violates passivity of decision makers. We moreover propose a nudging mechanism based on the passivity paradigm to achieve desired social behavior. The presented mechanism is finally demonstrated through numerical simulation.
This paper introduces the Fornasini-Marchesini second model (FM-II) realization problem for the target detection of multi-input and multi-output (MIMO) radar. A new operation approach to the realization of MIMO radar ...
详细信息
Software-defined networking (SDN) and the network function virtualization (NFV) led to great developments in software based controltechnology by decreasing expenditures. Service function chaining (SFC) is an importan...
详细信息
This work proposes a low-power high-accuracy embedded hand-gesture recognition algorithm targeting battery-operated wearable devices using low power short-range RADAR sensors. A 2D Convolutional Neural Network (CNN) u...
详细信息
This demonstration shows live operation of of PDAVIS polarization event camera reconstruction by the E2P DNN reported in the main CVPR conference paper Deep Polarization Reconstruction with PDAVIS Events (paper 9149 [...
This demonstration shows live operation of of PDAVIS polarization event camera reconstruction by the E2P DNN reported in the main CVPR conference paper Deep Polarization Reconstruction with PDAVIS Events (paper 9149 [7]). Demo code: ***/SensorsINI/e2p
暂无评论