The escalating prevalence of violent crimes and accidents underscores the urgent need for efficient and timely monitoring systems. Traditional methods reliant on administrative reports often suffer from significant de...
详细信息
This paper introduces a control strategy utilizing the fractional variable order PID digital controller (FVOPID). We employ two variants of fractional discrete-time operators with variable order: the Grünwald-Let...
详细信息
In recent years, deep learning-based Synthetic Aperture Radar (SAR) image detection, recognition, and segmentation models achieve remarkable accuracy when trained on large amounts of SAR image samples. However, the ac...
详细信息
Counterfeiting is still a pervasive global issue, affecting multiple industries and hindering industrial innovation, while causing substantial financial losses, reputational damage, and risks to consumer safety. From ...
详细信息
Counterfeiting is still a pervasive global issue, affecting multiple industries and hindering industrial innovation, while causing substantial financial losses, reputational damage, and risks to consumer safety. From luxury goods and pharmaceuticals to electronics and automotive parts, counterfeit products infiltrate supply chains, leading to a loss of revenue for legitimate businesses and undermining consumer trust. Traditional anti-counterfeiting measures, such as holograms, serial numbers, and barcodes, have proven to be insufficient as counterfeiters continuously develop more sophisticated replication techniques. As a result, there is a growing need for more advanced, secure, and reliable methods to prevent counterfeiting. This paper presents a novel, holistic anti-counterfeiting platform that integrates Near Field Communication (NFC)-enabled mobile applications with blockchain technology to provide an innovative, secure, and consumer-friendly authentication mechanism. Our approach addresses key gaps in existing solutions by incorporating dynamic product identifiers, which make replication significantly more difficult. The system enables consumers to verify the authenticity of products instantly using their smartphones, enhancing transparency and trust in the supply chain. Blockchain technology plays a crucial role in our proposed solution by providing an immutable, decentralized ledger that records product authentication data. This ensures that product verification records cannot be tampered with or altered, adding a layer of security that is absent in conventional systems. Additionally, NFC technology enhances security by offering unique identification capabilities, enabling real-time product verification. To validate the effectiveness of the proposed system, real-world testing was conducted across different industries. The results demonstrated the platform’s ability to significantly reduce counterfeit products in the supply chain, offering businesses and cons
Precise measurement and control of the depth of anesthesia (DoA) is essential for anesthesiologists to ensure the success of surgery and the safety of patients. Electroencephalogram (EEG) signals, captured by electrod...
详细信息
In this paper, the current, voltages, as well as active and reactive power of the 400 kV transmission line are calculated using three different methods. The objective of the paper is to demonstrate and compare th...
详细信息
This paper proposes a framework for real-time monitoring of the power consumption of distributed calculation on the nodes of the cluster. The framework allows to visualize and analyze the provider results based on the...
详细信息
With the rapid development of digital communication and the widespread use of the Internet of Things, multi-view image compression has attracted increasing attention as a fundamental technology for image data communic...
详细信息
With the rapid development of digital communication and the widespread use of the Internet of Things, multi-view image compression has attracted increasing attention as a fundamental technology for image data communication. Multi-view image compression aims to improve compression efficiency by leveraging correlations between images. However, the requirement of synchronization and inter-image communication at the encoder side poses significant challenges, especially for constrained devices. In this study, we introduce a novel distributed image compression model based on the attention mechanism to address the challenges associated with the availability of side information only during decoding. Our model integrates an encoder network, a quantization module, and a decoder network, to ensure both high compression performance and high-quality image reconstruction. The encoder uses a deep Convolutional Neural Network(CNN) to extract high-level features from the input image, which then pass through the quantization module for further compression before undergoing lossless entropy coding. The decoder of our model consists of three main components that allow us to fully exploit the information within and between images on the decoder side. Specifically, we first introduce a channel-spatial attention module to capture and refine information within individual image feature maps. Second, we employ a semi-coupled convolution module to extract both shared and specific information in images. Finally, a cross-attention module is employed to fuse mutual information extracted from side information. The effectiveness of our model is validated on various datasets, including KITTI Stereo and Cityscapes. The results highlight the superior compression capabilities of our method, surpassing state-of-the-art techniques.
Object positioning is an essential issue in the context of autonomous vehicles and AGVs in Industry 4.0 and smart cities. Based on the position, it is possible not only to track objects, but with appropriate positions...
详细信息
PDF -to-audio based summarization technology is designed to enhance information accessibility and efficiency by transforming long written reports into short, audible summaries. AI, NLP, and TTS technologies that have ...
详细信息
暂无评论