In the human pose estimation task, on the one hand, 3-D pose always has difficulty in dividing different 2-D poses if the view is limited;on the other hand, it is hard to reduce the lifting ambiguity because of the la...
详细信息
This paper focuses on multi-enrollment speaker recognition which naturally occurs in the task of online speaker clustering, and studies the properties of different scoring back-ends in this scenario. First, we show th...
详细信息
The email which contains suspicious links or malicious files is one of the considerable threats in the digital world nowadays and because of these types of emails, enormous social and financial losses occur. The diffe...
详细信息
Abstract: We describe a Win/Win algorithm that produces in time polynomial in the size ofa graph G and a given parameter k either a spanning tree with at least k + 1 leaves or a path decomposition of width at mostk. T...
详细信息
Cyber-physical wireless systems have surfaced as an important data communication and networking research *** is an emerging discipline that allows effective monitoring and efficient real-time communication between the...
详细信息
Cyber-physical wireless systems have surfaced as an important data communication and networking research *** is an emerging discipline that allows effective monitoring and efficient real-time communication between the cyber and physical worlds by embedding computer software and integrating communication and networking *** to their high reliability,sensitivity and connectivity,their security requirements are more comparable to the Internet as they are prone to various security threats such as eavesdropping,spoofing,botnets,man-in-the-middle attack,denial of service(DoS)and distributed denial of service(DDoS)and *** methods use physical layer authentication(PLA),themost promising solution to detect ***,the cyber-physical systems(CPS)have relatively large computational requirements and require more communication resources,thus making it impossible to achieve a low latency *** methods perform well but only in stationary *** have extracted the relevant features from the channel matrices using discrete wavelet transformation to improve the computational time required for data processing by considering mobile *** features are fed to ensemble learning algorithms,such as AdaBoost,LogitBoost and Gentle Boost,to classify *** authentication of the received signal is considered a binary classification *** transmitted data is labeled as legitimate information,and spoofing data is illegitimate ***,this paper proposes a threshold-free PLA approach that uses machine learning algorithms to protect critical data from spoofing *** detects the malicious data packets in stationary scenarios and detects them with high accuracy when receivers are *** proposed model achieves better performance than the existing approaches in terms of accuracy and computational time by decreasing the processing time.
As an important and extensively used data visualization tool for understanding a dataset, STKDV has been extensively used in a wide range of applications, such as crime hotspot detection, traffic accident hotspot dete...
详细信息
The main contribution of this paper is the design of an event-triggered formation control for leader-following consensus in second-order multi-agent systems(MASs)under communication *** the agents must follow the traj...
详细信息
The main contribution of this paper is the design of an event-triggered formation control for leader-following consensus in second-order multi-agent systems(MASs)under communication *** the agents must follow the trajectories of a virtual leader despite communication faults considered as smooth time-varying delays dependent on the distance between the *** matrix inequalities(LMIs)-based conditions are obtained to synthesize a controller gain that guarantees stability of the synchronization *** on the closed-loop system,an event-triggered mechanism is designed to reduce the control law update and information exchange in order to reduce energy *** proposed approach is implemented in a real platform of a fleet of unmanned aerial vehicles(UAVs)under communication faults.A comparison between a state-of-the-art technique and the proposed technique has been provided,demonstrating the performance improvement brought by the proposed approach.
This paper focuses on multi-enrollment speaker recognition which naturally occurs in the task of online speaker clustering, and studies the properties of different scoring back-ends in this scenario. First, we show th...
详细信息
This paper focuses on multi-enrollment speaker recognition which naturally occurs in the task of online speaker clustering, and studies the properties of different scoring back-ends in this scenario. First, we show that popular cosine scoring suffers from poor score calibration with a varying number of enrollment utterances. Second, we propose a simple replacement for cosine scoring based on an extremely constrained version of probabilistic linear discriminant analysis (PLDA). The proposed model improves over the cosine scoring for multi-enrollment recognition while keeping the same performance in the case of one-to-one comparisons. Finally, we consider an online speaker clustering task where each step naturally involves multi-enrollment recognition. We propose an online clustering algorithm allowing us to take benefits from the PLDA model such as the ability to handle uncertainty and better score calibration. Our experiments demonstrate the effectiveness of the proposed algorithm.
Breast cancer is a major global health concern. Pathologists face challenges in analyzing complex features from pathological images, which is a time-consuming and labor-intensive task. Therefore, efficient computer-ba...
详细信息
暂无评论