Forests are crucial resources for human existence and social progress because they safeguard the earth's natural ***, forest fires occur regularly as a result of unmanaged human activities and erratic environmenta...
详细信息
ISBN:
(纸本)9798331300579
Forests are crucial resources for human existence and social progress because they safeguard the earth's natural ***, forest fires occur regularly as a result of unmanaged human activities and erratic environmental *** fires are the most destructive natural disasters to forest resources and the human *** fires have become more common in this scenario as a result of climate change, human activity, and other *** fire detection and monitoring has become a global problem for forest fire prevention ***, forest fire detection methods mostly include vigils, observation from watch towers, and, more recently, satellite *** observation from watch towers is simple and feasible, there are various *** and foremost, this strategy requires Keywords - Wireless sensor networks(WSN), computer vision, aerial vehicles(UAV), YOLO, Internet of things(IOT), Moderate Resolution Imaging Spectroradiometer(MODIS), mAP (mean Average Precision) Many financial and material resources, as well as a skilled labour ***, there are numerous issues with fire protection manpower, such as inattention, absenteeism from the post, a lack of real-time monitoring capability, and limited area coverage.A variety of parameters limit the spectrum of use of satellite detection systems, reducing their efficiency in forest fire detection.A satellite monitoring system, for example, has a long scanning period and a low resolution of saturated pixel dots of *** issue is that cloud layers might obscure photos during the scanning process, and real-time quantitative quantification of fire parameters is extremely difficult to *** the limitations of traditional monitoring, we propose a cloud-based wireless sensor network technology and Explain how it can be used as a monitoring *** system can monitor real-time related parameters such as temperature and relative humidity and promptly tr
This manuscript addresses the challenges in developing Automotive High-Performance Computing (HPC) systems for Future Smart Cars and Unmanned Mobile Vehicles (UMVs). We introduce a novel Unified Machine Vision (UMV) n...
详细信息
In an educational ecosystem, accurate and complete management of student’s records is a complex and error-prone process. Blockchain is a promising solution to add substantial value around enhanced efficiency, privacy...
详细信息
This paper addresses the underexplored landscape of chaotic functions in steganography, existing literature when examined under PRISMA-ScR framework it was realized that most of the studies predominantly focuses on ut...
详细信息
IoT for smart microgrids is an innovative disruption at the cutting edge of energy management, relying on interconnectedness provided by smart sensors and devices to enhance power generation and distribution precision...
详细信息
Hyperspectral imaging has transformed remote sensing by offering detailed spectral data for monitoring environmental changes, like urban development and terrestrial cover variations. However, existing change detection...
详细信息
In digital identification technologies, fingerprint-based biometric systems are extensively utilized for authentication. Fingerprint authentication systems usually store the original minutiae points as user templates ...
详细信息
Facial expression recognition is a challenging task when neural network is applied to pattern recognition. Most of the current recognition research is based on single source facial data, which generally has the disadv...
详细信息
Aquaponics is a sustainable farming method that combines aquaculture and hydroponics to grow plants and fish in a closed-loop system. In this research paper, an irrigation system based on aquaponics is proposed, which...
详细信息
作者:
K.MeenakshiG.MaragathamSchool of Computing
Department of Networking and CommunicationsSRM Institute of Science and TechnologyKattankulathurChennai603203India School of Computing
Department of Computational IntelligenceSRM Institute of Science and TechnologyKattankulathurChennai603203India
Deep Learning is one of the most popular computerscience techniques,with applications in natural language processing,image processing,pattern iden-tification,and various *** the success of these deep learning algorit...
详细信息
Deep Learning is one of the most popular computerscience techniques,with applications in natural language processing,image processing,pattern iden-tification,and various *** the success of these deep learning algorithms in multiple scenarios,such as spam detection,malware detection,object detection and tracking,face recognition,and automatic driving,these algo-rithms and their associated training data are rather vulnerable to numerous security *** threats ultimately result in significant performance ***,the supervised based learning models are affected by manipulated data known as adversarial examples,which are images with a particular level of noise that is invisible to *** inputs are introduced to purposefully confuse a neural network,restricting its use in sensitive application areas such as bio-metrics *** this paper,an optimized defending approach is proposed to recognize the adversarial iris examples *** Curvelet Transform Denoising method is used in this defense strategy,which examines every sub-band of the adversarial images and reproduces the image that has been changed by the *** salient iris features are retrieved from the reconstructed iris image by using a pretrained Convolutional Neural Network model(VGG 16)followed by Multiclass *** classification is performed by using Support Vector Machine(SVM)which uses Particle Swarm Optimization method(PSO-SVM).The proposed system is tested when classifying the adversarial iris images affected by various adversarial attacks such as FGSM,iGSM,and Deep-fool *** experimental result on benchmark iris dataset,namely IITD,produces excellent outcomes with the highest accuracy of 95.8%on average.
暂无评论