To utilize the limited acoustic spectrum while combating the harsh underwater propagation, we incorporate partial spectrum sharing into an underwater acoustic sensor network and aim to maximize the minimum data collec...
详细信息
Conversational Question Generation (CQG) enhances the interactivity of conversational question-answering systems in fields such as education, customer service, and entertainment. However, traditional CQG, focusing pri...
详细信息
Power systems serve as the fundamental infrastructure for the socioeconomic development of modern societies. Researching power systems can stimulate the growth of the power industry and contribute to the sustainable d...
详细信息
Due to the terrain, the frequent floods of the Yellow River have posed a great threat to the cities along the Yellow River. At present, although the danger alarm system and video surveillance system are widely install...
详细信息
Sonar is a general term for various underwater acoustic devices, which are used to perform underwater target detection, positioning, identification, tracking and underwater communication, navigation, measurement and o...
详细信息
With the development of network technology and people's growing need for a better life, IoT technology has been integrated into more and more people's daily lives. At the same time, due to the different needs ...
详细信息
With the formation of the high-resolution satellite system, the information carried in remote sensing data is becoming more and more abundant, and the types of data are also increasing. In order to realize the efficie...
详细信息
The rapid growth of mobile applications,the popularity of the Android system and its openness have attracted many hackers and even criminals,who are creating lots of Android ***,the current methods of Android malware ...
详细信息
The rapid growth of mobile applications,the popularity of the Android system and its openness have attracted many hackers and even criminals,who are creating lots of Android ***,the current methods of Android malware detection need a lot of time in the feature engineering ***,these models have the defects of low detection rate,high complexity,and poor practicability,*** analyze the Android malware samples,and the distribution of malware and benign software in application programming interface(API)calls,permissions,and other *** classify the software’s threat levels based on the correlation of ***,we propose deep neural networks and convolutional neural networks with ensemble learning(DCEL),a new classifier fusion model for Android malware ***,DCEL preprocesses the malware data to remove redundant data,and converts the one-dimensional data into a two-dimensional gray ***,the ensemble learning approach is used to combine the deep neural network with the convolutional neural network,and the final classification results are obtained by voting on the prediction of each single *** based on the Drebin and Malgenome datasets show that compared with current state-of-art models,the proposed DCEL has a higher detection rate,higher recall rate,and lower computational cost.
The lack of facial features caused by wearing masks degrades the performance of facial recognition *** occluded face recognition methods cannot integrate the computational resources of the edge layer and the device **...
详细信息
The lack of facial features caused by wearing masks degrades the performance of facial recognition *** occluded face recognition methods cannot integrate the computational resources of the edge layer and the device ***,previous research fails to consider the facial characteristics including occluded and unoccluded *** solve the above problems,we put forward a device-edge collaborative occluded face recognition method based on cross-domain feature ***,the device-edge collaborative face recognition architecture gets the utmost out of maximizes device and edge resources for real-time occluded face ***,a cross-domain facial feature fusion method is presented which combines both the explicit domain and the implicit domain ***,a delay-optimized edge recognition task scheduling method is developed that comprehensively considers the task load,computational power,bandwidth,and delay tolerance constraints of the *** method can dynamically schedule face recognition tasks and minimize recognition delay while ensuring recognition *** experimental results show that the proposed method achieves an average gain of about 21%in recognition latency,while the accuracy of the face recognition task is basically the same compared to the baseline method.
The development of population intelligence has shown a great trend of a linear surge in recent years, and a large number of intelligent algorithms inspired by biology have been studied. Among them, differential evolut...
详细信息
暂无评论