Multi-view learning methods leverage multiple data sources to enhance perception by mining correlations across views, typically relying on predefined categories. However, deploying these models in real-world scenarios...
详细信息
In the rapidly evolving urban landscape,outdoor parking lots have become an indispensable part of the city’s transportation *** growth of parking lots has raised the likelihood of spontaneous vehicle combus-tion,a si...
详细信息
In the rapidly evolving urban landscape,outdoor parking lots have become an indispensable part of the city’s transportation *** growth of parking lots has raised the likelihood of spontaneous vehicle combus-tion,a significant safety hazard,making smoke detection an essential preventative ***,the complex environment of outdoor parking lots presents additional challenges for smoke detection,which necessitates the development of more advanced and reliable smoke detection *** paper addresses this concern and presents a novel smoke detection technique designed for the demanding environment of outdoor parking ***,we develop a novel dataset to fill the gap,as there is a lack of publicly available *** dataset encompasses a wide range of smoke and fire scenarios,enhanced with data augmentation to ensure robustness against diverse outdoor ***,we utilize an optimized YOLOv5s model,integrated with the Squeeze-and-Excitation network(SENet)attention mechanism,to significantly improve detection accuracy while maintaining real-time processing ***,this paper implements an outdoor smoke detection system that is capable of accurately localizing and alerting in real time,enhancing the effectiveness and reliability of emergency *** show that the system has a high accuracy in terms of detecting smoke incidents in outdoor scenarios.
The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such...
详细信息
The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such as path planning,situational awareness,and information *** to the openness of the network,the UAV cluster is more vulnerable to passive eavesdropping,active interference,and other attacks,which makes the system face serious security *** paper proposes a Blockchain-Based Data Acquisition(BDA)scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition *** UAV cluster has an aggregate unmanned aerial vehicle(AGV)that can batch-verify the acquisition reports within its administrative *** successful verification,AGV adds its signcrypted ciphertext to the aggregation and uploads it to the blockchain for *** are two chains in the blockchain that store the public key information of registered entities and the aggregated reports,*** security analysis shows that theBDAconstruction can protect the privacy and authenticity of acquisition data,and effectively resist a malicious key generation center and the public-key substitution *** also provides unforgeability to acquisition reports under the Elliptic Curve Discrete Logarithm Problem(ECDLP)*** performance analysis demonstrates that compared with other schemes,the proposed BDA construction has lower computational complexity and is more suitable for the UAV cluster network with limited computing power and storage capacity.
Cloud computingtechnology is an internet-based computing model that provides high reliability and security measures, including data backup, secure access control, etc. As Docker containers play a increasingly importa...
详细信息
Integrated sensing and communication (ISAC) has been proposed as an enabling technology for the realization of the next-generation wireless system,which focuses on performing wireless communication and sensing *** the...
Integrated sensing and communication (ISAC) has been proposed as an enabling technology for the realization of the next-generation wireless system,which focuses on performing wireless communication and sensing *** the various potential ISAC-based applications,unmanned aerial vehicle (UAV)-based ISAC plays a significant part in unlocking the potential of future next-generation wireless communication,facilitating low-latency data transmission in high-mobility *** by recent advancements,a variety of effective techniques have been investigated to optimize beamforming design in ISAC *** instance,the authors in [1] introduced an extended Kalman filtering (EKF)-based method tailored for millimeter wave (mmWave) ISAC ***,Ref.[2]proposed an extended interacting multiple model (IMM)-EKF framework designed for vehicular networks with intricate roadway *** these advancements,the aforementioned methods typically employ a separate scheme for channel prediction and beam alignment,which introduces additional signaling overhead in real-world ***,there is a demand for an end-to-end beamforming design approach specifically for UAV-based ISAC systems.
Time-Locked Puzzle (TLP) and timed-release encryption (T-RE) are both time-based locking mechanisms. The former requires the decryptor to perform a predetermined amount of computation, while the latter requires a trus...
详细信息
Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information....
详细信息
Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information. One is to generate sparse attention coefficients associated with acoustic and visual modalities, which helps locate critical emotional se-mantics. The other is fusing complementary cross‐modal representation to construct optimal salient feature combinations of multiple modalities. A Conditional Transformer Fusion network is proposed to handle these problems. Firstly, the authors equip the transformer module with CNN layers to enhance the detection of subtle signal patterns in nonverbal sequences. Secondly, sentiment words are utilised as context conditions to guide the computation of cross‐modal attention. As a result, the located nonverbal fea-tures are not only salient but also complementary to sentiment words directly. Experi-mental results show that the authors’ method achieves state‐of‐the‐art performance on several multimodal affective analysis datasets.
The versatile application of deep learning has made it prone to vulnerabilities, particularly adversarial attacks, which have been increasingly prevalent as its scope expands. Attack methods based on adversarial queri...
详细信息
As advanced technology nodes enter the nanometer era, the complexity of integrated circuit design is increasing, and the proportion of bus in the net is also increasing. The bus routing has become a key factor affecti...
详细信息
As advanced technology nodes enter the nanometer era, the complexity of integrated circuit design is increasing, and the proportion of bus in the net is also increasing. The bus routing has become a key factor affecting the performance of the chip. In addition, the existing research does not distinguish between bus and non-bus in the complete global routing process, which directly leads to the expansion of bus deviation and the degradation of chip performance. In order to solve these problems, we propose a high-quality and efficient bus-aware global router, which includes the following key strategies: By introducing the routing density graph, we propose a routing model that can simultaneously consider the routability of non-bus and the deviation value of bus;A dynamic routing resource adjustment algorithm is proposed to optimize the bus deviation and wirelength simultaneously, which can effectively reduce the bus deviation;We propose a layer assignment algorithm consider deviation to significantly reduce the bus deviation of the 3D routing solution;And a depth-first search (DFS)-based algorithm is proposed to obtain multiple routing solutions, from which the routing result with the lowest deviation is selected. Experimental results show that the proposed algorithms can effectively reduce bus deviation compared with the existing algorithms, so as to obtain high-quality 2D and 3D routing solutions considering bus deviation.
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do...
详细信息
暂无评论