Testing autonomous vehicles (AVs) under various environmental scenarios that lead the vehicles to unsafe situations is known to be challenging. Given the infinite possible environmental scenarios, it is essential to f...
详细信息
作者:
Wang, MuyuZhao, SanyuanDong, XingpingShen, JianbingWuhan University
School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan430072 China Beijing Institute of Technology
School of Computer Science Beijing China University of Macau
State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science China
In this paper, we propose a novel rendering framework based on neural radiance fields (NeRF) named HH-NeRF that can generate high-resolution audio-driven talking portrait videos with high fidelity and fast rendering. ...
详细信息
In this article, we describe a grid of sensors to collect patients' vital data and to allow real time monitoring of patients in heath-care centres. We analyse the problem scenario and identify the components invol...
详细信息
In this article, we describe a grid of sensors to collect patients' vital data and to allow real time monitoring of patients in heath-care centres. We analyse the problem scenario and identify the components involved towards the construction of an integrated and homogeneous management system. Finally, we present a case study to demonstrate the applicability of our approach
This paper attempts to identify the reliability assessment in terms of data aggregation in wireless sensor networks. With the sensor nodes' Bayesian lifetime model, the fault ratio of sensing data among a pair of ...
详细信息
This paper attempts to identify the reliability assessment in terms of data aggregation in wireless sensor networks. With the sensor nodes' Bayesian lifetime model, the fault ratio of sensing data among a pair of nodes in the worst case is derived. Leveraging the property of exponential aggregation latency distribution, the optimizing strategy, namely fault-tolerant scheduling for aggregation (FTSA) is proposed. Quantitative analysis of the task scheduling is also presented, which is used for reducing the latency of data aggregation. Moreover, the sensor fault probability and aggregation latency are initially introduced into the data collection scheduling process, and it mathematically shows that the fused local estimate can obtain a global estimation with the reliable data acquisition framework. Performance evaluations of the proposed approach with both sensor node faults and scheduling policy are carried out. These results show that the proposed approach outperforms the earlier algorithms in terms of latency designed without regard to sensor faults.
Visual inspection of dual-energy X-ray radiographic images of cabin baggage requires high performance, but is hindered by various challenges such as low target prevalence, variability in target visibility, possible pr...
详细信息
This paper investigates distributed circle formation problems of multi-agent systems (MAS) subject to limited information communication under a class of weight-unbalanced directed graphs, in which the communication to...
详细信息
This paper investigates distributed circle formation problems of multi-agent systems (MAS) subject to limited information communication under a class of weight-unbalanced directed graphs, in which the communication topology contains a directed spanning tree and each agent can only perceive the distances from itself to the nearest neighbor in counterclockwise direction as well as the counterpart in the clockwise direction. Towards this end, a novel algorithm combined with an encoder-decoder framework has been proposed. We show that, under the proposed policy, the resulting network executions can drive the states of all mobile agents to converge to some expected equilibrium point. Numerical simulation results have been given to demonstrate the effectiveness of the proposed algorithm.
Security is critical to cloud services, this paper introduces a design of firewall, which based on IDS's feedback t change rules in order to detect attack flexible. It combines firewall and Intrusion Detection Sys...
详细信息
ISBN:
(数字)9781728109626
ISBN:
(纸本)9781728109633
Security is critical to cloud services, this paper introduces a design of firewall, which based on IDS's feedback t change rules in order to detect attack flexible. It combines firewall and Intrusion Detection systems (IDS) by using Intrusion Detection systems, which detects ICMP, TCP, UDP attacks. Usually, a cloud service is a service built on a virtual machine. The virtual device is virtualized to achieve the purpose of multiplexing. Therefore, if you want to implement cloud security detection, you can listen to the physical device's network card. There are two types of Intrusion Detection System, one is host-based intrusion detection system (HIDS) and another is network intrusion detection system (NIDS). What's more, in order to highlight the importance of the firewall, the IDS monitoring data is analyzed and added to the firewall's defense strategy automatically. Finally, we measure the effectiveness of the system by False Negative (FN) and False Positive (FP), and verify that feedback plays a crucial role in improving the effectiveness of the system, improving the efficiency of the entire system filtering attacks.
Summary form only given. Many organizations are attracted to cloud computing as an ICT (information and communications technology) sourcing model that can improve flexibility and total cost of ICT systems. However, it...
详细信息
Summary form only given. Many organizations are attracted to cloud computing as an ICT (information and communications technology) sourcing model that can improve flexibility and total cost of ICT systems. However, it can be difficult for a prospective cloud customer to determine and manage cloud usage costs. We present an overview of several NICTA research projects that aim at providing information that can help ICT professionals determine various cloud usage costs and make decisions that are appropriate from the business viewpoint. Before migrating an application into a cloud, it is necessary to choose to which cloud to migrate, because there is a huge variety of cloud offerings, with significantly different pricing models. To accurately capture projected operating costs of an application in a particular cloud and enable side-by-side comparison of cloud offerings from different providers, NICTA developed a cost estimation tool that calculates the costs based on usage patterns and other characteristics of the application. This tool can also be used during runtime as an input into making adaptation/control decisions. To collect various runtime metrics (e.g., about the amount of transferred data or received quality of service - QoS) that are necessary for operational management and assessment of cloud usage costs, NICTA developed an innovative tool for flexible and integrated monitoring of applications in clouds and (in case of hybrid clouds) related local data centers. To help determine which runtime adaptation/control decisions are best from the business viewpoint (e.g., incur lowest cost), we extended the WS-Policy4MASC language and MiniZnMASC middleware for autonomic business-driven IT management with events and adaptation actions relevant for cloud management. The tools from the presented projects can be used separately or as parts of a powerful integrated cloud management system (which contains several additional tools).
Predicting how pedestrians will move is a valuable and challenging task. It can be applied to various domains, such as crowd evacuation and autonomous driving. However, in practice, scene information and pedestrian in...
详细信息
ISBN:
(数字)9798350356670
ISBN:
(纸本)9798350356687
Predicting how pedestrians will move is a valuable and challenging task. It can be applied to various domains, such as crowd evacuation and autonomous driving. However, in practice, scene information and pedestrian interaction make it difficult to accurately predict pedestrian trajectories. Therefore, more effective processing of information affecting pedestrian trajectories is particularly important. Extraction of pedestrian motion features is insufficient in current research in this area. To address this problem, a neural network trajectory prediction method, PMC-CNN, is proposed. This method incorporates pedestrian motion features and stores the heterogeneous information required for prediction within a knowledge graph. Furthermore, it combines this information with the proposed IN-EX pedestrian motion model, resulting in an improvement in prediction accuracy. In addition, this research applies the prediction framework to a crowd evacuation scenario to improve the efficiency of crowd evacuation. This verifies the effectiveness and practicality of our proposed model.
暂无评论