In this work, we propose a method for tracking multiple extended targets or unresolvable group targets in clutter environment. Firstly, based on the Random Matrix Model (RMM), the joint state of the target is modeled ...
详细信息
Ultrasonic waves provide an effective means of transmitting information through solid media, such as metal pipes and bars. However, the complex geometry of these materials causes reverberations that degrade the qualit...
详细信息
ISBN:
(数字)9798350371901
ISBN:
(纸本)9798350371918
Ultrasonic waves provide an effective means of transmitting information through solid media, such as metal pipes and bars. However, the complex geometry of these materials causes reverberations that degrade the quality of communication. In this paper, we propose denoising approaches using time reversal and inverse filtering methods for blind deconvolution. These methods enable significant improvements in signal-to-noise ratio (SNR), with the inverse filter demonstrating superior performance in both simulated and real-world scenarios. Our results show that this approach provides a robust solution for improving ultrasonic communication in complex solid channels.
Because of rapid growth of multimedia data over the Internet, the infobesity has been emerging in recent years. Many recommender systems (RSs) have been proposed using a variety of techniques, including artificial int...
详细信息
This paper presents the current use of the Internet of Things (IoT) in fire evacuation and extinction. It examines the different approaches to the problem and technologies like Building Information Modeling (BIM) and ...
This paper presents the current use of the Internet of Things (IoT) in fire evacuation and extinction. It examines the different approaches to the problem and technologies like Building Information Modeling (BIM) and mathematical algorithms that can be used to determine the optimal evacuation route. It also evaluates existing fire security solutions such as smoke, flame, motion, and gas sensors, LED lights, buzzers, and SMS modules. Entities that specialize in Residential and Commercial Security Systems and Home Automation are also discussed, along with the services they offer. The main objective of this study is to understand current systems and resources regarding fire evacuation and extinction systems and to analyze different developments in smart buildings to create an efficient system for fire detection and evacuation.
In this work, we develop a multipath-based simultaneous localization and mapping (SLAM) method that can directly be applied to received radio signals. In existing multipath-based SLAM approaches, a channel estimator i...
In this work, we develop a multipath-based simultaneous localization and mapping (SLAM) method that can directly be applied to received radio signals. In existing multipath-based SLAM approaches, a channel estimator is used as a preprocessing stage that reduces data flow and computational complexity by extracting features related to multipath components (MPCs). We aim to avoid any preprocessing stage that may lead to a loss of relevant information. The presented method relies on a new statistical model for the data generation process of the received radio signal that can be represented by a factor graph. This factor graph is the starting point for the development of an efficient belief propagation (BP) method for multipath-based SLAM that directly uses received radio signals as measurements. Simulation results in a realistic scenario with a single-input single-output (SISO) channel demonstrate that the proposed direct method for radio-based SLAM outperforms state-of-the-art methods that rely on a channel estimator.
The new era of technology is being greatly influenced by the field of artificial intelligence. computer vision and deep learning have become increasingly important due to their ability to process vast amounts of data ...
The new era of technology is being greatly influenced by the field of artificial intelligence. computer vision and deep learning have become increasingly important due to their ability to process vast amounts of data and provide insights and solutions in a variety of fields. computer vision, deep learning and signal analysis have been used in a growing number of applications and services including smart devices, image, and speech recognition, healthcare, etc., one such device is an infant monitoring system. It monitors the daily activities of the infant such as their sleeping patterns, sounds, and movements. In this paper, deep learning and computer vision libraries were used to develop algorithms to detect whether the infant was in any uncomfortable situation such as sleeping on its back, face being covered and whether the infant was awake. The smart infant monitoring system detects the infant's unsafe resting situation in real time and sent immediate alerts to the caretaker's device. This paper presents the design flow of a smart infant monitoring system consisting of a night vision camera, a Jetson Nano, and a Wi-Fi internet connection. The pose estimation and awake detection algorithms were developed and tested successfully for different infant resting/sleeping situations. The smart infant monitoring system provides significant benefits for safety and an improved understanding of infants' sleep patterns and behavior.
This research proposes a system that leverages stereo vision and monocular depth estimation to form a depth map from which a 3D point cloud scene is extracted. The emergence of competitive neural networks for depth ma...
详细信息
computer vision has proven itself capable of accurately detecting and classifying objects within images. This also works in cases where images are used as a way of representing data, without being actual photographs. ...
computer vision has proven itself capable of accurately detecting and classifying objects within images. This also works in cases where images are used as a way of representing data, without being actual photographs. In cybersecurity, computer vision is rarely used, however it has been used to detect botnets successfully. We applied computer vision to determine how well it would be able to detect and classify a large number of attacks and determined that it would be able to run at a decent rate on a Jetson Nano. This was accomplished by training a convolutional neural network using data publicly available in the IoT-23 database, which contains packet captures of IoT devices with and without different malware infections. The neural network was evaluated on an RTX 3050 and a Jetson Nano to see if it could be used in IoT.
This paper presents a real-time prototype system for monitoring the distraction levels of the driver. Due to the nature of high traffic conditions commonly seen nowadays, accidents are highly likely to occur as driver...
This paper presents a real-time prototype system for monitoring the distraction levels of the driver. Due to the nature of high traffic conditions commonly seen nowadays, accidents are highly likely to occur as drivers cannot always recognize their exhaustion levels themselves. We utilize a single low-cost camera facing the driver connected to a single-board computer; a series of frame captures from the camera are fed to a neural network, and a pattern detection algorithm to predict the driver's distraction level is utilized. All training is conducted under personalized training sets to increase accuracy and to match an individual's driving patterns as accurately as possible. This system is designed to serve as a baseline for further system development, and many vital sub-components can be changed regarding input data type and choices of machine learning algorithms.
Hands-on learning environments and cyber ranges are popular tools in cybersecurity education. These resources provide students with practical assessments to strengthen their abilities and can assist in transferring ma...
Hands-on learning environments and cyber ranges are popular tools in cybersecurity education. These resources provide students with practical assessments to strengthen their abilities and can assist in transferring material from the classroom to real-world scenarios. Additionally, virtualization environments, such as Proxmox, provide scalability and network flexibility that can be adapted to newly discovered threats. However, due to the increasing demand for cybersecurity skills and experience, learning environments must support an even greater number of students each term. Manual provisioning and management of environments for large student populations can consume valuable time for the instructor. To address this challenge, we developed an Environment Provisioning and Management Tool for cybersecurity education. Our solution interacts with the exposed Proxmox API to automate the process of user creation, server provisioning, and server destruction for a large set of users. Remote access will be managed by a pfSense firewall. Based on our testing, a six-machine user environment could be provisioned in 14.96 seconds and destroyed in 15.06 seconds.
暂无评论