The EEG-based HTR utilizing AEP responses of both group of participants with normal hearing and abnormal hearing are managed with the objective of detecting hearing sensitivity level using Chebyshev Recurrence Polynom...
详细信息
The proliferation of Internet of Things(IoT)rapidly increases the possiblities of Simple Service Discovery Protocol(SSDP)reflection *** DDoS attack defence strategies deploy only to a certain type of devices in the at...
详细信息
The proliferation of Internet of Things(IoT)rapidly increases the possiblities of Simple Service Discovery Protocol(SSDP)reflection *** DDoS attack defence strategies deploy only to a certain type of devices in the attack chain,and need to detect attacks in advance,and the detection of DDoS attacks often uses heavy algorithms consuming lots of computing *** paper proposes a comprehensive DDoS attack defence approach which combines broad learning and a set of defence strategies against SSDP attacks,called Broad Learning based Comprehensive Defence(BLCD).The defence strategies work along the attack chain,starting from attack sources to *** defends against attacks without detecting attacks or identifying the roles of IoT devices in SSDP reflection *** also detects suspicious traffic at bots,service providers and victims by using broad learning,and the detection results are used as the basis for automatically deploying defence strategies which can significantly reduce DDoS *** evaluations,we thoroughly analyze attack traffic when deploying BLCD to different defence *** show that BLCD can reduce the number of packets received at the victim to 39 without affecting the standard SSDP service,and detect malicious packets with an accuracy of 99.99%.
Advancements in unmanned aerial vehicle (UAV) technology, along with indoor hybrid LiFi-WiFi networks (HLWN), promise the development of cost-effective, energy-efficient, adaptable, reliable, rapid, and on-demand HLWN...
详细信息
Lamellar directed self-assembly (DSA) technology in combination with the self-aligned via (SAV) process has emerged as a novel and promising choice for via/contact layer fabrication, where a via between Metal- x and M...
详细信息
The swimming turn or finishing presents an integral part of competitive swimming, and the time it takes by a swimmer to push off the wall is a significant factor in their ratings. Therefore, it is essential to have a ...
详细信息
In the realm of Internet of Vehicles (IoV), Roadside Units (RSUs) play a vital role due to their advanced sensing and computing capabilities. They support Mobile Edge Computing (MEC) by enabling real-time data process...
详细信息
Unmanned aerial vehicles (UAVs) play a vital role in calamity and natural disaster management due to their remote sensing capabilities. Specifically, UAVs/drones equipped with visual sensors can have remote access to ...
详细信息
Shadow extraction and elimination is essential for intelligent transportation systems(ITS)in vehicle tracking *** shadow is the source of error for vehicle detection,which causes misclassification of vehicles and a hi...
详细信息
Shadow extraction and elimination is essential for intelligent transportation systems(ITS)in vehicle tracking *** shadow is the source of error for vehicle detection,which causes misclassification of vehicles and a high false alarm rate in the research of vehicle counting,vehicle detection,vehicle tracking,and *** of the existing research is on shadow extraction of moving vehicles in high intensity and on standard datasets,but the process of extracting shadows from moving vehicles in low light of real scenes is *** real scenes of vehicles dataset are generated by self on the Vadodara–Mumbai highway during periods of poor illumination for shadow extraction of moving vehicles to address the above *** paper offers a robust shadow extraction of moving vehicles and its elimination for vehicle *** method is distributed into two phases:In the first phase,we extract foreground regions using a mixture of Gaussian model,and then in the second phase,with the help of the Gamma correction,intensity ratio,negative transformation,and a combination of Gaussian filters,we locate and remove the shadow region from the foreground *** to the outcomes proposed method with outcomes of an existing method,the suggested method achieves an average true negative rate of above 90%,a shadow detection rate SDR(η%),and a shadow discrimination rate SDR(ξ%)of 80%.Hence,the suggested method is more appropriate for moving shadow detection in real scenes.
Time-domain approaches have shown the potential to improve the performance of speaker verification, but still predominant approaches utilize hand-crafted features such as the mel filterbank energies. Although these fe...
详细信息
As speaker verification (SV) technology is applied to various fields with the development of deep learning, robustness against noise is becoming more prominent. A common approach for suppressing the noise effect is to...
详细信息
暂无评论