Evaluation system of small arms firing has an important effect in the context of military domain. A partially automated evaluation system has been conducted and performed at the ground level. Automation of such system...
详细信息
Evaluation system of small arms firing has an important effect in the context of military domain. A partially automated evaluation system has been conducted and performed at the ground level. Automation of such system with the inclusion of artificial intelligence is a much required process. This papers puts focus on designing and developing an AI-based small arms firing evaluation systems in the context of military environment. Initially image processing techniques are used to calculate the target firing score. Additionally, firing errors during the shooting have also been detected using a machine learning algorithm. However, consistency in firing requires an abundance of practice and updated analysis of the previous results. Accuracy and precision are the basic requirements of a good shooter. To test the shooting skill of combatants, firing practices are held by the military personnel at frequent intervals that include 'grouping' and 'shoot to hit' scores. Shortage of skilled personnel and lack of personal interest leads to an inefficient evaluation of the firing standard of a firer. This paper introduces a system that will automatically be able to fetch the target data and evaluate the standard based on the fuzzy *** it will be able to predict the shooter performance based on linear regression ***, it compares with recognized patterns to analyze the individual expertise and suggest improvements based on previous values. The paper is developed on a Small Arms Firing Skill Evaluation System, which makes the whole process of firing and target evaluation faster with better accuracy. The experiment has been conducted on real-time scenarios considering the military field and shows a promising result to evaluate the system automatically.
In the realm of deep learning, Generative Adversarial Networks (GANs) have emerged as a topic of significant interest for their potential to enhance model performance and enable effective data augmentation. This paper...
详细信息
Lung cancer is a prevalent and deadly disease worldwide, necessitating accurate and timely detection methods for effective treatment. Deep learning-based approaches have emerged as promising solutions for automated me...
详细信息
Biosignal representation learning (BRL) plays a crucial role in emotion recognition for game users (ERGU). Unsupervised BRL has garnered attention considering the difficulty in obtaining ground truth emotion labels fr...
详细信息
Biosignal representation learning (BRL) plays a crucial role in emotion recognition for game users (ERGU). Unsupervised BRL has garnered attention considering the difficulty in obtaining ground truth emotion labels from game users. However, unsupervised BRL in ERGU faces challenges, including overfitting caused by limited data and performance degradation due to unbalanced sample distributions. Faced with the above challenges, we propose a novel method of biosignal contrastive representation learning (BCRL) for ERGU, which not only serves as a unified representation learning approach applicable to various modalities of biosignals but also derives generalized biosignals representations suitable for different downstream tasks. Specifically, we solve the overfitting by introducing perturbations at the embedding layer based on the projected gradient descent (PGD) adversarial attacks and develop the sample balancing strategy (SBS) to mitigate the negative impact of the unbalanced sample on the performance. Further, we have conducted comprehensive validation experiments on the public dataset, yielding the following key observations: 1) BCRL outperforms all other methods, achieving average accuracies of 76.67%, 71.83%, and 63.58% in 1D-2C Valence, 1D-2C Arousal and 2D-4C Valence/Arousal, respectively;2) The ablation study shows that both the PGD module (+7.58% in accuracy on average) and the SBS module (+14.60% in accuracy on average) have a positive effect on the performance of different classifications;3) BCRL model exhibits the certain generalization ability across the different games, subjects and classifiers. IEEE
With the advent of cloud computing, many organizations, institutions, and individuals have chosen to store their data in the cloud as a way to compensate for limited local storage capabilities and reduce expenses. How...
详细信息
Federated Adversarial Learning (FAL) maintains the decentralization of adversarial training for data-driven innovations while allowing the collaborative training of a common model to protect privacy facilities. Before...
详细信息
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** the...
详细信息
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at *** have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in *** we propose a lightweight authentication protocol to provide proper access to such *** have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,*** define the architecture we used a three-layered model consisting of cloud,fog,and edge *** have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and *** also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human *** find that our protocol works the fastest when using ring learning with *** prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications *** conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment.
Accurate monitoring of urban waterlogging contributes to the city’s normal operation and the safety of residents’daily ***,due to feedback delays or high costs,existing methods make large-scale,fine-grained waterlog...
详细信息
Accurate monitoring of urban waterlogging contributes to the city’s normal operation and the safety of residents’daily ***,due to feedback delays or high costs,existing methods make large-scale,fine-grained waterlogging monitoring impossible.A common method is to forecast the city’s global waterlogging status using its partial waterlogging *** method has two challenges:first,existing predictive algorithms are either driven by knowledge or data alone;and second,the partial waterlogging data is not collected selectively,resulting in poor *** overcome the aforementioned challenges,this paper proposes a framework for large-scale and fine-grained spatiotemporal waterlogging monitoring based on the opportunistic sensing of limited bus *** framework follows the Sparse Crowdsensing and mainly comprises a pair of iterative predictor and *** predictor uses the collected waterlogging status and the predicted status of the uncollected area to train the graph convolutional neural *** combines both knowledge-driven and data-driven approaches and can be used to forecast waterlogging status in all regions for the upcoming *** selector consists of a two-stage selection procedure that can select valuable bus routes while satisfying budget *** experimental results on real waterlogging and bus routes in Shenzhen show that the proposed framework could easily perform urban waterlogging monitoring with low cost,high accuracy,wide coverage,and fine granularity.
Internet of Things (IoT) devices are often directly authenticated by the gateways within the network. In complex and large systems, IoT devices may be connected to the gateway through another device in the network. In...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
暂无评论