Insights derived out of image captioning systems have potential applications in real life, including providing auditory assistance for the visually impaired. This paper proposes TransEffiVisNet, a novel image captioni...
详细信息
Label distribution learning(LDL) has shown advantages over traditional single-label learning(SLL) in many realworld applications, but its superiority has not been theoretically understood. In this paper, we attempt to...
详细信息
Label distribution learning(LDL) has shown advantages over traditional single-label learning(SLL) in many realworld applications, but its superiority has not been theoretically understood. In this paper, we attempt to explain why LDL generalizes better than SLL. Label distribution has rich supervision information such that an LDL method can still choose the sub-optimal label from label distribution even if it neglects the optimal one. In comparison, an SLL method has no information to choose from when it fails to predict the optimal label. The better generalization of LDL can be credited to the rich information of label distribution. We further establish the label distribution margin theory to prove this explanation; inspired by the theory,we put forward a novel LDL approach called LDL-LDML. In the experiments, the LDL baselines outperform the SLL ones, and LDL-LDML achieves competitive performance against existing LDL methods, which support our explanation and theories in this paper.
Unmanned aerial vehicles(UAVs) with limited energy resources, severe path loss, and shadowing to the ground base stations are vulnerable to smart jammers that aim to degrade the UAV communication performance and exhau...
详细信息
Unmanned aerial vehicles(UAVs) with limited energy resources, severe path loss, and shadowing to the ground base stations are vulnerable to smart jammers that aim to degrade the UAV communication performance and exhaust the UAV energy. The UAV anti-jamming communication performance, such as the outage probability, degrades if the robot relay is not aware of the jamming policies and the UAV network topology. In this paper, we propose a robot relay scheme for UAVs against smart jamming, which combines reinforcement learning with a function approximation approach named tile coding, to jointly optimize the robot moving distance and relay power with the unknown jamming channel states and locations. The robot mobility and relay policy are chosen based on the received jamming power, the robot received signal quality,location and energy consumption, and the bit error rate of the UAV messages. We also present a deep reinforcement learning version for the robot with sufficient computing resources. It uses three deep neural networks to choose the robot mobility and relay policy with reduced sample complexity, so as to avoid exploring dangerous policies that lead to the high outage probability of the UAV messages. The network architecture of the three networks is designed with fully connected layers instead of convolutional layers to reduce the computational complexity, which is analyzed by theoretical analyses. We provide the performance bound of the proposed schemes in terms of the bit error rate, robot energy consumption and utility based on a game-theoretic study. Simulation results show that the performance of our proposed relay schemes,including the bit error rate, the outage probability, and the robot energy consumption outperforms the existing schemes.
The facial recognition attendance system represents a modern approach to attendance tracking, designed to improve efficiency, accuracy, and security in various organizational settings. Advanced biometric technologies ...
详细信息
In this paper, we construct an efficient decoupling-type strategy for solving the Allen-Cahn equation on curved surfaces. It is based on an FEM-EIEQ(Finite Element Method and explicit-Invariant Energy Quadratization) ...
详细信息
In this paper, we construct an efficient decoupling-type strategy for solving the Allen-Cahn equation on curved surfaces. It is based on an FEM-EIEQ(Finite Element Method and explicit-Invariant Energy Quadratization) fully discrete scheme with unconditional energy stability. Spatially the FEM is adopted, using a triangular mesh discretization strategy that can be adapted to complex regions. Temporally, the EIEQ approach is considered, which not only linearizes the nonlinear potential but also gives a new variable that we combine with the nonlocal splitting method to achieve the fully decoupled computation. The strategy can successfully transform the Allen-Cahn system into some completely independent algebraic equations and linear elliptic equations with constant coefficients, we only need to solve these simple equations at each time step. Moreover, we conducted some numerical experiments to demonstrate the effectiveness of the strategy.
This paper investigates the consensus control of multi-agent systems(MASs) with constrained input using the dynamic event-triggered mechanism(ETM).Consider the MASs with small-scale networks where a centralized dynami...
详细信息
This paper investigates the consensus control of multi-agent systems(MASs) with constrained input using the dynamic event-triggered mechanism(ETM).Consider the MASs with small-scale networks where a centralized dynamic ETM with global information of the MASs is first ***,a distributed dynamic ETM which only uses local information is developed for the MASs with large-scale *** is shown that the semi-global consensus of the MASs can be achieved by the designed bounded control protocol where the Zeno phenomenon is eliminated by a designable minimum inter-event *** addition,it is easier to find a trade-off between the convergence rate and the minimum inter-event time by an adjustable ***,the results are extended to regional consensus of the MASs with the bounded control *** simulations show the effectiveness of the proposed approach.
Along with the progression of Internet of Things(IoT)technology,network terminals are becoming continuously more *** has been widely applied in various scenarios,including urban infrastructure,transportation,industry,...
详细信息
Along with the progression of Internet of Things(IoT)technology,network terminals are becoming continuously more *** has been widely applied in various scenarios,including urban infrastructure,transportation,industry,personal life,and other socio-economic *** introduction of deep learning has brought new security challenges,like an increment in abnormal traffic,which threatens network *** feature extraction leads to less accurate classification *** abnormal traffic detection,the data of network traffic is high-dimensional and *** data not only increases the computational burden of model training but also makes information extraction more *** address these issues,this paper proposes an MD-MRD-ResNeXt model for abnormal network traffic *** fully utilize the multi-scale information in network traffic,a Multi-scale Dilated feature extraction(MD)block is *** module can effectively understand and process information at various scales and uses dilated convolution technology to significantly broaden the model’s receptive *** proposed Max-feature-map Residual with Dual-channel pooling(MRD)block integrates the maximum feature map with the residual *** module ensures the model focuses on key information,thereby optimizing computational efficiency and reducing unnecessary information *** results show that compared to the latest methods,the proposed abnormal traffic detection model improves accuracy by about 2%.
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids i...
详细信息
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids in the identification and detection of malicious attacks that impair the network’s regular *** machine learning and deep learning methodologies are used for this purpose in the conventional works to ensure increased security of ***,it still has significant flaws,including increased algorithmic complexity,lower system performance,and a higher rate of ***,the goal of this paper is to create an intelligent IDS framework for significantly enhancing MANET security through the use of deep learning ***,the min-max normalization model is applied to preprocess the given cyber-attack datasets for normalizing the attributes or fields,which increases the overall intrusion detection performance of ***,a novel Adaptive Marine Predator Optimization Algorithm(AOMA)is implemented to choose the optimal features for improving the speed and intrusion detection performance of ***,the Deep Supervise Learning Classification(DSLC)mechanism is utilized to predict and categorize the type of intrusion based on proper learning and training *** evaluation,the performance and results of the proposed AOMA-DSLC based IDS methodology is validated and compared using various performance measures and benchmarking datasets.
The Gannet Optimization Algorithm (GOA) and the Whale Optimization Algorithm (WOA) demonstrate strong performance;however, there remains room for improvement in convergence and practical applications. This study intro...
详细信息
The Gannet Optimization Algorithm (GOA) and the Whale Optimization Algorithm (WOA) demonstrate strong performance;however, there remains room for improvement in convergence and practical applications. This study introduces a hybrid optimization algorithm, named the adaptive inertia weight whale optimization algorithm and gannet optimization algorithm (AIWGOA), which addresses challenges in enhancing handwritten documents. The hybrid strategy integrates the strengths of both algorithms, significantly enhancing their capabilities, whereas the adaptive parameter strategy mitigates the need for manual parameter setting. By amalgamating the hybrid strategy and parameter-adaptive approach, the Gannet Optimization Algorithm was refined to yield the AIWGOA. Through a performance analysis of the CEC2013 benchmark, the AIWGOA demonstrates notable advantages across various metrics. Subsequently, an evaluation index was employed to assess the enhanced handwritten documents and images, affirming the superior practical application of the AIWGOA compared with other algorithms.
Crop weed segmentation is one of the most challenging tasks in the field of computer vision. This is because, unlike other object detection or segmentation tasks, crop and weed are similar in terms of spectral feature...
详细信息
暂无评论