As the device complexity keeps increasing,the blockchain networks have been celebrated as the cornerstone of numerous prominent platforms owing to their ability to provide distributed and immutable ledgers and data-dr...
详细信息
As the device complexity keeps increasing,the blockchain networks have been celebrated as the cornerstone of numerous prominent platforms owing to their ability to provide distributed and immutable ledgers and data-driven autonomous *** distributed consensus algorithm is the core component that directly dictates the performance and properties of blockchain ***,the inherent characteristics of the shared wireless medium,such as fading,interference,and openness,pose significant challenges to achieving consensus within these networks,especially in the presence of malicious jamming *** cope with the severe consensus problem,in this paper,we present a distributed jamming-resilient consensus algorithm for blockchain networks in wireless environments,where the adversary can jam the communication channel by injecting jamming *** on a non-binary slight jamming model,we propose a distributed four-stage algorithm to achieve consensus in the wireless blockchain network,including leader election,leader broadcast,leader aggregation,and leader announcement *** high probability,we prove that our jamming-resilient algorithm can ensure the validity,agreement,termination,and total order properties of consensus with the time complexity of O(n).Both theoretical analyses and empirical simulations are conducted to verify the consistency and efficiency of our algorithm.
Cardiovascular disease remains a major issue for mortality and morbidity, making accurate classification crucial. This paper introduces a novel heart disease classification model utilizing Electrocardiogram (ECG) sign...
详细信息
X-ray security inspection for detecting prohibited items is widely used to maintain social order and ensure the safety of people’s lives and property. Due to the large number of parameters and high computational comp...
详细信息
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing huma...
详细信息
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing human users from automated ***-based CAPTCHAs,designed to be easily decipherable by humans yet challenging for machines,are a common form of this ***,advancements in deep learning have facilitated the creation of models adept at recognizing these text-based CAPTCHAs with surprising *** our comprehensive investigation into CAPTCHA recognition,we have tailored the renowned UpDown image captioning model specifically for this *** approach innovatively combines an encoder to extract both global and local features,significantly boosting the model’s capability to identify complex details within CAPTCHA *** the decoding phase,we have adopted a refined attention mechanism,integrating enhanced visual attention with dual layers of Long Short-Term Memory(LSTM)networks to elevate CAPTCHA recognition *** rigorous testing across four varied datasets,including those from Weibo,BoC,Gregwar,and Captcha 0.3,demonstrates the versatility and effectiveness of our *** results not only highlight the efficiency of our approach but also offer profound insights into its applicability across different CAPTCHA types,contributing to a deeper understanding of CAPTCHA recognition technology.
Software trustworthiness is an essential criterion for evaluating software quality. In componentbased software, different components play different roles and different users give different grades of trustworthiness af...
详细信息
Software trustworthiness is an essential criterion for evaluating software quality. In componentbased software, different components play different roles and different users give different grades of trustworthiness after using the software. The two elements will both affect the trustworthiness of software. When the software quality is evaluated comprehensively, it is necessary to consider the weight of component and user feedback. According to different construction of components, the different trustworthiness measurement models are established based on the weight of components and user feedback. Algorithms of these trustworthiness measurement models are designed in order to obtain the corresponding trustworthiness measurement value automatically. The feasibility of these trustworthiness measurement models is demonstrated by a train ticket purchase system.
The evolution of the electrical grid from its early centralized structure to today’s advanced "smart grid" reflects significant technological progress. Early grids, designed for simple power delivery from l...
详细信息
The evolution of the electrical grid from its early centralized structure to today’s advanced "smart grid" reflects significant technological progress. Early grids, designed for simple power delivery from large plants to consumers, faced challenges in efficiency, reliability, and scalability. Over time, the grid has transformed into a decentralized network driven by innovative technologies, particularly artificial intelligence (AI). AI has become instrumental in enhancing efficiency, security, and resilience by enabling real-time data analysis, predictive maintenance, demand-response optimization, and automated fault detection, thereby improving overall operational efficiency. This paper examines the evolution of the electrical grid, tracing its transition from early limitations to the methodologies adopted in present smart grids for addressing those challenges. Current smart grids leverage AI to optimize energy management, predict faults, and seamlessly integrate electric vehicles (EVs), reducing transmission losses and improving performance. However, these advancements are not without limitations. Present grids remain vulnerable to cyberattacks, necessitating the adoption of more robust methodologies and advanced technologies for future grids. Looking forward, emerging technologies such as Digital Twin (DT) models, the Internet of Energy (IoE), and decentralized grid management are set to redefine grid architectures. These advanced technologies enable real-time simulations, adaptive control, and enhanced human–machine collaboration, supporting dynamic energy distribution and proactive risk management. Integrating AI with advanced energy storage, renewable resources, and adaptive access control mechanisms will ensure future grids are resilient, sustainable, and responsive to growing energy demands. This study emphasizes AI’s transformative role in addressing the challenges of the early grid, enhancing the capabilities of the present smart grid, and shaping a secure
Multi-image steganography refers to a data-hiding scheme where a user tries to hide confidential messages within multiple images. Different from the traditional steganography which only requires the security of an ind...
详细信息
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information ***,these approaches have some *** example,a cover image lacks self-adaptability,inform...
详细信息
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information ***,these approaches have some *** example,a cover image lacks self-adaptability,information leakage,or weak *** address these issues,this study proposes a universal and adaptable image-hiding ***,a domain attention mechanism is designed by combining the Atrous convolution,which makes better use of the relationship between the secret image domain and the cover image ***,to improve perceived human similarity,perceptual loss is incorporated into the training *** experimental results are promising,with the proposed method achieving an average pixel discrepancy(APD)of 1.83 and a peak signal-to-noise ratio(PSNR)value of 40.72 dB between the cover and stego images,indicative of its high-quality ***,the structural similarity index measure(SSIM)reaches 0.985 while the learned perceptual image patch similarity(LPIPS)remarkably registers at ***,self-testing and cross-experiments demonstrate the model’s adaptability and generalization in unknown hidden spaces,making it suitable for diverse computer vision tasks.
Fine-grained visual parsing, including fine-grained part segmentation and fine-grained object recognition, has attracted considerable critical attention due to its importance in many real-world applications, e.g., agr...
详细信息
Fine-grained visual parsing, including fine-grained part segmentation and fine-grained object recognition, has attracted considerable critical attention due to its importance in many real-world applications, e.g., agriculture, remote sensing, and space technologies. Predominant research efforts tackle these fine-grained sub-tasks following different paradigms, while the inherent relations between these tasks are neglected. Moreover, given most of the research remains fragmented, we conduct an in-depth study of the advanced work from a new perspective of learning the part relationship. In this perspective, we first consolidate recent research and benchmark syntheses with new taxonomies. Based on this consolidation, we revisit the universal challenges in fine-grained part segmentation and recognition tasks and propose new solutions by part relationship learning for these important challenges. Furthermore, we conclude several promising lines of research in fine-grained visual parsing for future research.
Solar cell defect detection is crucial for quality inspection in photovoltaic power generation *** the production process,defect samples occur infrequently and exhibit random shapes and sizes,which makes it challengin...
详细信息
Solar cell defect detection is crucial for quality inspection in photovoltaic power generation *** the production process,defect samples occur infrequently and exhibit random shapes and sizes,which makes it challenging to collect defective ***,the complex surface background of polysilicon cell wafers complicates the accurate identification and localization of defective *** paper proposes a novel Lightweight Multiscale Feature Fusion network(LMFF)to address these *** network comprises a feature extraction network,a multi-scale feature fusion module(MFF),and a segmentation ***,a feature extraction network is proposed to obtain multi-scale feature outputs,and a multi-scale feature fusion module(MFF)is used to fuse multi-scale feature information *** order to capture finer-grained multi-scale information from the fusion features,we propose a multi-scale attention module(MSA)in the segmentation network to enhance the network’s ability for small target ***,depthwise separable convolutions are introduced to construct depthwise separable residual blocks(DSR)to reduce the model’s parameter ***,to validate the proposed method’s defect segmentation and localization performance,we constructed three solar cell defect detection datasets:SolarCells,SolarCells-S,and *** and SolarCells-S are monocrystalline silicon datasets,and PVEL-S is a polycrystalline silicon *** results show that the IOU of our method on these three datasets can reach 68.5%,51.0%,and 92.7%,respectively,and the F1-Score can reach 81.3%,67.5%,and 96.2%,respectively,which surpasses other commonly usedmethods and verifies the effectiveness of our LMFF network.
暂无评论