This study investigates enhancing airfoil grid generation's automation and computational efficiency in aerospace engineering using reinforcement learning and Graph Convolutional Networks (GCNs). Traditional grid g...
详细信息
Our research demonstrates a discrete speech system that empowers those afflicted with speech impairments to convey ideas by internally articulating words without producing audible sound. This method harnesses the mini...
详细信息
A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are con...
详细信息
A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc.
3D point cloud object tracking (3D PCOT) plays a vital role in applications such as autonomous driving and robotics. Adversarial attacks offer a promising approach to enhance the robustness and security of tracking mo...
详细信息
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing *** comp...
详细信息
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing *** computing has traditionally played an important role in establishing ***,fog computing has recently emerged as a new field complementing cloud computing due to its enhanced mobility,location awareness,heterogeneity,scalability,low latency,and geographic ***,IoT networks are vulnerable to unwanted assaults because of their open and shared *** a result,various fog computing-based security models that protect IoT networks have been developed.A distributed architecture based on an intrusion detection system(IDS)ensures that a dynamic,scalable IoT environment with the ability to disperse centralized tasks to local fog nodes and which successfully detects advanced malicious threats is *** this study,we examined the time-related aspects of network traffic *** presented an intrusion detection model based on a twolayered bidirectional long short-term memory(Bi-LSTM)with an attention mechanism for traffic data classification verified on the UNSW-NB15 benchmark *** showed that the suggested model outperformed numerous leading-edge Network IDS that used machine learning models in terms of accuracy,precision,recall and F1 score.
Smart contracts(SCs)are crucial in maintaining trust within blockchain ***,existing methods for analyzing SC vulnerabilities often lack accuracy and effectiveness,while approaches based on Deep Neural Networks(DNNs)st...
详细信息
Smart contracts(SCs)are crucial in maintaining trust within blockchain ***,existing methods for analyzing SC vulnerabilities often lack accuracy and effectiveness,while approaches based on Deep Neural Networks(DNNs)struggle with detecting complex vulnerabilities due to limited data *** paper proposes a novel approach for analyzing SC *** method leverages an advanced form of the Genetic Algorithm(GA)and includes the development of a comprehensive benchmark dataset consisting of 36,670 Solidity source code *** primary objective of our study is to profile vulnerable SCs *** achieve this goal,we have devised an analyzer called SCsVulLyzer based on GAs,designed explicitly for profiling ***,we have carefully curated a new dataset encompassing a wide range of examples,ensuring the practical validation of our ***,we have established three distinct taxonomies that cover SCs,profiling techniques,and feature *** taxonomies provide a systematic classification and analysis of information,improving the efficiency of our *** methodology underwent rigorous testing through experimentation,and the results demonstrated the superior capabilities of our model in detecting *** to traditional and DNN-based approaches,our approach achieved higher precision,recall,and F1-score,which are widely used metrics for evaluating model *** all these metrics,our model showed exceptional *** customization and adaptations we implemented within the GA significantly enhanced its *** approach detects SC vulnerabilities more efficiently and facilitates robust *** promising results highlight the potential of GA-based profiling to improve the detection of SC vulnerabilities,contributing to enhanced security in blockchain networks.
Accurate recognition of flight deck operations for carrier-based aircraft, based on operation trajectories, is critical for optimizing carrier-based aircraft performance. This recognition involves understanding short-...
详细信息
Accurate recognition of flight deck operations for carrier-based aircraft, based on operation trajectories, is critical for optimizing carrier-based aircraft performance. This recognition involves understanding short-term and long-term spatial collaborative relationships among support agents and positions from long spatial–temporal trajectories. While the existing methods excel at recognizing collaborative behaviors from short trajectories, they often struggle with long spatial–temporal trajectories. To address this challenge, this paper introduces a dynamic graph method to enhance flight deck operation recognition. First, spatial–temporal collaborative relationships are modeled as a dynamic graph. Second, a discretized and compressed method is proposed to assign values to the states of this dynamic graph. To extract features that represent diverse collaborative relationships among agents and account for the duration of these relationships, a biased random walk is then conducted. Subsequently, the Swin Transformer is employed to comprehend spatial–temporal collaborative relationships, and a fully connected layer is applied to deck operation recognition. Finally, to address the scarcity of real datasets, a simulation pipeline is introduced to generate deck operations in virtual flight deck scenarios. Experimental results on the simulation dataset demonstrate the superior performance of the proposed method.
Image copy-move forgery detection (CMFD) has become a challenging problem due to increasingly powerful editing software that makes forged images increasingly realistic. Existing algorithms that directly connect multip...
详细信息
On July 18, 2021, the PKU-DAIR Lab1)(Data and Intelligence Research Lab at Peking University) openly released the source code of Hetu, a highly efficient and easy-to-use distributed deep learning(DL) framework. Hetu i...
On July 18, 2021, the PKU-DAIR Lab1)(Data and Intelligence Research Lab at Peking University) openly released the source code of Hetu, a highly efficient and easy-to-use distributed deep learning(DL) framework. Hetu is the first distributed DL system developed by academic groups in Chinese universities, and takes into account both high availability in industry and innovation in academia. Through independent research and development, Hetu is completely decoupled from the existing DL systems and has unique characteristics. The public release of the Hetu system will help researchers and practitioners to carry out frontier MLSys(machine learning system) research and promote innovation and industrial upgrading.
With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,whic...
详细信息
With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,which makes task assignment inefficient due to insufficient *** this paper,an Intelligent and Trustworthy task assignment method based on Trust and Social relations(ITTS)is proposed for scenarios with many tasks and few ***,ITTS first makes initial assignments based on trust and social influences,thereby transforming the complex large-scale industrial task assignment of the platform into the small-scale task assignment for each ***,an intelligent Q-decision mechanism based on workers'social relation is proposed,which adopts the first-exploration-then-utilization principle to allocate *** when a worker cannot cope with the assigned tasks,it initiates dynamic worker recruitment,thus effectively solving the worker shortage problem as well as the cold start *** importantly,we consider trust and security issues,and evaluate the trust and social circles of workers by accumulating task feedback,to provide the platform a reference for worker recruitment,thereby creating a high-quality worker ***,extensive simulations demonstrate ITTS outperforms two benchmark methods by increasing task completion rates by 56.49%-61.53%and profit by 42.34%-47.19%.
暂无评论