Thefinite-time Lyapunov exponent(FTLE)is widely used for understanding the Lagrangian behavior of unsteadyfl*** FTLEfield contains many importantfine-level structures(e.g.,Lagrangian coherent structures).These structur...
详细信息
Thefinite-time Lyapunov exponent(FTLE)is widely used for understanding the Lagrangian behavior of unsteadyfl*** FTLEfield contains many importantfine-level structures(e.g.,Lagrangian coherent structures).These structures are often thin in depth,requiring Monte Carlo rendering for unbiased ***,Monte Carlo rendering requires hundreds of billions of samples for a high-resolution FTLE visualization,which may cost up to hundreds of hours for rendering a single frame on a multi-core *** this paper,we propose a neural representation of theflow map and FTLEfield to reduce the cost of expensive FTLE *** demonstrate that a simple multi-layer perceptron(MLP)-based network can accelerate the FTLE computation by up to hundreds of times,and speed up the rendering by tens of times,while producing satisfactory rendering *** also study the impact of the network size,the amount of training,and the predicted property,which may serve as guidance for selecting appropriate network structures.
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the ***,due to the open and variable nature o...
详细信息
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the ***,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain *** such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication ***,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency *** mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for *** scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree *** divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and ***,we evaluate the performance of *** results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%.
Rice plant counting is crucial for many applications in rice production,such as yield estimation,growth diagnosis,disaster loss assessment,***,rice counting still heavily relies on tedious and time-consuming manual **...
详细信息
Rice plant counting is crucial for many applications in rice production,such as yield estimation,growth diagnosis,disaster loss assessment,***,rice counting still heavily relies on tedious and time-consuming manual *** alleviate the workload of rice counting,we employed an UAV(unmanned aerial vehicle)to collect the RGB images of the paddy ***,we proposed a new rice plant counting,locating,and sizing method(RiceNet),which consists of one feature extractor frontend and 3 feature decoder modules,namely,density map estimator,plant location detector,and plant size *** RiceNet,rice plant attention mechanism and positive–negative loss are designed to improve the ability to distinguish plants from background and the quality of the estimated density *** verify the validity of our method,we propose a new UAV-based rice counting dataset,which contains 355 images and 257,793 manual labeled *** results show that the mean absolute error and root mean square error of the proposed RiceNet are 8.6 and 11.2,***,we validated the performance of our method with two other popular crop *** these three datasets,our method significantly outperforms state-of-the-art *** suggest that RiceNet can accurately and efficiently estimate the number of rice plants and replace the traditional manual method.
The objective of this research is to propose an AI based novel augmented reality (AR) software to assist users in operating a wide range of technical and non-technical devices. The project's aim is to make this AR...
详细信息
Wind is the primary challenge for low-speed fixed-wing unmanned aerial vehicles to follow a predefined flight *** cope with various wind conditions,this paper proposes a wind disturbance compensated path following con...
详细信息
Wind is the primary challenge for low-speed fixed-wing unmanned aerial vehicles to follow a predefined flight *** cope with various wind conditions,this paper proposes a wind disturbance compensated path following control strategy where the wind disturbance estimate is incorporated with the nominal guiding vector field to provide the desired airspeed direction for the *** the control input vector for the outer-loop kinematic subsystem needs to satisfy a magnitude constraint,a scaling mechanism is introduced to tune the proportions of the compensation and nominal ***,an optimization problem is formulated to pursue a maximum wind compensation in strong winds,which can be solved analytically to yield two scaling factors.A cascaded inner-loop tracking controller is also designed to fulfill the outer-loop wind disturbance compensated guiding vector ***-fidelity simulation results under sensor noises and realistic winds demonstrate that the proposed path following algorithm is less sensitive to sensor noises,achieves promising accuracy in normal winds,and mitigates the deviation from a desired path in wild winds.
Due to the powerful automatic feature extraction, deep learning-based vulnerability detection methods have evolved significantly in recent years. However, almost all current work focuses on detecting vulnerabilities a...
详细信息
Due to the powerful automatic feature extraction, deep learning-based vulnerability detection methods have evolved significantly in recent years. However, almost all current work focuses on detecting vulnerabilities at a single granularity (i.e., slice-level or function-level). In practice, slice-level vulnerability detection is fine-grained but may contain incomplete vulnerability details. Function-level vulnerability detection includes full vulnerability semantics but may contain vulnerability-unrelated statements. Meanwhile, they pay more attention to predicting whether the source code is vulnerable and cannot pinpoint which statements are more likely to be vulnerable. In this paper, we design mVulPreter, a multi-granularity vulnerability detector that can provide interpretations of detection results. Specifically, we propose a novel technique to effectively blend the advantages of function-level and slice-level vulnerability detection models and output the detection results' interpretation only by the model itself. We evaluate mVulPreter on a dataset containing 5,310 vulnerable functions and 7,601 non-vulnerable functions. The experimental results indicate that mVulPreter outperforms existing state-of-the-art vulnerability detection approaches (i.e., Checkmarx, FlawFinder, RATS, TokenCNN, StatementLSTM, SySeVR, and Devign). IEEE
This paper introduces an innovative optimal control approach to achieve output tracking while incorporating H2-performance specifications in a specific class of nonlinear dynamics modeled by the Takagi-Sugeno fuzzy mo...
详细信息
Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error *** CIM, at least two different IM operations con...
详细信息
Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error *** CIM, at least two different IM operations construct a super IM operation or achieve new functionality. First, we propose a OFDM with generalized CIM(OFDM-GCIM) scheme to achieve a joint IM of subcarrier selection and multiple-mode(MM)permutations by using a multilevel digital ***, two schemes, called double CIM(D-CIM) and multiple-layer CIM(M-CIM), are proposed for secure communication, which combine new IM operation for disrupting the original order of bits and symbols with conventional OFDM-IM, to protect the legitimate users from eavesdropping in the wireless communications. A subcarrier-wise maximum likelihood(ML) detector and a low complexity log-likelihood ratio(LLR) detector are proposed for the legitimate users. A tight upper bound on the bit error rate(BER) of the proposed OFDM-GCIM, D-CIM and MCIM at the legitimate users are derived in closed form by employing the ML criteria detection. computer simulations and numerical results show that the proposed OFDM-GCIM achieves superior error performance than OFDM-IM, and the error performance at the eavesdroppers demonstrates the security of D-CIM and M-CIM.
Federated learning presents massive potential for privacy-friendly collaboration. However, federated learning is deeply threatened by byzantine attacks, where malicious clients deliberately upload crafted vicious upda...
详细信息
Federated learning presents massive potential for privacy-friendly collaboration. However, federated learning is deeply threatened by byzantine attacks, where malicious clients deliberately upload crafted vicious updates. While various robust aggregations have been proposed to defend against such attacks, they are subject to certain assumptions: homogeneous private data and related proxy datasets. To address these limitations, we propose Self-Driven Entropy Aggregation (SDEA), which leverages the random public dataset to conduct Byzantine-robust aggregation in heterogeneous federated learning. For Byzantine attackers, we observe that benign ones typically present more confident (sharper) predictions than evils on the public dataset. Thus, we highlight benign clients by introducing learnable aggregation weight to minimize the instance-prediction entropy of the global model on the random public dataset. Besides, with inherent data heterogeneity, we reveal that it brings heterogeneous sharpness. Specifically, clients are optimized under distinct distribution and thus present fruitful predictive preferences. The learnable aggregation weight blindly allocates high attention to limited ones for sharper predictions, resulting in a biased global model. To alleviate this problem, we encourage the global model to offer diverse predictions via batch-prediction entropy maximization and conduct clustering to equally divide honest weights to accommodate different tendencies. This endows SDEA to detect Byzantine attackers in heterogeneous federated learning. Empirical results demonstrate the effectiveness. Copyright 2024 by the author(s)
This paper provides an overview of fog computing healthcare technologies that are playing a huge role in the current healthcare Industry. In this paper, we suggest the Data mining is the most effective option for dise...
详细信息
暂无评论