Lung cancer is a dangerous condition that impacts many people. The type and location of cancer are critical factors in determining the appropriate medical treatment. Early identification of cancer cells can save numer...
详细信息
Existing 3D object detection suffers from expensive annotation costs and poor transferability to unknown data due to the domain gap, Unsupervised Domain Adaptation (UDA) aims to generalize detection models trained in ...
详细信息
Existing 3D object detection suffers from expensive annotation costs and poor transferability to unknown data due to the domain gap, Unsupervised Domain Adaptation (UDA) aims to generalize detection models trained in labeled source domains to perform robustly on unexplored target domains, providing a promising solution for cross-domain 3D object detection. Although Self-Training (ST) based cross-domain 3D detection methods with the assistance of pseudo-labeling techniques have achieved remarkable progress, they still face the issue of low-quality pseudo-labels when there are significant domain disparities due to the absence of a process for feature distribution alignment. While Adversarial Learning (AL) based methods can effectively align the feature distributions of the source and target domains, the inability to obtain labels in the target domain forces the adoption of asymmetric optimization losses, resulting in a challenging issue of source domain bias. To overcome these limitations, we propose a novel unsupervised domain adaptation framework for 3D object detection via collaborating ST and AL, dubbed as STAL3D, unleashing the complementary advantages of pseudo labels and feature distribution alignment. Additionally, a Background Suppression Adversarial Learning (BS-AL) module and a Scale Filtering Module (SFM) are designed tailored for 3D cross-domain scenes, effectively alleviating the issues of the large proportion of background interference and source domain size bias. Our STAL3D achieves state-of-the-art performance on multiple cross-domain tasks and even surpasses the Oracle results on Waymo $\rightarrow$ KITTI and Waymo $\rightarrow$ KITTI-rain. IEEE
Autism spectrum disease (ASD) is a neuro developmental illness that is both complicated and degenerative. A majority of known approaches use autism detection observation schedule (ADOS), pattern recognition, etc. to d...
详细信息
The paper provides an explicit outlook on the development of a comprehensive sentiment analysis systems for online social media by targeting user-generated text and images on platforms such as Twitter, Facebook, and I...
详细信息
Unmanned Surface Vehicles (USVs) are pivotal in diverse marine operations, including search and rescue, environmental monitoring, and maritime security. As their application grows, coordinating multiple USVs for colla...
详细信息
The Consumer Internet of Things (CIoT) integrates the advantage of Internet of Things (IoT) technologies to provide convenience in consumers’ daily lives. With the rapid development of the CIoT, data collected from c...
详细信息
The Consumer Internet of Things (CIoT) integrates the advantage of Internet of Things (IoT) technologies to provide convenience in consumers’ daily lives. With the rapid development of the CIoT, data collected from consumer smart devices has increased exponentially. In the CIoT, web pages, as internet information carriers, offer spammers opportunities to conduct security attacks, which could harm the CIoT systems. Inspired by this challenge, this paper introduces an intelligent feature extraction method, page2vec, and a new classification algorithm, RFiRF, to detect web spam in the CIoT. page2vec is based on a score propagation model, which calculates each page’s goodness and badness scores through the links of a web graph. It is observed that different scoring functions can produce different web page features. Based on this observation, 20 to 30 scoring functions are designed and incorporated into page2vec. This way, page2vec can automatically extract web page features from a web graph. Unfortunately, page2vec also brings a high dimensionality problem when constructing binary classifiers for spam detection. To address this problem, a new classification algorithm, called Random Forest in Random Forest (RFiRF), is proposed. RFiRF replaces a random forest’s meta-classifier (decision tree) with a random forest. It divides the sparse data space into dense sub-spaces by randomly sampling training instances and features. Experiments on two benchmark datasets show that 1) page2vec features are much more predictive than the raw link-based and node2vec features, and 2) RFiRF outperforms some classification algorithms in most cases when facing the high dimensionality problem. We hope this paper can give peers valuable insights into the CIoT security. IEEE
Internet of Things(IoT)is becoming popular nowadays for collecting and sharing the data from the nodes and among the nodes using internet ***,some of the nodes in IoT are mobile and dynamic in *** maintaining the link...
详细信息
Internet of Things(IoT)is becoming popular nowadays for collecting and sharing the data from the nodes and among the nodes using internet ***,some of the nodes in IoT are mobile and dynamic in *** maintaining the link among the nodes,efficient bandwidth of the links among the mobile nodes with increased life time is a big challenge in IoT as it integrates mobile nodes with static nodes for data *** such networks,many routing-problems arise due to difficulties in energy and bandwidth based quality of *** to the mobility and finite nature of the nodes,transmission links between intermediary nodes may fail frequently,thus affecting the routing-performance of the network and the accessibility of the *** existing protocols do not focus on the transmission links and energy,bandwidth and link stability of the nodes,but node links are significant factors for enhancing the quality of the *** stability helps us to define whether the node is within or out of a coverage *** paper proposed an Optimal Energy and bandwidth based Link Stability Routing(OEBLS)algorithm,to improve the link stable route with minimized error rate and *** this paper,the optimal route from the source to the sink is determined based on the energy and bandwidth,link stability *** the existing routes,the sink node will choose the optimal route which is having less link stability *** stable link is determined by evaluating link stability value using distance and ***-energy of the node is estimated using the current energy and the consumed *** energy is estimated using transmitted power and the received *** bandwidth in the link is estimated using the idle time and channel capacity with the consideration of probability of collision.
Most of the devastating cyber-attacks are caused by insiders with access privileges inside an organization. The main reason of insider attacks being more effective is that they don't have many security barriers be...
详细信息
Low-light image enhancement (LLIE) in Raw space has posed a challenge in the field of image processing and computational photography. Different from image processing in sRGB space, Raw images store more image informat...
详细信息
Live video streaming demands high user Quality of Experience (QoE) and requires significant computing power and bandwidth for video encoding and transmission. The standard adaptive live streaming approach encodes the ...
详细信息
暂无评论