With the great development of Multi-Target Tracking(MTT)technologies,many MTT algorithms have been proposed with their own advantages and *** to the fact that requirements to MTT algorithms vary from the application s...
详细信息
With the great development of Multi-Target Tracking(MTT)technologies,many MTT algorithms have been proposed with their own advantages and *** to the fact that requirements to MTT algorithms vary from the application scenarios,performance evaluation is significant to select an appropriate MTT algorithm for the specific application *** this paper,we propose a performance evaluation method on the sets of trajectories with temporal dimension specifics to compare the estimated trajectories with the true *** proposed method evaluates the estimate results of an MTT algorithm in terms of tracking accuracy,continuity and ***,its computation is based on a multi-dimensional assignment problem,which is formulated as a computable form using linear *** enhance the influence of recent estimated states of the trajectories in the evaluation,an attention function is used to reweight the trajectory errors at different time ***,simulation results show that the proposed performance evaluation method is able to evaluate many aspects of the MTT *** evaluations are worthy for selecting suitable MTT algorithms in different application scenarios.
Electronic auctions(e-auctions)remove the physical limitations of traditional auctions and bring this mechanism to the general ***,most e-auction schemes involve a trusted auctioneer,which is not always credible in **...
详细信息
Electronic auctions(e-auctions)remove the physical limitations of traditional auctions and bring this mechanism to the general ***,most e-auction schemes involve a trusted auctioneer,which is not always credible in *** studies have applied cryptography tools to solve this problem by distributing trust,but they ignore the existence of *** this paper,a blockchain-based Privacy-Preserving and Collusion-Resistant scheme(PPCR)for double auctions is proposed by employing both cryptography and blockchain technology,which is the first decentralized and collusion-resistant double auction scheme that guarantees bidder anonymity and bid privacy.A two-server-based auction framework is designed to support off-chain allocation with privacy preservation and on-chain dispute resolution for collusion resistance.A Dispute Resolution agreement(DR)is provided to the auctioneer to prove that they have conducted the auction correctly and the result is fair and *** addition,a Concise Dispute Resolution protocol(CDR)is designed to handle situations where the number of accused winners is small,significantly reducing the computation cost of dispute *** experimental results confirm that PPCR can indeed achieve efficient collusion resistance and verifiability of auction results with low on-chain and off-chain computational overhead.
In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of *** studies focus on optimizing base station deployment under t...
详细信息
In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of *** studies focus on optimizing base station deployment under the assumption of static obstacles,aiming to maximize the perception coverage of wireless RF(Radio Frequency)signals and reduce positioning blind ***,in practical security systems,obstacles are subject to change,necessitating the consideration of base station deployment in dynamic ***,research in this area still needs to be *** paper proposes a Dynamic Indoor Environment Beacon Deployment Algorithm(DIE-BDA)to address this *** algorithm considers the dynamic alterations in obstacle locations within the designated *** determines the requisite number of base stations,the requisite time,and the area’s practical and overall signal coverage *** experimental results demonstrate that the algorithm can calculate the deployment strategy in 0.12 s following a change in obstacle *** results show that the algorithm in this paper requires 0.12 s to compute the deployment strategy after the positions of obstacles *** 13 base stations,it achieves an effective coverage rate of 93.5%and an overall coverage rate of 97.75%.The algorithm can rapidly compute a revised deployment strategy in response to changes in obstacle positions within security systems,thereby ensuring the efficacy of signal coverage.
Recovering high-quality inscription images from unknown and complex inscription noisy images is a challenging research *** fromnatural images,character images pay more attention to stroke ***,existingmodelsmainly cons...
详细信息
Recovering high-quality inscription images from unknown and complex inscription noisy images is a challenging research *** fromnatural images,character images pay more attention to stroke ***,existingmodelsmainly consider pixel-level informationwhile ignoring structural information of the character,such as its edge and glyph,resulting in reconstructed images with mottled local structure and character *** solve these problems,we propose a novel generative adversarial network(GAN)framework based on an edge-guided generator and a discriminator constructed by a dual-domain U-Net framework,i.e.,*** existing frameworks,the generator introduces the edge extractionmodule,guiding it into the denoising process through the attention mechanism,which maintains the edge detail of the restored inscription ***,a dual-domain U-Net-based discriminator is proposed to learn the global and local discrepancy between the denoised and the label images in both image and morphological domains,which is helpful to blind denoising *** proposed dual-domain discriminator and generator for adversarial training can reduce local artifacts and keep the denoised character structure *** to the lack of a real-inscription image,we built the real-inscription dataset to provide an effective benchmark for studying inscription image *** experimental results show the superiority of our method both in the synthetic and real-inscription datasets.
A hydrotalcite(layered double hydroxide, LDH) inhibitor which is suitable for the whole process of coal spontaneous combustion and a LDH inhibitor containing rare earth lanthanum elements were prepared. The inhibition...
详细信息
A hydrotalcite(layered double hydroxide, LDH) inhibitor which is suitable for the whole process of coal spontaneous combustion and a LDH inhibitor containing rare earth lanthanum elements were prepared. The inhibition effect and mechanism were analyzed by scanning electron microscopy(SEM),X-ray diffraction(XRD), thermal performance analysis, in-situ diffuse reflectance infrared spectroscopy and temperature-programmed experiment. The results have shown that the inhibitor containing lanthanum can play a good inhibitory role in every stage of coal oxidation. During the slow oxidation of coal samples, the inhibitor containing lanthanum ions can slow down the oxidation process of coal and increase the initial temperature of coal spontaneous combustion. At the same time, because the hydroxyl groups in LDHs are connected with-COO-groups on the coal surface through hydrogen bonds, the stability of coal is improved. With the increase of temperature, LDHs can remove interlayer water molecules and reduce the surface temperature of coal. CO release rate of coal samples decreases significantly after adding inhibitor containing lanthanum element, and the maximum inhibition rate of the inhibitor is 58.1%.
The data asset is emerging as a crucial component in both industrial and commercial *** valuable knowledge from the data benefits decision-making and ***,the usage of data assets raises tension between sensitive infor...
详细信息
The data asset is emerging as a crucial component in both industrial and commercial *** valuable knowledge from the data benefits decision-making and ***,the usage of data assets raises tension between sensitive information protection and value *** an emerging machine learning paradigm,Federated Learning(FL)allows multiple clients to jointly train a global model based on their data without revealing *** approach harnesses the power of multiple data assets while ensuring their *** the benefits,it relies on a central server to manage the training process and lacks quantification of the quality of data assets,which raises privacy and fairness *** this work,we present a novel framework that combines Federated Learning and Blockchain by Shapley value(FLBS)to achieve a good trade-off between privacy and ***,we introduce blockchain in each training round to elect aggregation and evaluation nodes for training,enabling decentralization and contribution-aware incentive distribution,with these nodes functionally separated and able to supervise each *** experimental results validate the effectiveness of FLBS in estimating contribution even in the presence of heterogeneity and noisy data.
Simulating the total ionizing dose(TID)of an electrical system using transistor-level models can be difficult and expensive,particularly for digital-integrated circuits(ICs).In this study,a method for modeling TID eff...
详细信息
Simulating the total ionizing dose(TID)of an electrical system using transistor-level models can be difficult and expensive,particularly for digital-integrated circuits(ICs).In this study,a method for modeling TID effects in complementary metaloxide semiconductor(CMOS)digital ICs based on the input/output buffer information specification(IBIS)was *** digital IC was first divided into three parts based on its internal structure:the input buffer,output buffer,and functional *** of these three parts was separately *** the IBIS model,the transistor V-I characteristic curves of the buffers were processed,and the physical parameters were extracted and modeled using *** the functional area,logic functions were modeled in VHDL according to the data sheet.A golden digital IC model was developed by combining the input buffer,output buffer,and functional area ***,the golden ratio was reconstructed based on TID experimental data,enabling the assessment of TID effects on the threshold voltage,carrier mobility,and time series of the digital *** experiments were conducted using a CMOS non-inverting multiplexer,NC7SZ157,and the results were compared with the simulation results,which showed that the relative errors were less than 2%at each dose *** confirms the practicality and accuracy of the proposed modeling *** TID effect model for digital ICs developed using this modeling technique includes both the logical function of the IC and changes in electrical properties and functional degradation impacted by TID,which has potential applications in the design of radiation-hardening tolerance in digital ICs.
Most Personalized Federated Learning (PFL) algorithms merge the model parameters of each client with other (similar or generic) model parameters to optimize the personalized model (PM). However, the merged model param...
详细信息
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical...
详细信息
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical *** paper analyzes two fundamental failure cases in the baseline AD model and identifies key reasons that limit the recognition accuracy of existing approaches. Specifically, by Case-1, we found that the main reason detrimental to current AD methods is that the inputs to the recovery model contain a large number of detailed features to be recovered, which leads to the normal/abnormal area has not/has been recovered into its original state. By Case-2, we surprisingly found that the abnormal area that cannot be recognized in image-level representations can be easily recognized in the feature-level representation. Based on the above observations, we propose a novel recover-then-discriminate(ReDi) framework for *** takes a self-generated feature map(e.g., histogram of oriented gradients) and a selected prompted image as explicit input information to address the identified in Case-1. Additionally, a feature-level discriminative network is introduced to amplify abnormal differences between the recovered and input representations. Extensive experiments on two widely used yet challenging AD datasets demonstrate that ReDi achieves state-of-the-art recognition accuracy.
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical *** is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is es...
详细信息
The Internet of Medical Things(IoMT)is an application of the Internet of Things(IoT)in the medical *** is a cutting-edge technique that connects medical sensors and their applications to healthcare systems,which is essential in smart ***,Personal Health Records(PHRs)are normally kept in public cloud servers controlled by IoMT service providers,so privacy and security incidents may be ***,Searchable Encryption(SE),which can be used to execute queries on encrypted data,can address the issue ***,most existing SE schemes cannot solve the vector dominance threshold *** response to this,we present a SE scheme called Vector Dominance with Threshold Searchable Encryption(VDTSE)in this *** use a Lagrangian polynomial technique and convert the vector dominance threshold problem into a constraint that the number of two equal-length vectors’corresponding bits excluding wildcards is not less than a threshold ***,we solve the problem using the proposed technique modified in Hidden Vector Encryption(HVE).This technique makes the trapdoor size linear to the number of attributes and thus much smaller than that of other similar SE schemes.A rigorous experimental analysis of a specific application for privacy-preserving diabetes demonstrates the feasibility of the proposed VDTSE scheme.
暂无评论