In the environment of smart examination rooms, it is important to quickly and accurately detect abnormal behavior(human standing) for the construction of a smart campus. Based on deep learning, we propose an intellige...
详细信息
In the environment of smart examination rooms, it is important to quickly and accurately detect abnormal behavior(human standing) for the construction of a smart campus. Based on deep learning, we propose an intelligentstanding human detection (ISHD) method based on an improved single shot multibox detector to detect thetarget of standing human posture in the scene frame of exam room video surveillance at a specific examinationstage. ISHD combines the MobileNet network in a single shot multibox detector network, improves the posturefeature extractor of a standing person, merges prior knowledge, and introduces transfer learning in the trainingstrategy, which greatly reduces the computation amount, improves the detection accuracy, and reduces the trainingdifficulty. The experiment proves that the model proposed in this paper has a better detection ability for the smalland medium-sized standing human body posture in video test scenes on the EMV-2 dataset.
Beam scanning for joint detection and communication in integrated sensing and communication(ISAC) systems plays a critical role in continuous monitoring and rapid adaptation to dynamic environments. However, the desig...
详细信息
Beam scanning for joint detection and communication in integrated sensing and communication(ISAC) systems plays a critical role in continuous monitoring and rapid adaptation to dynamic environments. However, the design of sequential scanning beams for target detection with the required sensing resolution has not been tackled in the *** bridge this gap, this paper introduces a resolution-aware beam scanning design. In particular, the transmit information beamformer, the covariance matrix of the dedicated radar signal, and the receive beamformer are jointly optimized to maximize the average sum rate of the system while satisfying the sensing resolution and detection probability requirements.A block coordinate descent(BCD)-based optimization framework is developed to address the non-convex design problem. By exploiting successive convex approximation(SCA), S-procedure, and semidefinite relaxation(SDR), the proposed algorithm is guaranteed to converge to a stationary solution with polynomial time complexity. Simulation results show that the proposed design can efficiently handle the stringent detection requirement and outperform existing antenna-activation-based methods in the literature by exploiting the full degrees of freedom(DoFs) brought by all antennas.
In Internet of Things(loT),data sharing among different devices can improve manufacture efficiency and reduce workload,and yet make the network systems be more vulnerable to various intrusion *** has been realistic de...
详细信息
In Internet of Things(loT),data sharing among different devices can improve manufacture efficiency and reduce workload,and yet make the network systems be more vulnerable to various intrusion *** has been realistic demand to develop an efficient intrusion detection algorithm for connected *** of existing intrusion detection methods are trained in a centralized manner and are incapable to identify new unlabeled attack *** this paper,a distributed federated intrusion detection method is proposed,utilizing the information contained in the labeled data as the prior knowledge to discover new unlabeled attack ***,the blockchain technique is introduced in the federated learning process for the consensus of the entire *** results are provided to show that our approach can identify the malicious entities,while outperforming the existing methods in discovering new intrusion attack types.
The exponential increase in IoT device usage has spawned numerous cyberspace *** devices,sensors,and actuators bridge the gap between physical processes and the cyber network in a cyber-physical system(CPS).Cyber-phys...
详细信息
The exponential increase in IoT device usage has spawned numerous cyberspace *** devices,sensors,and actuators bridge the gap between physical processes and the cyber network in a cyber-physical system(CPS).Cyber-physical system is a complex system from a security perspective due to the heterogeneous nature of its components and the fact that IoT devices can serve as an entry point for *** adversaries design their attack strategies on systems to gain an advantage at a relatively lower cost,whereas abusive adversaries initiate an attack to inflict maximum damage without regard to cost or *** this paper,a sensor spoofing attack is modelled as a malicious adversary attempting to cause system failure by interfering with the feedback control *** is accomplished by feeding spoofed sensor values to the controller and issuing erroneous commands to the *** on a Simulink-simulated linear CPS support the proof of concept for the proposed abusive ideology,demonstrating three attack *** impact of the evaluations stresses the importance of testing the CPS security against adversaries with abusive settings for preventing ***,the research concludes by highlighting the limitations of the proposed work,followed by recommendations for the future.
We have realized efficient photopatterning and high-quality ZrO_(2)films through combustion synthesis and manufactured resistive random access memory(RRAM)devices with excellent switching stability at low temperatures...
详细信息
We have realized efficient photopatterning and high-quality ZrO_(2)films through combustion synthesis and manufactured resistive random access memory(RRAM)devices with excellent switching stability at low temperatures(250℃)using these *** synthesis reduces the energy required for oxide conversion,thus accelerating the decomposition of organic ligands in the UV-exposed area,and promoting the formation of metal-oxygen networks,contributing to *** analysis confirmed a reduction in the conversion temperature of combustion precursors,and the prepared combustion ZrO_(2)films exhibited a high proportion of metal-oxygen bonding that constitutes the oxide lattice,along with an amorphous ***,the synergistic effect of combustion synthesis and UV/O_(3)-assisted photochemical activation resulted in patterned ZrO_(2)films forming even more complete metal-oxygen *** devices fabricated with patterned ZrO_(2)films using combustion synthesis exhibited excellent switching characteristics,including a narrow resistance distribution,endurance of 103 cycles,and retention for 105 s at 85℃,despite low-temperature *** synthesis not only enables the formation of high-quality metal oxide films with low external energy but also facilitates improved photopatterning.
Predicting students’academic achievements is an essential issue in education,which can benefit many stakeholders,for instance,students,teachers,managers,*** with online courses such asMOOCs,students’academicrelatedd...
详细信息
Predicting students’academic achievements is an essential issue in education,which can benefit many stakeholders,for instance,students,teachers,managers,*** with online courses such asMOOCs,students’academicrelateddata in the face-to-face physical teaching environment is usually sparsity,and the sample size is *** makes building models to predict students’performance accurately in such an environment even *** paper proposes a Two-WayNeuralNetwork(TWNN)model based on the bidirectional recurrentneural network and graph neural network to predict students’next semester’s course performance using only theirprevious course *** experiments on a real dataset show that our model performs better thanthe baselines in many indicators.
An algorithm based on mixed signals is proposed,to solve the issues of low accuracy of identification algorithm,immeasurable intermediate variables of fractional order Hammerstein model,and how to determine the magnit...
详细信息
An algorithm based on mixed signals is proposed,to solve the issues of low accuracy of identification algorithm,immeasurable intermediate variables of fractional order Hammerstein model,and how to determine the magnitude of fractional *** this paper,a special mixed input signal is designed to separate the nonlinear and linear parts of the fractional order Hammerstein model so that each part can be identified *** nonlinear part is fitted by the neural fuzzy network model,which avoids the limitation of polynomial fitting and broadens the application range of nonlinear *** addition,the multi-innovation Levenberg-Marquardt(MILM)algorithm and auxiliary recursive least square algorithm are innovatively integrated into the parameter identification algorithm of the fractional order Hammerstein model to obtain more accurate identification results.A simulation example is given to verify the accuracy and effectiveness of the proposed method.
Graph neural network (GNN) has gained increasing popularity in recent years owing to its capability and flexibility in modeling complex graph structure data. Among all graph learning methods, hypergraph learning is a ...
详细信息
This paper studies the moving path following(MPF)problem for fixed-wing unmanned aerial vehicle(UAV)under output constraints and wind *** vehicle is required to converge to a reference path moving with respect to the ...
详细信息
This paper studies the moving path following(MPF)problem for fixed-wing unmanned aerial vehicle(UAV)under output constraints and wind *** vehicle is required to converge to a reference path moving with respect to the inertial frame,while the path following error is not expected to violate the predefined *** from existing moving path following guidance laws,the proposed method removes complex geometric transformation by formulating the moving path following problem into a second-order time-varying control problem.A nominal moving path following guidance law is designed with disturbances and their derivatives estimated by high-order disturbance *** guarantee that the path following error will not exceed the prescribed bounds,a robust control barrier function is developed and incorporated into controller design with quadratic program based *** proposed method does not require the initial position of the UAV to be within predefined *** the safety margin concept makes error-constraint be respected even if in a noisy *** proposed guidance law is validated through numerical simulations of shipboard landing and hardware-in-theloop(HIL)experiments.
Unstructured Numerical Image Dataset Separation (UNIDS) method employing an enhanced unsupervised clustering technique. The objective is to delineate an optimal number of distinct groups within the input grayscale (G-...
详细信息
暂无评论