In foggy traffic scenarios, existing object detection algorithms face challenges such as low detection accuracy, poor robustness, occlusion, missed detections, and false detections. To address this issue, a multi-scal...
详细信息
In foggy traffic scenarios, existing object detection algorithms face challenges such as low detection accuracy, poor robustness, occlusion, missed detections, and false detections. To address this issue, a multi-scale object detection algorithm based on an improved YOLOv8 has been proposed. Firstly, a lightweight attention mechanism, Triplet Attention, is introduced to enhance the algorithm’s ability to extract multi-dimensional and multi-scale features, thereby improving the receptive capability of the feature maps. Secondly, the Diverse Branch Block (DBB) is integrated into the CSP Bottleneck with two Convolutions (C2F) module to strengthen the fusion of semantic information across different layers. Thirdly, a new decoupled detection head is proposed by redesigning the original network head based on the Diverse Branch Block module to improve detection accuracy and reduce missed and false detections. Finally, the Minimum Point Distance based Intersection-over-Union (MPDIoU) is used to replace the original YOLOv8 Complete Intersection-over-Union (CIoU) to accelerate the network’s training convergence. Comparative experiments and dehazing pre-processing tests were conducted on the RTTS and VOC-Fog datasets. Compared to the baseline YOLOv8 model, the improved algorithm achieved mean Average Precision (mAP) improvements of 4.6% and 3.8%, respectively. After defogging pre-processing, the mAP increased by 5.3% and 4.4%, respectively. The experimental results demonstrate that the improved algorithm exhibits high practicality and effectiveness in foggy traffic scenarios.
Copy-move forgery is a common audio tampering technique in which users copy the contents of one speech and paste them into another region of the same speech signal, thus achieving the effect of tampering with the sema...
详细信息
This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactiv...
详细信息
This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactively reconfigure wireless environments to improve both sensing and communication(S&C) performance. First, we exploit a single IRS to enable wireless sensing in the base station's(BS's) non-line-of-sight(NLoS) area. In particular, we present three IRS-enabled NLoS target sensing architectures with fully-passive, semi-passive, and active IRSs, respectively. We compare their pros and cons by analyzing the fundamental sensing performance limits for target detection and parameter estimation. Next, we consider a single IRS to facilitate integrated sensing and communication(ISAC), in which the transmit signals at the BS are used for achieving both S&C functionalities, aided by the IRS through reflective beamforming. We present joint transmit signal and receiver processing designs for realizing efficient ISAC, and jointly optimize the transmit beamforming at the BS and reflective beamforming at the IRS to balance the fundamental performance tradeoff between S&C. Furthermore, we discuss multi-IRS networked ISAC, by particularly focusing on multi-IRS-enabled multi-link ISAC, multi-region ISAC, and ISAC signal routing, respectively. Finally, we highlight various promising research topics in this area to motivate future work.
Emotion recognition using biological brain signals needs to be reliable to attain effective signal processing and feature extraction techniques. The impact of emotions in interpretations, conversations, and decision-m...
详细信息
Emotion recognition using biological brain signals needs to be reliable to attain effective signal processing and feature extraction techniques. The impact of emotions in interpretations, conversations, and decision-making, has made automatic emotion recognition and examination of a significant feature in the field of psychiatric disease treatment and cure. The problem arises from the limited spatial resolution of EEG recorders. Predetermined quantities of electroencephalography (EEG) channels are used by existing algorithms, which combine several methods to extract significant data. The major intention of this study was to focus on enhancing the efficiency of recognizing emotions using signals from the brain through an experimental, adaptive selective channel selection approach that recognizes that brain function shows distinctive behaviors that vary from one individual to another individual and from one state of emotions to another. We apply a Bernoulli–Laplace-based Bayesian model to map each emotion from the scalp senses to brain sources to resolve this issue of emotion mapping. The standard low-resolution electromagnetic tomography (sLORETA) technique is employed to instantiate the source signals. We employed a progressive graph convolutional neural network (PG-CNN) to identify the sources of the suggested localization model and the emotional EEG as the main graph nodes. In this study, the proposed framework uses a PG-CNN adjacency matrix to express the connectivity between the EEG source signals and the matrix. Research on an EEG dataset of parents of an ASD (autism spectrum disorder) child has been utilized to investigate the ways of parenting of the child's mother and father. We engage with identifying the personality of parental behaviors when regulating the child and supervising his or her daily activities. These recorded datasets incorporated by the proposed method identify five emotions from brain source modeling, which significantly improves the accurac
This study introduces the metric drift compensation network (MDCN) to address the issue of sensor drift in electronic noses (E-noses). E-noses mimic the olfactory sense of mammals to detect odors. Sensor drift, which ...
详细信息
This letter presents an optimization design method for broadband Doherty power amplifier (DPA) using an irregular output combining network (OCN). First, the postmatching network and the output matching networks are co...
详细信息
The accurate identification of students in need is crucial for governments and colleges to allocate resources more effectively and enhance social equity and educational fairness. Existing approaches to identifying stu...
详细信息
1 Introduction In Natural Language Processing(NLP),topic modeling is a class of methods used to analyze and explore textual corpora,i.e.,to discover the underlying topic structures from text and assign text pieces to ...
详细信息
1 Introduction In Natural Language Processing(NLP),topic modeling is a class of methods used to analyze and explore textual corpora,i.e.,to discover the underlying topic structures from text and assign text pieces to different *** NLP,a topic means a set of relevant words appearing together in a particular pattern,representing some specific *** is beneficial for tracking social media trends,constructing knowledge graphs,and analyzing writing *** modeling has always been an area of extensive research in *** methods like Latent Semantic Analysis(LSA)and Latent Dirichlet Allocation(LDA),based on the“bag of words”(BoW)model,often fail to grasp the semantic nuances of the text,making them less effective in contexts involving polysemy or data noise,especially when the amount of data is small.
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing ima...
详细信息
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial *** this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and ***,the fingerprint code with a hierarchical community structure is designed based on social network ***,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is *** that,all codeword segments are embedded into the LL,LH,and HL subbands,*** selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our ***,the superiority of the technique is elaborated through comparison with some related image security *** solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social *** the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured.
With the increasing complexity of graph query processing tasks, it is difficult for users to obtain the accurate cardinality before or during the execution of query tasks. Accurate estimate query cardinality is crucia...
详细信息
暂无评论