The main objective of a hand-geometry-based user identification model consists in designing a method that could be implemented with a satisfactory trade-off between cost, accuracy, and ease of utilizing. In this paper...
详细信息
ISBN:
(纸本)9781665480871
The main objective of a hand-geometry-based user identification model consists in designing a method that could be implemented with a satisfactory trade-off between cost, accuracy, and ease of utilizing. In this paper, an efficient, peg-free hand geometry-based approach for user identification is presented, which can be easily implemented with low-cost pieces of equipment and results up to a 98.7% accuracy in user identification. Three different feature-based methods, namely, circular representation, FPL, and FPLKW, are designed and examined. In order to extract required landmarks to the end of generating intended features, the so-called Media-Pipe is used. The first method is the circular representation, in which the radius ratio of the circles formed by the three middle finger straps is taken as model features. The second method extracts fingers length and phalanges length of each finger and uses their ratio as features, which is called Finger Phalanges Length (FPL) method. The third method extracts Fingers Length and Phalanges Length of each finger and Knuckles Width, abbreviated as (FPLKW), and uses their ratios for extracting features. Two datasets are collected, one for examining the efficiency of the proposed methods and finding the promising one, and the second one for validating the performance of the selected method. The first dataset contains images of the back-side of both hands in spread fingers mode and picked altogether fingers mode, taken from 21 individuals on a black background. The second dataset contains images of 100 individual hands in the front-side of both hands and the back-side of both hands in spread fingers mode. Different classifications are used to obtain maximum accuracy, including SVM SVC, SVM NuSVC, the decision tree classifier, the extra tree classifier, the random forest classifier, and one hidden layer MLP. Obtained results reveal that the extra tree classifier leads to better performance with respect to the methods mentioned abov
Although conventional false data injection attacks can circumvent the detection of bad data detection (BDD) in sustainable power grid cyber physical systems, they are easily detected by well-trained deep learning-base...
详细信息
Dermatologists typically require extensive experience to accurately classify skin *** recent years,the development of computer vision and machine learning has provided new methods for assisted *** skin cancer image cl...
详细信息
Dermatologists typically require extensive experience to accurately classify skin *** recent years,the development of computer vision and machine learning has provided new methods for assisted *** skin cancer image classification methods have certain limitations,such as poor interpretability,the requirement of domain knowledge for feature extraction,and the neglect of lesion area information in skin *** paper proposes a new genetic programming(GP)approach to automatically learn global and/or local features from skin images for *** achieve this,a new function set and a new terminal set have been *** proposed GP method can automatically and flexibly extract effective local/global features from different types of input images,thus providing a comprehensive description of skin images.A new region detection function has been developed to select the lesion areas from skin images for feature *** performance of this approach is evaluated on three skin cancer image classification tasks,and compared with three GP methods and six non-GP *** experimental results show that the new approach achieves significantly better or similar performance in most *** analysis validates the effectiveness of our parameter settings,visualizes the multiple region detection functions used in the individual evolved by the proposed approach,and demonstrates its good convergence ability.
Optical skyrmions are quasiparticles with nontrivial topological textures that have significant potential in optical information processing,transmission,and ***,we theoretically and experimentally achieve the conversi...
详细信息
Optical skyrmions are quasiparticles with nontrivial topological textures that have significant potential in optical information processing,transmission,and ***,we theoretically and experimentally achieve the conversion of optical skyrmions among Néel,Bloch,intermediate skyrmions,and bimerons by polarization devices,where the fusion and annihilation of optical skyrmions are demonstrated *** analyzing the polarization pattern in Poincarébeams,we reveal the skyrmion topology dependence on the device,which provides a pathway for the study of skyrmion interactions.A vectorial optical field generator is implemented to realize the conversion and superposition experimentally,and the results are in good agreement with the theoretical *** results enhance our comprehension of optical topological quasiparticles,which could have a significant impact on the transfer,storage,and communication of optical information.
作者:
Arghand, RezaChaibakhsh, AliRadman, MoeinUniversity of Guilan
Intelligent Systems and Advanced Control Lab Faculty of Mechanical Engineering Rasht Guilan41996-13776 Iran University of Essex
Brain-Computer Interfacing and Neural Engineering Laboratory School of Computer Science and Electronic Engineering ColchesterCO4 3SQ United Kingdom
Brain-computer Interface (BCI) systems are relatively new technologies that could play a significant role in aiding the recovery of impaired activities resulting from neuromuscular disabilities in affected individuals...
详细信息
This paper addresses the synchronization for coupled reaction-diffusion neural networks (CRNNs) with multi-state couplings suffering attacks. By utilizing the Kronecker product, a network synchronization criterion is ...
详细信息
Cyber-physical systems, such as unmanned aerial vehicles and connected and autonomous vehicles, are vulnerable to cyber attacks, which can cause significant damage to society. This paper examines the attack issue in c...
详细信息
Cyber-physical systems, such as unmanned aerial vehicles and connected and autonomous vehicles, are vulnerable to cyber attacks, which can cause significant damage to society. This paper examines the attack issue in cyber-physical systems within the framework of discrete event systems. Specifically, we consider a scenario where a malicious intruder injects a jamming signal into an actuator channel. It disrupts the transmission of control commands and prevents an actuator from receiving them. This is termed an actuator jamming attack. In the paper, we first analyze the closed-loop system behavior under such an attack. An attack structure is constructed to illustrate how an intruder exploits a jamming attack to drive a system into unsafe states. Then, we study the supervisory control problem for a system exposed to such an attack. The problem is reduced to a basic supervisory control one in discrete event systems by introducing the concept of dynamically controllable language. A solution to this problem is explored, where we establish an existence condition for a supremal and robust supervisor that is capable of defending against actuator jamming attacks, and design an algorithm to derive it. Finally, the effectiveness of our method is illustrated by an intelligent automated guided vehicle system. IEEE
In a fast-changing world we are in today, unmanned vehicles are displacing old, obsolete and frustrating tasks. Since unmanned vehicles are intended to work in an environment without any conduction, finding a collisio...
详细信息
Spatiotemporal optical vortex(STOV)wavepacket carrying transverse photonic orbital angular momentum(OAM)has been extensively studied in the past few *** this Letter,we propose and study a novel STOV wavepacket with mu...
详细信息
Spatiotemporal optical vortex(STOV)wavepacket carrying transverse photonic orbital angular momentum(OAM)has been extensively studied in the past few *** this Letter,we propose and study a novel STOV wavepacket with multiple phase singularities embedded in different space–time domains using analytical and numerical *** tuning different parameters used for designing the wavepacket,it is possible to engineer both the magnitude and orientation of the photonic OAM in space–*** vectorially controllable OAM will pave new avenues and facilitate applications such as novel optical communication,studying complicated quantum systems,and spin-and-OAM interactions.
Soil ionization is important for several engineering applications since when occurring dominates the impulse behavior of grounding systems. Thus, knowledge on electrical discharge characteristics developing in soil is...
详细信息
暂无评论