Iterative inference approaches have shown promising success in the task of multi-view depth estimation. However, these methods put excessive emphasis on the universal inter-view correspondences while neglecting the co...
详细信息
Iterative inference approaches have shown promising success in the task of multi-view depth estimation. However, these methods put excessive emphasis on the universal inter-view correspondences while neglecting the correspondence ambiguity in regions of low texture and depth discontinuous areas. Thus, they are prone to produce inaccurate or even erroneous depth estimations, which is further exacerbated cumulative errors especially in the iterative pipeline, providing unreliable information in many real-world scenarios. In this paper, we revisit this issue from the intra-view Contextual Hints and introduce a novel enhancing iterative approach, named EnIter. Concretely, at the beginning of each iteration, we present a Depth Intercept (DI) modulator to provide more accurate depth by aggregating neighbor uncertainty, correlation volume of reference and normal. This plug and play modulator is effective at intercepting the erroneous depth estimations with implicit guidance from the universal correlation contextual hints, especially for the challenging regions. Furthermore, at the end of each iteration, we refine the depth map with another plug and play modulator termed as Depth Refine (DR). It mines the latent structure knowledge of reference Contextual Hints and establishes one-way dependency using local attention from reference features to depth, yielding delicate depth in details. Extensive experiment demonstrates that our method not only achieves state-of-the-art performance over existing models but also exhibits remarkable universality in popular iterative pipelines, e.g., CasMVS, UCSNet, TransMVS, UniMVS.
The Medical Internet of Things (MIoT) requires extreme information and communication security, particularly for remote consultation systems. MIoT’s integration of physical and computational components creates a seaml...
详细信息
The Medical Internet of Things (MIoT) requires extreme information and communication security, particularly for remote consultation systems. MIoT’s integration of physical and computational components creates a seamless network of medical devices providing high-quality care via continuous monitoring and treatment. However, traditional security methods such as cryptography cannot prevent privacy compromise and information leakage caused by security breaches. To solve this issue, this paper proposes a novel Federated Learning Intrusion Detection system (FLIDS). FLIDS combines Generative Adversarial Network (GAN) and Federated Learning (FL) to detect cyber attacks like Denial of Service (DoS), data modification, and data injection using machine learning. FLIDS shows exceptional performance with over 99% detection accuracy and 1% False Positive Rate (FPR). It saves bandwidth by transmitting 3.8 times fewer bytes compared to central data collection. These results prove FLIDS’ effectiveness in detecting and mitigating security threats in Medical Cyber-Physical systems (MCPS). The paper recommends scaling up FLIDS to use computing resources from multiple mobile devices for better intrusion detection accuracy and efficiency while reducing the burden on individual devices in MIoT.
This proceedings contains the papers presented at the 2004 IFIP International Conference on Network and Parallel computing (NPC 2004), held at Wuhan, China, from October 18 to 20, 2004. The goal of the conference was ...
详细信息
ISBN:
(数字)9783540301417
ISBN:
(纸本)9783540233886
This proceedings contains the papers presented at the 2004 IFIP International Conference on Network and Parallel computing (NPC 2004), held at Wuhan, China, from October 18 to 20, 2004. The goal of the conference was to establish an international forum for engineers and scientists to present their ideas and experiences in network and parallel computing. A total of 338 submissions were received in response to the call for papers. These papers werefrom Australia, Brazil,Canada,China, Finland, France, G- many, Hong Kong, India, Iran, Italy, Japan, Korea, Luxemburg, Malaysia, N- way, Spain, Sweden, Taiwan, UK, and USA. Each submission was sent to at least three *** paper was judged according to its originality,inno- tion, readability, and relevance to the expected audience. Based on the reviews received, a total of 69 papers were accepted to be included in the proceedings. Among the 69 papers, 46 were accepted as full papers and were presented at the *** accepted23papersasshortpapers;eachofthesepaperswas given an opportunity to have a brief presentation at the conference, followed by discussions in a poster session. Thus, due to the limited scope and time of the conference and the high number of submissions received, only 20% of the total submissions were included in the ?nal program.
After two decades, data processing has finally, and probably forever, found its niche among civil engineering and construction (CEC) professionnals, through word processors, digitizing tables, management software, and...
详细信息
ISBN:
(数字)9781468474046
ISBN:
(纸本)9781850912538
After two decades, data processing has finally, and probably forever, found its niche among civil engineering and construction (CEC) professionnals, through word processors, digitizing tables, management software, and increasingly via drawing software and computer-aided design (CAD), recently, robots have even started invading work sites. What are the main trends of CAD and robotics in the field of architecture and civil enginee ring? What type of R&D effort do university and industrial laboratories undertake to devise the professional software that will be on the market in the next three to five years? These are the issues which will be addressed during this symposium. To this effect, we have planned concurrently an equipment and software show, as well as a twofold conference. Robotic is just starting in the field of civil engineering and construction. A pioneer, the Civil Engineering Departement of Carnegie-Mellon University, in the United States, organized the first two international symposia, in 1984 and 1985 in Pittsburgh. This is the third meeting on the subject (this year, however, we have also included CAD). It constitutes the first large international symposium where CAD experts, specialists in architecture and CEC robotics will meet. From this standpoint, it should be an ideal forum for exchanging views and expe riences on a wide range of topics, and we hope it will give rise to novel applications and new syntheses. This symposium is intented for scientists, teachers, students and also for manufacturers and all CEC professionals.
The goal of this book is to explore various security paradigms such as Machine Learning, Big data, Cyber Physical systems, and Blockchain to address both intelligence and reconfigurability in various IoT devices. The ...
详细信息
ISBN:
(数字)9783031319525
ISBN:
(纸本)9783031319518;9783031319549
The goal of this book is to explore various security paradigms such as Machine Learning, Big data, Cyber Physical systems, and Blockchain to address both intelligence and reconfigurability in various IoT devices. The book further aims to address and analyze the state of the art of blockchain-based intelligent networks in IoT systems and related technologies including healthcare sector. AI can ease, optimize, and automate the blockchain-based decision-making process for better governance and higher performance in IoT systems. Considering the incredible progress made by AI models, a blockchain system powered by intelligent AI algorithms can detect the existence of any kind of attack and automatically invoke the required defense mechanisms. In case of unavoidable damage, AI models can help to isolate the compromised component from the blockchain platform and safeguard the overall system from crashing. Furthermore, AI models can also contribute toward the robustness and scalability of blockchain-based intelligent IoT networks. The book is designed to be the first-choice reference at university libraries, academic institutions, research and development centers, information technology centers, and any institutions interested in integration of AI and IoT. The intended audience of this book include UG/PG students, Ph.D. scholars of this fields, industry technologists, young entrepreneurs, professionals, network designers, data scientists, technology specialists, practitioners, and people who are interested in exploring the role of AI and blockchain technology in IoT systems.
WebAssembly (abbreviated as Wasm) was initially introduced for the Web and quickly extended its reach into various domains beyond the Web. To create Wasm applications, developers can compile high-level programming lan...
详细信息
WebAssembly (abbreviated as Wasm) was initially introduced for the Web and quickly extended its reach into various domains beyond the Web. To create Wasm applications, developers can compile high-level programming languages into Wasm binaries or manually write the textual format of Wasm and translate it into Wasm binaries by the toolchain. Regardless of whether it is utilized within or outside the Web, the execution of Wasm binaries is supported by the Wasm runtime. Such a runtime provides a secure, memory-efficient, and sandboxed execution environment to execute Wasm binaries. This paper provides a comprehensive survey of research on Wasm runtimes with 103 collected research papers related to Wasm runtimes following the traditional systematic literature review process. It characterizes existing studies from two different angles, including the internal research of Wasm runtimes (Wasm runtime design, testing, and analysis) and the external research (applying Wasm runtimes to various domains). This paper also proposes future research directions about Wasm runtimes.
The advancement of the Internet of Medical Things (IoMT) has led to the emergence of various health and emotion care services, e.g., health monitoring. To cater to increasing computational requirements of IoMT service...
详细信息
The advancement of the Internet of Medical Things (IoMT) has led to the emergence of various health and emotion care services, e.g., health monitoring. To cater to increasing computational requirements of IoMT services, Mobile Edge computing (MEC) has emerged as an indispensable technology in smart health. Benefiting from the cost-effectiveness of deployment, unmanned aerial vehicles (UAVs) equipped with MEC servers in Non-Orthogonal Multiple Access (NOMA) have emerged as a promising solution for providing smart health services in proximity to medical devices (MDs). However, the escalating number of MDs and the limited availability of communication resources of UAVs give rise to a significant increase in transmission latency. Moreover, due to the limited communication range of UAVs, the geographically-distributed MDs lead to workload imbalance of UAVs, which deteriorates the service response delay. To this end, this paper proposes a UAV-enabled Distributed computation Offloading and Power control method with Multi-Agent, named DOPMA, for NOMA-based IoMT environment. Specifically, this paper introduces computation and transmission queue models to analyze the dynamic characteristics of task execution latency and energy consumption. Moreover, a credit assignment scheme-based reward function is designed considering both system-level rewards and rewards tailored to each MD, and an improved multi-agent deep deterministic policy gradient algorithm is developed to derive offloading and power control decisions independently. Extensive simulations demonstrate that the proposed method outperforms existing schemes, achieving \(7.1\%\) reduction in energy consumption and \(16\%\) decrease in average delay.
暂无评论