In medical image analysis, the long-range spatial features are often not accurately obtained by the traditional convolutional neural networks. Hence, we propose a TransClaw U-Net network structure. The transformer par...
详细信息
Because of rapid growth of multimedia data over the Internet, the infobesity has been emerging in recent years. Many recommender systems (RSs) have been proposed using a variety of techniques, including artificial int...
详细信息
In this work, we develop a multipath-based simultaneous localization and mapping (SLAM) method that can directly be applied to received radio signals. In existing multipath-based SLAM approaches, a channel estimator i...
In this work, we develop a multipath-based simultaneous localization and mapping (SLAM) method that can directly be applied to received radio signals. In existing multipath-based SLAM approaches, a channel estimator is used as a preprocessing stage that reduces data flow and computational complexity by extracting features related to multipath components (MPCs). We aim to avoid any preprocessing stage that may lead to a loss of relevant information. The presented method relies on a new statistical model for the data generation process of the received radio signal that can be represented by a factor graph. This factor graph is the starting point for the development of an efficient belief propagation (BP) method for multipath-based SLAM that directly uses received radio signals as measurements. Simulation results in a realistic scenario with a single-input single-output (SISO) channel demonstrate that the proposed direct method for radio-based SLAM outperforms state-of-the-art methods that rely on a channel estimator.
This paper presents the current use of the Internet of Things (IoT) in fire evacuation and extinction. It examines the different approaches to the problem and technologies like Building Information Modeling (BIM) and ...
This paper presents the current use of the Internet of Things (IoT) in fire evacuation and extinction. It examines the different approaches to the problem and technologies like Building Information Modeling (BIM) and mathematical algorithms that can be used to determine the optimal evacuation route. It also evaluates existing fire security solutions such as smoke, flame, motion, and gas sensors, LED lights, buzzers, and SMS modules. Entities that specialize in Residential and Commercial Security Systems and Home Automation are also discussed, along with the services they offer. The main objective of this study is to understand current systems and resources regarding fire evacuation and extinction systems and to analyze different developments in smart buildings to create an efficient system for fire detection and evacuation.
The new era of technology is being greatly influenced by the field of artificial intelligence. computer vision and deep learning have become increasingly important due to their ability to process vast amounts of data ...
The new era of technology is being greatly influenced by the field of artificial intelligence. computer vision and deep learning have become increasingly important due to their ability to process vast amounts of data and provide insights and solutions in a variety of fields. computer vision, deep learning and signal analysis have been used in a growing number of applications and services including smart devices, image, and speech recognition, healthcare, etc., one such device is an infant monitoring system. It monitors the daily activities of the infant such as their sleeping patterns, sounds, and movements. In this paper, deep learning and computer vision libraries were used to develop algorithms to detect whether the infant was in any uncomfortable situation such as sleeping on its back, face being covered and whether the infant was awake. The smart infant monitoring system detects the infant's unsafe resting situation in real time and sent immediate alerts to the caretaker's device. This paper presents the design flow of a smart infant monitoring system consisting of a night vision camera, a Jetson Nano, and a Wi-Fi internet connection. The pose estimation and awake detection algorithms were developed and tested successfully for different infant resting/sleeping situations. The smart infant monitoring system provides significant benefits for safety and an improved understanding of infants' sleep patterns and behavior.
This research proposes a system that leverages stereo vision and monocular depth estimation to form a depth map from which a 3D point cloud scene is extracted. The emergence of competitive neural networks for depth ma...
详细信息
The efficacy of photovoltaic systems is significantly impacted by electrical production losses attributed to faults. Ensuring the rapid and cost-effective restoration of system efficiency necessitates robust fault det...
详细信息
The efficacy of photovoltaic systems is significantly impacted by electrical production losses attributed to faults. Ensuring the rapid and cost-effective restoration of system efficiency necessitates robust fault detection and diagnosis (FDD) procedures. This study introduces a novel interval-gated recurrent unit (I-GRU) based Bayesian optimization framework for FDD in grid-connected photovoltaic (GCPV) systems. The utilization of an interval-valued representation is proposed to address uncertainties inherent in the systems, the GRU is employed for fault classification, while the Bayesian algorithm optimizes its hyperparameters. Addressing uncertainties through the proposed approach enhances monitoring capabilities, mitigating computational and storage costs associated with sensor uncertainties. The effectiveness of the proposed approach for FDD in GCPV systems is demonstrated using experimental application.
computer vision has proven itself capable of accurately detecting and classifying objects within images. This also works in cases where images are used as a way of representing data, without being actual photographs. ...
computer vision has proven itself capable of accurately detecting and classifying objects within images. This also works in cases where images are used as a way of representing data, without being actual photographs. In cybersecurity, computer vision is rarely used, however it has been used to detect botnets successfully. We applied computer vision to determine how well it would be able to detect and classify a large number of attacks and determined that it would be able to run at a decent rate on a Jetson Nano. This was accomplished by training a convolutional neural network using data publicly available in the IoT-23 database, which contains packet captures of IoT devices with and without different malware infections. The neural network was evaluated on an RTX 3050 and a Jetson Nano to see if it could be used in IoT.
Hands-on learning environments and cyber ranges are popular tools in cybersecurity education. These resources provide students with practical assessments to strengthen their abilities and can assist in transferring ma...
Hands-on learning environments and cyber ranges are popular tools in cybersecurity education. These resources provide students with practical assessments to strengthen their abilities and can assist in transferring material from the classroom to real-world scenarios. Additionally, virtualization environments, such as Proxmox, provide scalability and network flexibility that can be adapted to newly discovered threats. However, due to the increasing demand for cybersecurity skills and experience, learning environments must support an even greater number of students each term. Manual provisioning and management of environments for large student populations can consume valuable time for the instructor. To address this challenge, we developed an Environment Provisioning and Management Tool for cybersecurity education. Our solution interacts with the exposed Proxmox API to automate the process of user creation, server provisioning, and server destruction for a large set of users. Remote access will be managed by a pfSense firewall. Based on our testing, a six-machine user environment could be provisioned in 14.96 seconds and destroyed in 15.06 seconds.
We propose a distributed system based on low-power embedded FPGAs designed for edge computing applications focused on exploring distributing scheduling optimizations for Deep Learning (DL) workloads to obtain the best...
We propose a distributed system based on low-power embedded FPGAs designed for edge computing applications focused on exploring distributing scheduling optimizations for Deep Learning (DL) workloads to obtain the best performance regarding latency and power efficiency. Our cluster was modular throughout the experiment, and we have implementations that consist of up to 12 Zynq-7020 chip-based boards as well as 5 UltraScale+ MPSoC FPGA boards connected through an ethernet switch, and the cluster will evaluate configurable Deep Learning Accelerator (DLA) Versatile Tensor Accelerator (VTA). This adaptable distributed architecture is distinguished by its capacity to evaluate and manage neural network workloads in numerous configurations which enables users to conduct multiple experiments tailored to their specific application needs. The proposed system can simultaneously execute diverse Neural Network (NN) models, arrange the computation graph in a pipeline structure, and manually allocate greater resources to the most computationally intensive layers of the NN graph.
暂无评论