This paper examines the use of supervised machine learning to construct a digital twin model replicating a physical plant. An inverted pendulum simulation has been used as a case study. A comparative study was conduct...
详细信息
This study proposes an image-based three-dimensional(3D)vector reconstruction of industrial parts that can gener-ate non-uniform rational B-splines(NURBS)surfaces with high fidelity and *** contributions of this study...
详细信息
This study proposes an image-based three-dimensional(3D)vector reconstruction of industrial parts that can gener-ate non-uniform rational B-splines(NURBS)surfaces with high fidelity and *** contributions of this study include three parts:first,a dataset of two-dimensional images is constructed for typical industrial parts,including hex-agonal head bolts,cylindrical gears,shoulder rings,hexagonal nuts,and cylindrical roller bearings;second,a deep learning algorithm is developed for parameter extraction of 3D industrial parts,which can determine the final 3D parameters and pose information of the reconstructed model using two new nets,CAD-ClassNet and CAD-ReconNet;and finally,a 3D vector shape reconstruction of mechanical parts is presented to generate NURBS from the obtained shape *** final reconstructed models show that the proposed approach is highly accurate,efficient,and practical.
作者:
Li, BoqiLiu, WeiweiSchool of Computer Science
National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China
The rising threat of backdoor poisoning attacks (BPAs) on Deep Neural Networks (DNNs) has become a significant concern in recent years. In such attacks, the adversaries strategically target a specific class and genera...
详细信息
The rising threat of backdoor poisoning attacks (BPAs) on Deep Neural Networks (DNNs) has become a significant concern in recent years. In such attacks, the adversaries strategically target a specific class and generate a poisoned training set. The neural network (NN), well-trained on the poisoned training set, is able to predict any input with the trigger pattern as the targeted label, while maintaining accurate outputs for clean inputs. However, why the BPAs work remains less explored. To fill this gap, we employ a dirty-label attack and conduct a detailed analysis of BPAs in a two-layer convolutional neural network. We provide theoretical insights and results on the effectiveness of BPAs. Our experimental results on two real-world datasets validate our theoretical findings. Copyright 2024 by the author(s)
Driver’s mental stress is known as a prime factor in road crashes. The devastation of these crashes often results in losses of humans, vehicles, and infrastructure. Likewise, persistent mental stress could develop me...
详细信息
Driver’s mental stress is known as a prime factor in road crashes. The devastation of these crashes often results in losses of humans, vehicles, and infrastructure. Likewise, persistent mental stress could develop mental, cardiovascular, and abdominal disorders. Preceding research in this domain mostly focuses on feature engineering and conventional machine learning (ML) approaches. These approaches recognize different stress levels based on handcrafted features extracted from various modalities including physiological, physical, and contextual data. Acquiring the good quality features from these modalities using feature engineering is often a difficult job. The recent developments in the form of deep learning (DL) algorithms have relieved feature engineering by automatically extracting and learning resilient features. Conventional DL models, however, frequently over-fit due to large number of parameters. Thus, large networks face gradient vanishing issues causing an increase in learning failure and generalization errors. Furthermore, it is often hard to acquire a large dataset for training a deep learning model from scratch. To overcome these problems for driver’s stress recognition domain, this paper proposes fast and computationally efficient deep transfer learning models based on Xception pre-trained neural networks. These models classify the driver’s Low, Medium, and High stress levels through electrocardiogram (ECG), heart rate (HR), galvanic skin response (GSR), electromyogram (EMG), and respiration (RESP) signals. Continuous Wavelet Transform (CWT) acquires the scalograms for ECG, HR, GSR, EMG, and RESP signals separately. Then unimodal Xception models are trained based on these scalograms to classify the three stress levels. The proposed Xception models have achieved 97.2%, 86.4%, 82.7%, 71.9%, and 68.9% average validation accuracies based on ECG, RESP, HR, GSR, and EMG signals, respectively. The fuzzy EDAS (evaluation based on distance from average solutio
Being able to see is fundamental to almost every aspect of our everyday lives, thus those who are visually impaired confront enormous obstacles. Thanks to recent developments in computer vision and computing, a system...
详细信息
Recently,several edge deployment types,such as on-premise edge clusters,Unmanned Aerial Vehicles(UAV)-attached edge devices,telecommunication base stations installed with edge clusters,etc.,are being deployed to enabl...
详细信息
Recently,several edge deployment types,such as on-premise edge clusters,Unmanned Aerial Vehicles(UAV)-attached edge devices,telecommunication base stations installed with edge clusters,etc.,are being deployed to enable faster response time for latency-sensitive *** fundamental problem is where and how to offload and schedule multi-dependent tasks so as to minimize their collective execution time and to achieve high resource *** approaches randomly dispatch tasks naively to available edge nodes without considering the resource demands of tasks,inter-dependencies of tasks and edge resource *** approaches can result in the longer waiting time for tasks due to insufficient resource availability or dependency support,as well as provider ***,we present Edge Colla,which is based on the integration of edge resources running across multi-edge *** Colla leverages learning techniques to intelligently dispatch multidependent tasks,and a variant bin-packing optimization method to co-locate these tasks firmly on available nodes to optimally utilize *** experiments on real-world datasets from Alibaba on task dependencies show that our approach can achieve optimal performance than the baseline schemes.
During software evolution, it is advocated that test code should co-evolve with production code. In real development scenarios, test updating may lag behind production code changing, which may cause compilation failur...
详细信息
A novel design approach to wideband, dual-mode resonant monopole antenna with stable, enhanced backfire gain is advanced. The sectorial monopole evolves from a linear, 0.75-wavelength electric prototype monopole under...
详细信息
A novel design approach to wideband, dual-mode resonant monopole antenna with stable, enhanced backfire gain is advanced. The sectorial monopole evolves from a linear, 0.75-wavelength electric prototype monopole under wideband dual-mode resonant operation. As theoretically predicted by the two resonant modes TE3/5,1and TE9/5,1within a 150° radiator, the operation principle is revealed at first. As have been numerically demonstrated and experimentally validated at 2.4-GHz band, the designed antenna exhibits a wide impedance bandwidth over 90.1%(i.e., 2.06–5.44 GHz), in which the stable gain bandwidth in the backfire,-x-direction(θ = 90°, φ = 180°) with peak value of 3.2 dBi and fluctuation less than 3 dB is up to 45.3%(i.e., 3.74–5.44 GHz). It is concluded that the stable wideband backfire gain frequency response should be owing to the high-order resonant mode in the unique sectorial monopole antennas.
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure ***,there is a bad need for protecting and securing the color medical...
详细信息
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure ***,there is a bad need for protecting and securing the color medical images against impostors and *** this paper,an optical medical image security approach is *** is based on the optical bit-plane Jigsaw Transform(JT)and Fractional Fourier Transform(FFT).Different kernels with a lone lens and a single arbitrary phase code are exploited in this security approach.A preceding bit-plane scrambling process is conducted on the input color medical images prior to the JT and FFT processes to accomplish a tremendous level of robustness and *** confirm the efficiency of the suggested security approach for secure color medical image communication,various assessments on different color medical images are examined based on different statistical security ***,a comparative analysis is introduced between the suggested security approach and other conventional cryptography *** simulation outcomes acquired for performance assessment demonstrate that the suggested security approach is highly *** has excellent encryption/decryption performance and superior security results compared to conventional cryptography approaches with achieving recommended values of average entropy and correlation coefficient of 7.63 and 0.0103 for encrypted images.
暂无评论