Computation offloading is a promising way of improving the performance and reducing the battery power consumption, since it moves some time-consuming computation activities to nearby servers. Although various approach...
详细信息
Radars and automatic dependent surveillance -broadcast (ADS-B) are two important surveillance technologies in aerial surveillance networks. For this situations with different systematic errors of 2D radars and their t...
详细信息
ISBN:
(纸本)9781728102634
Radars and automatic dependent surveillance -broadcast (ADS-B) are two important surveillance technologies in aerial surveillance networks. For this situations with different systematic errors of 2D radars and their time-difference-arrival (TOA) measurements in the fusion center, a fuzzy track initialization method based on topology sequences (TS-FTI) for heterogeneous sensors is proposed. In this proposed method, topology sequences of various measurements from a radar and an ADS-B receiver are respectively constructed. Then the topology sequence method is utilized to classify these measurements. The measurement sets of candidate targets can be constructed by accumulating measurements in several successive sampling intervals. Finally, a fuzzy Hough transform (FHT) method is used to detect tracks. The performance of the TS-FTI method is evaluated by simulation experiments, and it is found to be better than that of the track initialization method based on standard Hough transform (HT-TI) in calculated complexity and correct initialization rate.
Smile intensity estimation is a challenging task as it required subtle feature extraction, self-adapted weighted model and classifier. complexity of the problem domains, and problems on fine-grained image recognition ...
Smile intensity estimation is a challenging task as it required subtle feature extraction, self-adapted weighted model and classifier. complexity of the problem domains, and problems on fine-grained image recognition are some of the issues related to intensity estimation. In this study, we designed a self-weighted deep convolutional neural network architecture for smiles intensity estimation using graphics processing unit. In the case of using only CK+ smile images, the accuracy of the model is also higher than that of the latest technology. Our model achieved better accuracy by just using CK+ smile images than state-of-the-art techniques. Visualizations of learned features at various layers and their deconvolutions are also presented for understanding the learning process.
Secure communication is a necessity. However, encryption is commonly only applied to the upper layers of the protocol stack. This exposes network information to eavesdroppers, including the channel's type, data ra...
详细信息
Crop diseases are a major global threat to food security. Because the lack of agriculture experts or necessary facilities, it is difficult to determine the type of disease, as well as the degree of disease in time, wh...
ISBN:
(数字)9781728157122
ISBN:
(纸本)9781728157139
Crop diseases are a major global threat to food security. Because the lack of agriculture experts or necessary facilities, it is difficult to determine the type of disease, as well as the degree of disease in time, which became the major factor affecting in crop production. In recent years, with the development of the transfer learning in deep learning domain, the experience of experts can be simulated to detect crop diseases in time. In this paper, we have proposed an improved transfer learning method based on ResNet 50 in crop disease diagnosis. The AI Challenger 2018 dataset has been deeper analyzed, the degree of crops diseases are detected. Comparing with non-transfer learning, the proposed transfer learning method achieved better results, which can significantly improve accuracy results by 5.1%~1.87% with reducing half of the running time.
Model checking is a formal verification technique. It takes an exhaustively strategy to check hardware circuits and network protocols against desired properties. Having been developed for more than three decades, mode...
详细信息
Model checking is a formal verification technique. It takes an exhaustively strategy to check hardware circuits and network protocols against desired properties. Having been developed for more than three decades, model checking is now playing an important role in softwareengineering for verifying rather complicated software artifacts. This paper surveys the role of model checking in softwareengineering. In particular, we searched for the related liter- atures published at reputed conferences, symposiums, workshops, and journals, and took a survey of (1) various model checking techniques that can be adapted to software development and their implementations, and (2) the use of model checking at different stages of a software development life cycle. We observed that model checking is useful for soft- ware debugging, constraint solving, and malware detection, and it can help verify different types of software systems, such as object- and aspect-oriented systems, service-oriented applications, web-based applications, and GUI applications including safety- and mission-critical systems. The survey is expected to help human engineers understand the role of model checking in softwareengineering, and as well decide which model checking technique(s) and/or tool(s) are applicable for developing, analyzing and verifying a practical software system. For researchers, the survey also points out how model checking has been adapted to their research topics on softwareengineering and its challenges.
With the rapid development of information technology and the continuous evolution of personalized ser- vices, huge amounts of data are accumulated by large internet companies in the process of serving users. Moreover,...
详细信息
With the rapid development of information technology and the continuous evolution of personalized ser- vices, huge amounts of data are accumulated by large internet companies in the process of serving users. Moreover, dynamic data interactions increase the intentional/unintentional persistence of private infor- mation in different information systems. However, problems such as the cask principle of preserving pri- vate information among different information systems and the dif culty of tracing the source of privacy violations are becoming increasingly serious. Therefore, existing privacy-preserving schemes cannot pro- vide systematic privacy preservation. In this paper, we examine the links of the information life-cycle, such as information collection, storage, processing, distribution, and destruction. We then propose a the- ory of privacy computing and a key technology system that includes a privacy computing framework, a formal de nition of privacy computing, four principles that should be followed in privacy computing, ffect algorithm design criteria, evaluation of the privacy-preserving effect, and a privacy computing language. Finally, we employ four application scenarios to describe the universal application of privacy computing, and discuss the prospect of future research trends. This work is expected to guide theoretical research on user privacy preservation within open environments.
In 3D surface reconstruction from normals, discontinuity preservation is an important but challenging task. However, existing studies fail to address the discontinuous normal maps by enforcing the surface integrabilit...
详细信息
ISBN:
(纸本)9781728132945
In 3D surface reconstruction from normals, discontinuity preservation is an important but challenging task. However, existing studies fail to address the discontinuous normal maps by enforcing the surface integrability in the continuous domain. This paper introduces a robust approach to preserve the surface discontinuity in the discrete geometry way. Firstly, we design two representative normal incompatibility features and propose an efficient discontinuity detection scheme to determine the splitting pattern for a discrete mesh. Secondly, we model the discontinuity preservation problem as a light-weight energy optimization framework by jointly considering the discontinuity detection and the overall reconstruction error. Lastly, we further shrink the feasible solution space to reduce the complexity based on the prior knowledge. Experiments show that the proposed method achieves the best performance on an extensive 3D dataset compared with the state-of-the-arts in terms of mean angular error and computational complexity.
Asthma is an inflammatory and airway-induced lung disease that causes breathlessness, wheezing and often life-threatening attacks. It is necessary for patients with asthma to predict severe exacerbation caused by unco...
详细信息
ISBN:
(数字)9781728142425
ISBN:
(纸本)9781728142432
Asthma is an inflammatory and airway-induced lung disease that causes breathlessness, wheezing and often life-threatening attacks. It is necessary for patients with asthma to predict severe exacerbation caused by uncontrolled asthma. So, there is a need for a framework that can predict the likelihood of asthma in a patient with maximum accuracy. In this paper, an effective mechanism for asthma disease prediction has been used by mining the data containing patients' previous health records. Four machine learning classification algorithms named as Naïve Bayes, J48, Random Forest and Random tree are used in these experiments to predict asthma disease at an early stage. The performance of all four algorithms is evaluated on various measures. Accuracy is measured over instances that are classified correctly and incorrectly. After experiments, results show that Naïve Bayes approaches 98% with the highest accuracy.
暂无评论