Fire Risk Monitoring of Tamarix chinensis Forest Based on Infrared Remote Sensing Technology
In this study, the Tamarixchinensis forest in Changyi national marine ecological special protected area in Shandong province, China, was researched for forest fire monitoring based on thermal infrared remote sensing technology. We summarized the ...
Fall Monitoring System Based on Wearable Device and Improved KNN
For the elderly, falls can be extremely fatal. However, due to the physical decline of the elderly, it is difficult to avoid falls. Therefore, to the greatest extent feasible lessen the harm that falls on the elderly inflict, so that they can be ...
RF Source Localization Method Based on a Single-Anchor and Map Using Reflection in an Improved Particle Filter
This paper presents a new method of localizing radio frequency (RF) source in non-line of sight (NLOS) using data collected using the anchor and map. The measurable observation in the unmanned aerial vehicle (UAV) is assumed to be the received ...
A Research on Genetic Algorithm-Based Task Scheduling in Cloud-Fog Computing Systems
In recent years, the proliferating of IoT (Internet of things)-originated applications have generated huge amounts of data, which has put enormous pressure on infrastructures such as the network cloud. In this regard, scholars have proposed an ...
CSASNet—A Crop Leaf Disease Identification Method Based on Improved ShuffleNetV2
In identifying crop leaf diseases, Due to the complex nature of the disease symptoms. There may be variations in disease symptoms with similar characteristics and similarities in disease symptoms with different elements. This can make it ...
Secure Turbo Codes Design Using Chaotic Interleaver Based on Generalized 2D Chaotic Map
Design of interleavers with a compromise between reliability and complexity of implementation is a challenging code design problem. This paper deals with the design of chaotic interleavers for secure turbo codes using a novel generalized 2D ...
Facial Expression Recognition Based on Multiscale Features and Attention Mechanism
Facial features extracted from deep convolutional networks are susceptible to background, individual identity and other factors. It interferes with facial expression recognition when mixed with useless features. Considering that different scale ...
Improved AOA Algorithm to Optimize Image Entropy for Image Recognition Model
With the continuous development of computer vision, the application of image recognition technology is becoming increasingly widespread. An edge detection image recognition model based on improved artificial bee colony algorithm has been proposed. ...
Building a Production-Ready Keyword Detection System on a Real-World Audio
This paper deals with the problem of creating a keyword spotting (KWS) system with real-world audio data. The paper describes the different methods used to build KWS systems, deep learning models such as convolutional neural networks (CNN), ...
Majorization Resource for Visual Communication Effect of Multiframe Low-Resolution Photograph Sequence
In contemporary society, individuals have elevated expectations for visual communication. Low-resolution images can negatively impact image quality and viewing experience. As a result, enhancing the visual communication of multiframe, low-...
Research on Binocular Vision Image Calibration Method Based on Canny Operator
In this paper, on the basis of in-depth research on the key technology of binocular vision measurement; a set of multidimension online measurement system for image recognition is built. Canny operator is used as a tool to detect the contour ...