期刊文献+
共找到231,978篇文章
< 1 2 250 >
每页显示 20 50 100
Complex field network-coded cooperation based on multi-user detection in wireless networks 被引量:2
1
作者 Jing Wang Xiangyang Liu +1 位作者 Kaikai Chi Xiangmo Zhao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2013年第2期215-221,共7页
Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC... Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC) scheme based on multi-user detection for the multiple unicast transmission is proposed.Theoretic analysis and simulation results demonstrate that,compared with the conventional cooperation(CC) scheme and network-coded cooperation(NCC) scheme,CFNCC would obtain higher network throughput and consumes less time slots.Moreover,a further investigation is made for the symbol error probability(SEP) performance of CFNCC scheme,and SEPs of CFNCC scheme are compared with those of NCC scheme in various scenarios for different signal to noise ratio(SNR) values. 展开更多
关键词 network coding complex field wireless network cooperative communication multi-user detection
下载PDF
Wavelet Packet Domain LMS Based Multi-User Detection 被引量:1
2
作者 刘鹏 安建平 《Journal of Beijing Institute of Technology》 EI CAS 2008年第4期484-488,共5页
An improved wavelet packet domain least mean square (IWPD-LMS) based adaptive muhiuser detection algorithm is proposed. The algorithm employs the wavelet packet transform to rewhiten the input data, and chooses the ... An improved wavelet packet domain least mean square (IWPD-LMS) based adaptive muhiuser detection algorithm is proposed. The algorithm employs the wavelet packet transform to rewhiten the input data, and chooses the best wavelet packet basis according to a novel convergence contribution function rather than the conventional Shannon entropy. The theoretic analyses show that the inadequacy of the eigenvalue spread of the tap-input correlation matrix is ameliorated, thus the convergence performance is improved greatly. The simulation result of convergence performance and bit error rate(BER) performance as a function of the signal power to noise power ratio(SNR) are presented finally to prove the validity of the proposed algorithm. 展开更多
关键词 multi-user detection least mean square (LMS) wavelet packet wavelet packet basis
下载PDF
RLS and LMS blind adaptive multi-user detection method and comparison in acoustic communication 被引量:7
3
作者 WANG Zhongqiu WANG Hongru MENG Qingming 《Instrumentation》 2015年第2期47-54,共8页
RLS and LMS blind adaptive multi-user detection algorithm and multi-user detector was proposed to solve the problem of multi-user signal detection problem encountered in underwater acoustic communication networks.In s... RLS and LMS blind adaptive multi-user detection algorithm and multi-user detector was proposed to solve the problem of multi-user signal detection problem encountered in underwater acoustic communication networks.In simulation analysis,RLS and the LMS blind adaptive multi-user detector were designed and tested for synchronous and asynchronous multi-user communication process.The results of SIR comparison and MMSE comparison show that,both of the two methods can realize blind adaptive detection when any user change in multi-user communication,during this process,the training communication sequences are not needed.The RLS algorithm has about 5 dB higher in SIR compared with LMS algorithm,and the convergence velocity of RLS algorithm is also higher than LMS algorithm when the communication users change.RLS algorithm has better ability in multi-user detection than that of LMS algorithm,and it has great attraction and guiding significance for solving the problem of multiple access interference(MAI) in multi-user communication. 展开更多
关键词 recursive least squares least mean square method multi-user detection blind adaptive acoustic communication
下载PDF
Study of multi-rate multi-user detection based on supervision decision
4
作者 杨涛 谢剑英 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第3期413-418,共6页
Multi-user detection (MUD) based on multirate transmission in code division multiple access (CDMA) system is discussed. Under the requirement of signal interference ratio (SIR) detection at base station and framework ... Multi-user detection (MUD) based on multirate transmission in code division multiple access (CDMA) system is discussed. Under the requirement of signal interference ratio (SIR) detection at base station and framework with parallel interference cancellation, a supervision decision algorithm based on pre-decision of probabilistic data association (PDA) and hard decision is proposed. The detection performance is analyzed and simulation is implemented to show that the supervision decision algorithm improves the detection performance effectively. 展开更多
关键词 CDMA MULTI-RATE multi-user detection supervision decision.
下载PDF
Joint Channel and Multi-User Detection Empowered with Machine Learning
5
作者 Mohammad Sh.Daoud Areej Fatima +6 位作者 Waseem Ahmad Khan Muhammad Adnan Khan Sagheer Abbas Baha Ihnaini Munir Ahmad Muhammad Sheraz Javeid Shabib Aftab 《Computers, Materials & Continua》 SCIE EI 2022年第1期109-121,共13页
The numbers of multimedia applications and their users increase with each passing day.Different multi-carrier systems have been developed along with varying techniques of space-time coding to address the demand of the... The numbers of multimedia applications and their users increase with each passing day.Different multi-carrier systems have been developed along with varying techniques of space-time coding to address the demand of the future generation of network systems.In this article,a fuzzy logic empowered adaptive backpropagation neural network(FLeABPNN)algorithm is proposed for joint channel and multi-user detection(CMD).FLeABPNN has two stages.The first stage estimates the channel parameters,and the second performsmulti-user detection.The proposed approach capitalizes on a neuro-fuzzy hybrid systemthat combines the competencies of both fuzzy logic and neural networks.This study analyzes the results of using FLeABPNN based on a multiple-input andmultiple-output(MIMO)receiver with conventional partial oppositemutant particle swarmoptimization(POMPSO),total-OMPSO(TOMPSO),fuzzy logic empowered POMPSO(FL-POMPSO),and FL-TOMPSO-based MIMO receivers.The FLeABPNN-based receiver renders better results than other techniques in terms of minimum mean square error,minimum mean channel error,and bit error rate. 展开更多
关键词 Channel and multi-user detection minimum mean square error multiple-input and multiple-output minimum mean channel error bit error rate
下载PDF
ROLS-AWS algorithm used in RBF neural network for multi-user detection
6
作者 王永建 赵洪林 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第4期553-557,共5页
To improve the computational speed, the ROLS-AWS algorithm was employed in the RBF based MUD receiver. The radial basis function was introduced into the multi-user detection (MUD) firstly. Then a three-layer neural ... To improve the computational speed, the ROLS-AWS algorithm was employed in the RBF based MUD receiver. The radial basis function was introduced into the multi-user detection (MUD) firstly. Then a three-layer neural network demodulation spread-spectrum signal model in the synchronous Gauss channel was given and the multi-user detection receiver was analyzed intensively. Simulations by computer illustrate that the proposed RBF based MUD receiver employing the ROKS-AWS algorithm is better than conventional detectors and common BP neural network based MUD receivers on suppressing multiple access interference and near-far resistance. 展开更多
关键词 multi-user detection (MUD) RBF neural network ROLS-AWS algorithm
下载PDF
A New Approach to Multi-user Detection in DS-CDMA
7
作者 Tu Zhenyu 涂震宇 《High Technology Letters》 EI CAS 2001年第1期27-30,共4页
A graph model is constructed for the Multi-user Detection of DS-CDMA system. Based on it, a Hopfield-like algorithm is put forward for the implementation of optimum receiver. Compared with the Hopfield approach, it ha... A graph model is constructed for the Multi-user Detection of DS-CDMA system. Based on it, a Hopfield-like algorithm is put forward for the implementation of optimum receiver. Compared with the Hopfield approach, it has a higher computational complexity but better performance. 展开更多
关键词 DS-CDMA multi-user detection Optimum receiver Hopfield neural networks Minimum Cut (MC).
下载PDF
Dynamic multi-user detection scheme based on CVA-SSAOMP algorithm in uplink grant-free NOMA
8
作者 Xu Lei Tao Shangjin +3 位作者 Bai Shichao Zhang Jian Fang Hongyu Li Xiaohui 《High Technology Letters》 EI CAS 2021年第1期10-16,共7页
In the uplink grant-free non-orthogonal multiple access(NOMA)scenario,since the active user at the sender has a structured sparsity transmission characteristic,the compressive sensing recovery algorithm is initially a... In the uplink grant-free non-orthogonal multiple access(NOMA)scenario,since the active user at the sender has a structured sparsity transmission characteristic,the compressive sensing recovery algorithm is initially applied to the joint detection of the active user and the transmitted data.However,the existing compressed sensing recovery algorithms with unknown sparsity often require noise power or signal-to-noise ratio(SNR)as the priori conditions,which greatly reduces the algorithm adaptability in multi-user detection.Therefore,an algorithm based on cross validation aided structured sparsity adaptive orthogonal matching pursuit(CVA-SSAOMP)is proposed to realize multi-user detection in dynamic change communication scenario of channel state information(CSI).The proposed algorithm transforms the structured sparsity model into a block sparse model,and without the priori conditions above,the cross validation method in the field of statistics and machine learning is used to adaptively estimate the sparsity of active user through the residual update of cross validation.The simulation results show that,compared with the traditional orthogonal matching pursuit(OMP)algorithm,subspace pursuit(SP)algorithm and cross validation aided block sparsity adaptive subspace pursuit(CVA-BSASP)algorithm,the proposed algorithm can effectively improve the accurate estimation of the sparsity of active user and the performance of system bit error ratio(BER),and has the advantage of low-complexity. 展开更多
关键词 non-orthogonal multiple access(NOMA) multi-user detection cross validation structured sparsity(SP) orthogonal matching pursuit(OMP)
下载PDF
Quantum Multi-User Detection Based on Coherent State Signals
9
作者 Wenbin Yu Yinsong Xu +2 位作者 Wenjie Liu Alex Xiangyang Liu Baoyu Zheng 《Journal of Quantum Computing》 2019年第2期81-88,共8页
Multi-user detection is one of the important technical problems for moderncommunications. In the field of quantum communication, the multi-access channel onwhich we apply the technology of quantum information processi... Multi-user detection is one of the important technical problems for moderncommunications. In the field of quantum communication, the multi-access channel onwhich we apply the technology of quantum information processing is still an openquestion. In this work, we investigate the multi-user detection problem based on thebinary coherent-state signals whose communication way is supposed to be seen as aquantum channel. A binary phase shift keying model of this multi-access channel isstudied and a novel method of quantum detection proposed according to the conclusionof the quantum measurement theory. As a result, the average interference betweendeferent users is presented and the average error probability of the quantum detection isderived theoretically. Finally, we show the maximum channel capacity of this effectivedetection for a two-access quantum channel. 展开更多
关键词 multi-user detection multi-access channels quantum communication quantum information processing
下载PDF
Joint Multi-User Detection with Weighting Factors for Unsourced Multiple Access
10
作者 Yu Liu Kai Niu Yuanjie Li 《Journal of Computer and Communications》 2023年第9期121-131,共11页
Multi-user detection techniques are currently being studied as highly promising technologies for improving the performance of unsourced multiple access systems. In this paper, we propose joint multi-user detection sch... Multi-user detection techniques are currently being studied as highly promising technologies for improving the performance of unsourced multiple access systems. In this paper, we propose joint multi-user detection schemes with weighting factors for unsourced multiple access. First, we introduce bidirectional weighting factors in the extrinsic information passing process between the multi-user detector based on belief propagation (BP) and the LDPC decoder. Second, we incorporate bidirectional weighting factors in the message passing process between the MAC nodes and the user variable nodes in BP- based multi-user detector. The proposed schemes select the optimal weighting factors through simulations. The simulation results demonstrate that the proposed schemes exhibit significant performance improvements in terms of block error rate (BLER) compared to traditional schemes. . 展开更多
关键词 COMMUNICATION Sparse IDMA multi-user detection Belief Propagation
下载PDF
Multi-User Detection for Spatial Modulation toward 5G Wireless Communications 被引量:1
11
作者 Shiwen Fan, Yue Xiao +3 位作者 Xia Lei Rong Shi Ke Deng Shaoqian Li 《China Communications》 SCIE CSCD 2017年第12期100-110,共11页
Spatial modulation(SM) is a class of novel multiple-input multiple-output(MIMO) techniques toward future wireless communications,which activates only one transmit antenna in each time slot,so as to reduce the number o... Spatial modulation(SM) is a class of novel multiple-input multiple-output(MIMO) techniques toward future wireless communications,which activates only one transmit antenna in each time slot,so as to reduce the number of RF chains for saving the implement cost.Meanwhile,considering its application in 5G systems with multiple users,the detection of multi-user spatial modulation has drawn greater attention.In this paper,a pair of efficient detectors are proposed for multi-user spatial modulation.Specially,a threshold-aided approximate message passing(T-AMP) detector is proposed with the purpose of reducing the computational complexity of traditional structured approximate message passing(Str-AMP) detector.In addition,a novel probability sorting aided approximate message passing detector,called probability-ranking-aided AMP detector(P-AMP),is also proposed with the purpose of improving the performance.Simulation results show that the proposed T-AMP detector is able to achieve similar performance as traditional StrAMP with lower complexity,while the proposed P-AMP detector exhibits a better symbol error rate(SER) performance with similar complexity. 展开更多
关键词 multi-user spatial modulation PROBABILITY SORTING MESSAGE passing.
下载PDF
Intelligent multi-user detection using an artificial immune system 被引量:5
12
作者 GONG MaoGuo, JIAO LiCheng, MA WenPing & MA JingJing Key Laboratory of Intelligent Perception and Image Understanding of Ministry of Education of China Institute of Intelligent Information Processing, Xidian University, Xi’an 710071, China 《Science in China(Series F)》 2009年第12期2342-2353,共12页
Artificial immune systems (AIS) are a kind of new computational intelligence methods which draw inspiration from the human immune system. In this study, we introduce an AIS-based optimization algorithm, called clona... Artificial immune systems (AIS) are a kind of new computational intelligence methods which draw inspiration from the human immune system. In this study, we introduce an AIS-based optimization algorithm, called clonal selection algorithm, to solve the multi-user detection problem in code-division multipleaccess communications system based on the maximum-likelihood decision rule. Through proportional cloning, hypermutation, clonal selection and clonal death, the new method performs a greedy search which reproduces individuals and selects their improved maturated progenies after the affinity maturation process. Theoretical analysis indicates that the clonal selection algorithm is suitable for solving the multi-user detection problem. Computer simulations show that the proposed approach outperforms some other approaches including two genetic algorithm-based detectors and the matched filters detector, and has the ability to find the most likely combinations. 展开更多
关键词 artificial immune systems clonal selection multi-user detection code-division multiple-access genetic algorithm
原文传递
The Applicative Investigation of Adaptive BP Networks for Multi-user Detection in Asynchronous DS-CDMA Mobile Communications 被引量:2
13
作者 NI Liang-fang, ZHENG Bao-yu, WU Xin-yu (Nanjing University of Posts and Telecommunications, Nanjing 210003, P.R.China) 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2003年第1期1-8,14,共9页
Three-layer Adaptive Back-Propagation Neural Networks(TABPNN) are employed for the demodulation of spread spectrum signals in a multiple-access environment. A configuration employing three-layer adaptive Back-propagat... Three-layer Adaptive Back-Propagation Neural Networks(TABPNN) are employed for the demodulation of spread spectrum signals in a multiple-access environment. A configuration employing three-layer adaptive Back-propagation neural networks is put forward for the demodulation of spread-spectrum signals in asynchronous Gaussian channels. The theoretical arguments and practical performance based on the neural networks are analyzed. The results show that whether the resistance to the multiple access interference or the robust to near-far effects, the proposed detector significantly outperforms not only the conventional detector but also the BP neural networks detector and is comparable to the optimum detector. 展开更多
关键词 code division multiple access multi-user detection adaptive BP networks
原文传递
Iterative multi-user detection and decoding for space-time block coding systems 被引量:1
14
作者 JIN Yi-dan ZHANG Feng WU Wei-ling 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2006年第4期24-28,共5页
To restrain the interference of co-channel users using space-time block coding (STBC), the proposed Gaussian-forcing soft decision multi-user detection (GFSDMUD) algorithm is applied in fiat-fading channels by usi... To restrain the interference of co-channel users using space-time block coding (STBC), the proposed Gaussian-forcing soft decision multi-user detection (GFSDMUD) algorithm is applied in fiat-fading channels by using the relation among the users' signals, which can enhance the capacity by introducing co-channel users. During iterations, extrinsic information is calculated and exchanged between a soft multi-user detector and a bank of turbo decoders to achieve refined estimates of the users' signals. The simulations show that the proposed iterative receiver techniques provide significant performance improvement around 2 dB over conventional noniterative methods. Furthermore, iterative multi-user space-time processing techniques offer substantial performance gains around 8 dB by adding the number of receiver antennas from 4 to 6, and the system performance can be enhanced by using this strategy in multi-user STBC systems, which is very important for enlarging the system capacity. 展开更多
关键词 STBC multi-user detection Turbo processing gaussian-Forcing soft decision Turbo channel decoding
原文传递
PD-YOLO:Colon Polyp Detection Model Based on Enhanced Small-Target Feature Extraction
15
作者 Yicong Yu Kaixin Lin +2 位作者 Jiajun Hong Rong-Guei Tsai Yuanzhi Huang 《Computers, Materials & Continua》 SCIE EI 2025年第1期913-928,共16页
In recent years,the number of patientswith colon disease has increased significantly.Colon polyps are the precursor lesions of colon cancer.If not diagnosed in time,they can easily develop into colon cancer,posing a s... In recent years,the number of patientswith colon disease has increased significantly.Colon polyps are the precursor lesions of colon cancer.If not diagnosed in time,they can easily develop into colon cancer,posing a serious threat to patients’lives and health.A colonoscopy is an important means of detecting colon polyps.However,in polyp imaging,due to the large differences and diverse types of polyps in size,shape,color,etc.,traditional detection methods face the problem of high false positive rates,which creates problems for doctors during the diagnosis process.In order to improve the accuracy and efficiency of colon polyp detection,this question proposes a network model suitable for colon polyp detection(PD-YOLO).This method introduces the self-attention mechanism CBAM(Convolutional Block Attention Module)in the backbone layer based on YOLOv7,allowing themodel to adaptively focus on key information and ignore the unimportant parts.To help themodel do a better job of polyp localization and bounding box regression,add the SPD-Conv(Symmetric Positive Definite Convolution)module to the neck layer and use deconvolution instead of upsampling.Theexperimental results indicate that the PD-YOLO algorithm demonstrates strong robustness in colon polyp detection.Compared to the original YOLOv7,on the Kvasir-SEG dataset,PD-YOLO has shown an increase of 5.44 percentage points in AP@0.5,showcasing significant advantages over other mainstream methods. 展开更多
关键词 Polyp detection YOLOv7 SPD-Conv CBAM DECONVOLUTION
下载PDF
GFRF R-CNN:Object Detection Algorithm for Transmission Lines
16
作者 Xunguang Yan Wenrui Wang +3 位作者 Fanglin Lu Hongyong Fan Bo Wu Jianfeng Yu 《Computers, Materials & Continua》 SCIE EI 2025年第1期1439-1458,共20页
To maintain the reliability of power systems,routine inspections using drones equipped with advanced object detection algorithms are essential for preempting power-related issues.The increasing resolution of drone-cap... To maintain the reliability of power systems,routine inspections using drones equipped with advanced object detection algorithms are essential for preempting power-related issues.The increasing resolution of drone-captured images has posed a challenge for traditional target detection methods,especially in identifying small objects in high-resolution images.This study presents an enhanced object detection algorithm based on the Faster Regionbased Convolutional Neural Network(Faster R-CNN)framework,specifically tailored for detecting small-scale electrical components like insulators,shock hammers,and screws in transmission line.The algorithm features an improved backbone network for Faster R-CNN,which significantly boosts the feature extraction network’s ability to detect fine details.The Region Proposal Network is optimized using a method of guided feature refinement(GFR),which achieves a balance between accuracy and speed.The incorporation of Generalized Intersection over Union(GIOU)and Region of Interest(ROI)Align further refines themodel’s accuracy.Experimental results demonstrate a notable improvement in mean Average Precision,reaching 89.3%,an 11.1%increase compared to the standard Faster R-CNN.This highlights the effectiveness of the proposed algorithm in identifying electrical components in high-resolution aerial images. 展开更多
关键词 Faster R-CNN transmission line object detection GIOU GFR
下载PDF
Enhancing Deepfake Detection:Proactive Forensics Techniques Using Digital Watermarking
17
作者 Zhimao Lai Saad Arif +2 位作者 Cong Feng Guangjun Liao Chuntao Wang 《Computers, Materials & Continua》 SCIE EI 2025年第1期73-102,共30页
With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed... With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed.This paper examines the advancements inDeepfake detection and defense technologies,emphasizing the shift from passive detection methods to proactive digital watermarking techniques.Passive detection methods,which involve extracting features from images or videos to identify forgeries,encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics.In contrast,proactive digital watermarking techniques embed specificmarkers into images or videos,facilitating real-time detection and traceability,thereby providing a preemptive defense againstDeepfake content.We offer a comprehensive analysis of digitalwatermarking-based forensic techniques,discussing their advantages over passivemethods and highlighting four key benefits:real-time detection,embedded defense,resistance to tampering,and provision of legal evidence.Additionally,the paper identifies gaps in the literature concerning proactive forensic techniques and suggests future research directions,including cross-domain watermarking and adaptive watermarking strategies.By systematically classifying and comparing existing techniques,this review aims to contribute valuable insights for the development of more effective proactive defense strategies in Deepfake forensics. 展开更多
关键词 Deepfake proactive forensics digital watermarking TRACEABILITY detection techniques
下载PDF
Anomaly Detection of Controllable Electric Vehicles through Node Equation against Aggregation Attack
18
作者 Jing Guo Ziying Wang +1 位作者 Yajuan Guo Haitao Jiang 《Computers, Materials & Continua》 SCIE EI 2025年第1期427-442,共16页
The rapid proliferation of electric vehicle(EV)charging infrastructure introduces critical cybersecurity vulnerabilities to power grids system.This study presents an innovative anomaly detection framework for EV charg... The rapid proliferation of electric vehicle(EV)charging infrastructure introduces critical cybersecurity vulnerabilities to power grids system.This study presents an innovative anomaly detection framework for EV charging stations,addressing the unique challenges posed by third-party aggregation platforms.Our approach integrates node equations-based on the parameter identification with a novel deep learning model,xDeepCIN,to detect abnormal data reporting indicative of aggregation attacks.We employ a graph-theoretic approach to model EV charging networks and utilize Markov Chain Monte Carlo techniques for accurate parameter estimation.The xDeepCIN model,incorporating a Compressed Interaction Network,has the ability to capture complex feature interactions in sparse,high-dimensional charging data.Experimental results on both proprietary and public datasets demonstrate significant improvements in anomaly detection performance,with F1-scores increasing by up to 32.3%for specific anomaly types compared to traditional methods,such as wide&deep and DeepFM(Factorization-Machine).Our framework exhibits robust scalability,effectively handling networks ranging from 8 to 85 charging points.Furthermore,we achieve real-time monitoring capabilities,with parameter identification completing within seconds for networks up to 1000 nodes.This research contributes to enhancing the security and reliability of renewable energy systems against evolving cyber threats,offering a comprehensive solution for safeguarding the rapidly expanding EV charging infrastructure. 展开更多
关键词 Anomaly detection electric vehicle aggregation attack deep cross-network
下载PDF
Lightweight Underwater Target Detection Using YOLOv8 with Multi-Scale Cross-Channel Attention
19
作者 Xueyan Ding Xiyu Chen +1 位作者 Jiaxin Wang Jianxin Zhang 《Computers, Materials & Continua》 SCIE EI 2025年第1期713-727,共15页
Underwater target detection is extensively applied in domains such as underwater search and rescue,environmental monitoring,and marine resource surveys.It is crucial in enabling autonomous underwater robot operations ... Underwater target detection is extensively applied in domains such as underwater search and rescue,environmental monitoring,and marine resource surveys.It is crucial in enabling autonomous underwater robot operations and promoting ocean exploration.Nevertheless,low imaging quality,harsh underwater environments,and obscured objects considerably increase the difficulty of detecting underwater targets,making it difficult for current detection methods to achieve optimal performance.In order to enhance underwater object perception and improve target detection precision,we propose a lightweight underwater target detection method using You Only Look Once(YOLO)v8 with multi-scale cross-channel attention(MSCCA),named YOLOv8-UOD.In the proposed multiscale cross-channel attention module,multi-scale attention(MSA)augments the variety of attentional perception by extracting information from innately diverse sensory fields.The cross-channel strategy utilizes RepVGGbased channel shuffling(RCS)and one-shot aggregation(OSA)to rearrange feature map channels according to specific rules.It aggregates all features only once in the final feature mapping,resulting in the extraction of more comprehensive and valuable feature information.The experimental results show that the proposed YOLOv8-UOD achieves a mAP50 of 95.67%and FLOPs of 23.8 G on the Underwater Robot Picking Contest 2017(URPC2017)dataset,outperforming other methods in terms of detection precision and computational cost-efficiency. 展开更多
关键词 Deep learning underwater target detection attention mechanism
下载PDF
A Survey of Link Failure Detection and Recovery in Software-Defined Networks
20
作者 Suheib Alhiyari Siti Hafizah AB Hamid Nur Nasuha Daud 《Computers, Materials & Continua》 SCIE EI 2025年第1期103-137,共35页
Software-defined networking(SDN)is an innovative paradigm that separates the control and data planes,introducing centralized network control.SDN is increasingly being adopted by Carrier Grade networks,offering enhance... Software-defined networking(SDN)is an innovative paradigm that separates the control and data planes,introducing centralized network control.SDN is increasingly being adopted by Carrier Grade networks,offering enhanced networkmanagement capabilities than those of traditional networks.However,because SDN is designed to ensure high-level service availability,it faces additional challenges.One of themost critical challenges is ensuring efficient detection and recovery from link failures in the data plane.Such failures can significantly impact network performance and lead to service outages,making resiliency a key concern for the effective adoption of SDN.Since the recovery process is intrinsically dependent on timely failure detection,this research surveys and analyzes the current literature on both failure detection and recovery approaches in SDN.The survey provides a critical comparison of existing failure detection techniques,highlighting their advantages and disadvantages.Additionally,it examines the current failure recovery methods,categorized as either restoration-based or protection-based,and offers a comprehensive comparison of their strengths and limitations.Lastly,future research challenges and directions are discussed to address the shortcomings of existing failure recovery methods. 展开更多
关键词 Software defined networking failure detection failure recovery RESTORATION PROTECTION
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部