27 research outputs found

    Robust Target Detection of Intelligent Integrated Optical Camera and mmWave Radar System

    Full text link
    Target detection is pivotal for modern urban computing applications. While image-based techniques are widely adopted, they falter under challenging environmental conditions such as adverse weather, poor lighting, and occlusion. To improve the target detection performance under complex real-world scenarios, this paper proposes an intelligent integrated optical camera and millimeter-wave (mmWave) radar system. Utilizing both physical knowledge and data-driven methods, a long-term robust radar-camera fusion algorithm is proposed to solve the heterogeneous data fusion problem for detection improvement. For the occlusion scenarios, the proposed algorithm can effectively detect occluded targets with the help of memory through performing long-term detection. For dark scenarios with low-light conditions, the proposed algorithm can effectively mark the target in the dark picture as well as provide rough stickman imaging. The above two innovative functions of the hybrid optical camera and mmWave radar system are tested in real-world scenarios. The results demonstrate the robustness and significant enhancement in the target detection performance of our integrated system

    A Ranking Distance Based Diversity Measure for Multiple Classifier Systems

    Get PDF
    International audienceMultiple classifier fusion belongs to the decision-level information fusion, which has been widely used in many pattern classification applications, especially when the single classifier is not competent. However, multiple classifier fusion can not assure the improvement of the classification accuracy. The diversity among those classifiers in the multiple classifier system (MCS) is crucial for improving the fused classification accuracy. Various diversity measures for MCS have been proposed, which are mainly based on the average sample-wise classification consistency between different member classifiers. In this paper, we propose to define the diversity between member classifiers from a different standpoint. If different member classifiers in an MCS are good at classifying different classes, i.e., there exist expert-classifiers for each concerned class, the improvement of the accuracy of classifier fusion can be expected. Each classifier has a ranking of classes in term of the classification accuracies, based on which, a new diversity measure is implemented using the ranking distance. A larger average ranking distance represents a higher diversity. The new proposed diversity measure is used together with each single classifier's performance on training samples to design and optimize the MCS. Experiments, simulations , and related analyses are provided to illustrate and validate our new proposed diversity measure

    Robust Multi-target Tracking with Bootstrapped-GLMB Filter

    Get PDF
    This dissertation presents novel multi-target tracking algorithms that obviate the need for prior knowledge of system parameters such as clutter rate, detection probabilities, and birth models. Information on these parameters is unknown but important to tracking performance. The proposed algorithms exploit the advantages of existing RFS trackers and filters by bootstrapping them. This configuration inherits the efficiency of tracking target trajectories from the RFS trackers and low complexity in parameter estimation from the RFS filters

    A survey of IoT security based on a layered architecture of sensing and data analysis

    Get PDF
    The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. Likewise, we propose a new classification of security threats and attacks based on new IoT architecture. The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer. First, the physical sensing layer incorporates the basic hardware used by IoT. Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. Then, the application layer involves application protocols and lightweight encryption algorithms for IoT. Finally, in the data and cloud services layer, the main important security features of IoT cloud platforms are addressed, involving confidentiality, integrity, authorization, authentication, and encryption protocols. The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning algorithms to enhance security and the related challenges, the use of Blockchain to address security challenges in IoT, and the implications of IoT deployment in 5G and beyond

    Disaster recovery in cloud computing systems: an overview

    Get PDF
    With the rapid growth of internet technologies, large-scale online services, such as data backup and data recovery are increasingly available. Since these large-scale online services require substantial networking, processing, and storage capacities, it has become a considerable challenge to design equally large-scale computing infrastructures that support these services cost-effectively. In response to this rising demand, cloud computing has been refined during the past decade and turned into a lucrative business for organizations that own large datacenters and offer their computing resources. Undoubtedly cloud computing provides tremendous benefits for data storage backup and data accessibility at a reasonable cost. This paper aims at surveying and analyzing the previous works proposed for disaster recovery in cloud computing. The discussion concentrates on investigating the positive aspects and the limitations of each proposal. Also examined are discussed the current challenges in handling data recovery in the cloud context and the impact of data backup plan on maintaining the data in the event of natural disasters. A summary of the leading research work is provided outlining their weaknesses and limitations in the area of disaster recovery in the cloud computing environment. An in-depth discussion of the current and future trends research in the area of disaster recovery in cloud computing is also offered. Several work research directions that ought to be explored are pointed out as well, which may help researchers to discover and further investigate those problems related to disaster recovery in the cloud environment that have remained unresolved

    Enhancing Cyber-Resiliency of DER-based SmartGrid: A Survey

    Full text link
    The rapid development of information and communications technology has enabled the use of digital-controlled and software-driven distributed energy resources (DERs) to improve the flexibility and efficiency of power supply, and support grid operations. However, this evolution also exposes geographically-dispersed DERs to cyber threats, including hardware and software vulnerabilities, communication issues, and personnel errors, etc. Therefore, enhancing the cyber-resiliency of DER-based smart grid - the ability to survive successful cyber intrusions - is becoming increasingly vital and has garnered significant attention from both industry and academia. In this survey, we aim to provide a systematical and comprehensive review regarding the cyber-resiliency enhancement (CRE) of DER-based smart grid. Firstly, an integrated threat modeling method is tailored for the hierarchical DER-based smart grid with special emphasis on vulnerability identification and impact analysis. Then, the defense-in-depth strategies encompassing prevention, detection, mitigation, and recovery are comprehensively surveyed, systematically classified, and rigorously compared. A CRE framework is subsequently proposed to incorporate the five key resiliency enablers. Finally, challenges and future directions are discussed in details. The overall aim of this survey is to demonstrate the development trend of CRE methods and motivate further efforts to improve the cyber-resiliency of DER-based smart grid.Comment: Submitted to IEEE Transactions on Smart Grid for Publication Consideratio

    Data augmentation and intelligent fault diagnosis of planetary gearbox using ILoFGAN under extremely limited samples

    Get PDF
    Though the existing generative adversarial networks (GAN) have the potential for data augmentation and intelligent fault diagnosis of planetary gearbox, it remains difficult to deal with extremely limited training samples and effectively fuse the representative and diverse information. To tackle the above challenges, an improved local fusion generative adversarial network (ILoFGAN) is proposed. Time-domain waveforms are firstly transformed into the time-frequency diagrams to highlight the fault characteristics. Subsequently, a local fusion module is used to fully utilize extremely limited samples and fuse the local features. Finally, a new generator embedded with multi-head attention modules is constructed to effectively improve the accuracy and flexibility of the feature fusion process. The proposed method is applied to the analysis of planetary gearbox vibration signals. The results show that the proposed method can generate a large number of samples with higher similarity and better diversity compared with the existing mainstream GANs using 6 training samples in each type. The generated samples are used to augment the limited dataset, prominently improving the accuracy of the fault diagnosis task

    Improving the energy efficiency of industrial refrigeration systems by means of data-driven load management

    Get PDF
    A common denominator in the vast majority of processes in the food industry is refrigeration. Such systems guarantee the quality and the requisites of the final product at the expense of high amounts of energy. In this regard, the new Industry 4.0 framework provides the required data to develop new data-based methodologies to reduce such energy expenditure concern. Focusing in this issue, this paper proposes a data-driven methodology which improves the efficiency of the refrigeration systems acting on the load side. The solution approaches the problem with a novel load management methodology that considers the estimation of the individual load consumption and the necessary robustness to be applicable in highly variable industrial environments. Thus, the refrigeration system efficiency can be enhanced while maintaining the product in the desired conditions. The experimental results of the methodology demonstrate the ability to reduce the electrical consumption of the compressors by 17% as well as a 77% reduction in the operation time of two compressors working in parallel, a fact that enlarges the machines life. Furthermore, these promising savings are obtained without compromising the temperature requirements of each load.This research was partially funded by the Secretary of Universities and Research of the Department of Enterprise and Knowledge of the Generalitat de Catalunya under 2017DI007. The APC was funded by the University and Research Aid Management Agency of the Generalitat de Catalunya under 2017 SGR 967.Peer ReviewedPostprint (published version
    corecore