3 research outputs found

    Detection of one-horned rhino using multispectral images

    Get PDF
    Animal detection and surveillance is an important field of research to address the needs for protection of endangered species among others. The challenges in animal detection include low-contrast and poor image quality which is commonly observed during night time. Researchers have mostly worked on day-light, low-contrast and thermal images. To handle the challenges of detection during night time, multispectral images in combination with deep architectures may be used for better detection performance. In the present work, one-horned rhino is considered for detection because they are getting endangered for reasons like poaching, natural calamities and diseases. A novel multispectral one-horned rhino dataset is introduced and the multispectral data is obtained by combining the channels of color images and the corresponding thermal images. Instance segmentation based techniques YOLACT and YOLACT++ are used here to detect rhinos with the above multispectral dataset. The performances of the detectors are studied in terms of mAP and FPS

    RUASN: A Robust User Authentication Framework for Wireless Sensor Networks

    Get PDF
    In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost
    corecore