信息工程最新文献

筛选
英文 中文
Narrow windows of opportunity: the limited utility of cyber operations in war 狭窄的机会之窗:网络行动在战争中的作用有限
IF 3.9
Journal of Cybersecurity Pub Date : 2024-08-05 DOI: 10.1093/cybsec/tyae014
Frederik A H Pedersen, Jeppe T Jacobsen
{"title":"Narrow windows of opportunity: the limited utility of cyber operations in war","authors":"Frederik A H Pedersen, Jeppe T Jacobsen","doi":"10.1093/cybsec/tyae014","DOIUrl":"https://doi.org/10.1093/cybsec/tyae014","url":null,"abstract":"The use of offensive cyber operations in war is no longer theoretical conjecture. Still, as we witness their use, important questions remain. How are offensive cyber operations employed in conventional warfighting, and what is their utility for the warfighting? This article answers these questions by analyzing new empirical evidence from the Russo–Ukrainian War, drawing on the novel TECI-model built for systematically analyzing and understanding offensive cyber operations in war through the model’s four constituent variables: target, effect, complexity, and integration. The article finds the utility of cyber operations in war is limited owing to an unsuitability for physical destruction, high risks of failure, high costs of complex operations that are more likely to attain successful and destructive effects, and a dichotomy between the tempi of conventional and cyber operations leading to cross-domain integration difficulties. Still, two narrow windows for achieving utility exist. Cumulative strategic utility is achievable by targeting critical infrastructure and governments in a persistent barrage of less complex cyber operations. Operational and tactical utility is achievable in the beginning of warfighting where the temporal dichotomy is less pronounced because cross-domain integration can be planned before warfighting commences. Filling a gap in the literature, TECI provides a common and operationalized model for future research systematically analyzing cyber operations, allowing for comparisons on the evolving role of cyberspace in war.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141940833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational modeling and inhibition of SARS-COV-2 Papain-like protease enzyme: A potential therapeutic approach for COVID-19 计算建模和抑制 SARS-COV-2 Papain 样蛋白酶:COVID-19 的潜在治疗方法
Journal of Biosafety and Biosecurity Pub Date : 2024-08-03 DOI: 10.1016/j.jobb.2024.07.001
Auwal Rabiu Auwal , Isa Abdullahi Baba , Evren Hincal , Fathalla A. Rihan
{"title":"Computational modeling and inhibition of SARS-COV-2 Papain-like protease enzyme: A potential therapeutic approach for COVID-19","authors":"Auwal Rabiu Auwal ,&nbsp;Isa Abdullahi Baba ,&nbsp;Evren Hincal ,&nbsp;Fathalla A. Rihan","doi":"10.1016/j.jobb.2024.07.001","DOIUrl":"10.1016/j.jobb.2024.07.001","url":null,"abstract":"<div><p>This study aims to investigate the potential impact of inhibitors targeting the papain-like protease (PLpro) of SARS-CoV-2 on viral replication and the host immune response. A mathematical model was developed to simulate the interaction among susceptible cells, infected cells, PLpro, and immune cells, incorporating data on PLpro inhibition. Through numerical simulations using MATLAB, the model parameters were estimated based on available statistical data. The results indicate that strategically positioned inhibitors could impede the virus’s access to host cellular machinery, thereby enhancing the immune response and gradually reducing susceptible and infected cells over time. The dynamics of the viral enzyme PLpro showed reduced activity with the introduction of the inhibitor, leading to a decline in viral replication. Moreover, the immune cell population exhibited functional recovery as the inhibitor suppressed PLpro activity. These findings suggest that inhibitors targeting PLpro may serve as therapeutic interventions against SARS-CoV-2 by inhibiting viral replication and bolstering the immune response.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000372/pdfft?md5=fdbf876165b0e2e2b70466ae5d584222&pid=1-s2.0-S2588933824000372-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141978304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MKEAH: Multimodal knowledge extraction and accumulation based on hyperplane embedding for knowledge-based visual question answering MKEAH: 基于超平面嵌入的多模态知识提取和积累,用于基于知识的视觉问题解答
Virtual Reality Intelligent Hardware Pub Date : 2024-08-01 DOI: 10.1016/j.vrih.2023.06.002
Heng Zhang , Zhihua Wei , Guanming Liu , Rui Wang , Ruibin Mu , Chuanbao Liu , Aiquan Yuan , Guodong Cao , Ning Hu
{"title":"MKEAH: Multimodal knowledge extraction and accumulation based on hyperplane embedding for knowledge-based visual question answering","authors":"Heng Zhang ,&nbsp;Zhihua Wei ,&nbsp;Guanming Liu ,&nbsp;Rui Wang ,&nbsp;Ruibin Mu ,&nbsp;Chuanbao Liu ,&nbsp;Aiquan Yuan ,&nbsp;Guodong Cao ,&nbsp;Ning Hu","doi":"10.1016/j.vrih.2023.06.002","DOIUrl":"10.1016/j.vrih.2023.06.002","url":null,"abstract":"<div><h3>Background</h3><p>External knowledge representations play an essential role in knowledge-based visual question and answering to better understand complex scenarios in the open world. Recent entity-relationship embedding approaches are deficient in representing some complex relations, resulting in a lack of topic-related knowledge and redundancy in topic-irrelevant information.</p></div><div><h3>Methods</h3><p>To this end, we propose MKEAH: Multimodal Knowledge Extraction and Accumulation on Hyperplanes. To ensure that the lengths of the feature vectors projected onto the hyperplane compare equally and to filter out sufficient topic-irrelevant information, two losses are proposed to learn the triplet representations from the complementary views: range loss and orthogonal loss. To interpret the capability of extracting topic-related knowledge, we present the Topic Similarity (TS) between topic and entity-relations.</p></div><div><h3>Results</h3><p>Experimental results demonstrate the effectiveness of hyperplane embedding for knowledge representation in knowledge-based visual question answering. Our model outperformed state-of-the-art methods by 2.12% and 3.24% on two challenging knowledge-request datasets: OK-VQA and KRVQA, respectively.</p></div><div><h3>Conclusions</h3><p>The obvious advantages of our model in TS show that using hyperplane embedding to represent multimodal knowledge can improve its ability to extract topic-related knowledge.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096579623000268/pdfft?md5=74ea90656cf281de7a0e35aa5b55705b&pid=1-s2.0-S2096579623000268-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142039957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-scale context-aware network for continuous sign language recognition 用于连续手语识别的多尺度情境感知网络
Virtual Reality Intelligent Hardware Pub Date : 2024-08-01 DOI: 10.1016/j.vrih.2023.06.011
Senhua XUE, Liqing GAO, Liang WAN, Wei FENG
{"title":"Multi-scale context-aware network for continuous sign language recognition","authors":"Senhua XUE,&nbsp;Liqing GAO,&nbsp;Liang WAN,&nbsp;Wei FENG","doi":"10.1016/j.vrih.2023.06.011","DOIUrl":"10.1016/j.vrih.2023.06.011","url":null,"abstract":"<div><p>The hands and face are the most important parts for expressing sign language morphemes in sign language videos. However, we find that existing Continuous Sign Language Recognition (CSLR) methods lack the mining of hand and face information in visual backbones or use expensive and time-consuming external extractors to explore this information. In addition, the signs have different lengths, whereas previous CSLR methods typically use a fixed-length window to segment the video to capture sequential features and then perform global temporal modeling, which disturbs the perception of complete signs. In this study, we propose a Multi-Scale Context-Aware network (MSCA-Net) to solve the aforementioned problems. Our MSCA-Net contains two main modules: <strong>(</strong>1) Multi-Scale Motion Attention (MSMA), which uses the differences among frames to perceive information of the hands and face in multiple spatial scales, replacing the heavy feature extractors; and <strong>(</strong>2) Multi-Scale Temporal Modeling (MSTM), which explores crucial temporal information in the sign language video from different temporal scales. We conduct extensive experiments using three widely used sign language datasets, i.e., RWTH-PHOENIX-Weather-2014, RWTH-PHOENIX-Weather-2014T, and CSL-Daily. The proposed MSCA-Net achieve state-of-the-art performance, demonstrating the effectiveness of our approach.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096579623000414/pdfft?md5=d9cac344d105f6ddc495c1cb1e50a67a&pid=1-s2.0-S2096579623000414-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142039960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust blind image watermarking based on interest points 基于兴趣点的鲁棒盲图像水印技术
Virtual Reality Intelligent Hardware Pub Date : 2024-08-01 DOI: 10.1016/j.vrih.2023.06.012
Zizhuo WANG, Kun HU, Chaoyangfan HUANG, Zixuan HU, Shuo YANG, Xingjun WANG
{"title":"Robust blind image watermarking based on interest points","authors":"Zizhuo WANG,&nbsp;Kun HU,&nbsp;Chaoyangfan HUANG,&nbsp;Zixuan HU,&nbsp;Shuo YANG,&nbsp;Xingjun WANG","doi":"10.1016/j.vrih.2023.06.012","DOIUrl":"10.1016/j.vrih.2023.06.012","url":null,"abstract":"<div><p>Digital watermarking technology plays an essential role in the work of anti-counterfeiting and traceability. However, image watermarking algorithms are weak against hybrid attacks, especially geometric at-tacks, such as cropping attacks, rotation attacks, etc. We propose a robust blind image watermarking algorithm that combines stable interest points and deep learning networks to improve the robustness of the watermarking algorithm further. First, to extract more sparse and stable interest points, we use the Superpoint algorithm for generation and design two steps to perform the screening procedure. We first keep the points with the highest possibility in a given region to ensure the sparsity of the points and then filter the robust interest points by hybrid attacks to ensure high stability. The message is embedded in sub-blocks centered on stable interest points using a deep learning-based framework. Different kinds of attacks and simulated noise are added to the adversarial training to guarantee the robustness of embedded blocks. We use the ConvNext network for watermark extraction and determine the division threshold based on the decoded values of the unembedded sub-blocks. Through extensive experimental results, we demonstrate that our proposed algorithm can improve the accuracy of the network in extracting information while ensuring high invisibility between the embedded image and the original cover image. Comparison with previous SOTA work reveals that our algorithm can achieve better visual and numerical results on hybrid and geometric attacks.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096579623000426/pdfft?md5=0d46d851b07db92670b0c63431ec427e&pid=1-s2.0-S2096579623000426-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142039959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
S2ANet: Combining local spectral and spatial point grouping for point cloud processing S2ANet:结合局部光谱和空间点分组进行点云处理
Virtual Reality Intelligent Hardware Pub Date : 2024-08-01 DOI: 10.1016/j.vrih.2023.06.005
Yujie LIU, Xiaorui SUN, Wenbin SHAO, Yafu YUAN
{"title":"S2ANet: Combining local spectral and spatial point grouping for point cloud processing","authors":"Yujie LIU,&nbsp;Xiaorui SUN,&nbsp;Wenbin SHAO,&nbsp;Yafu YUAN","doi":"10.1016/j.vrih.2023.06.005","DOIUrl":"10.1016/j.vrih.2023.06.005","url":null,"abstract":"<div><h3>Background</h3><p>Despite the recent progress in 3D point cloud processing using deep convolutional neural networks, the inability to extract local features remains a challenging problem. In addition, existing methods consider only the spatial domain in the feature extraction process.</p></div><div><h3>Methods</h3><p>In this paper, we propose a spectral and spatial aggregation convolutional network (S<sup>2</sup>ANet), which combines spectral and spatial features for point cloud processing. First, we calculate the local frequency of the point cloud in the spectral domain. Then, we use the local frequency to group points and provide a spectral aggregation convolution module to extract the features of the points grouped by the local frequency. We simultaneously extract the local features in the spatial domain to supplement the final features.</p></div><div><h3>Results</h3><p>S<sup>2</sup>ANet was applied in several point cloud analysis tasks; it achieved state-of-the-art classification accuracies of 93.8%, 88.0%, and 83.1% on the ModelNet40, ShapeNetCore, and ScanObjectNN datasets, respectively. For indoor scene segmentation, training and testing were performed on the S3DIS dataset, and the mean intersection over union was 62.4%.</p></div><div><h3>Conclusions</h3><p>The proposed S<sup>2</sup>ANet can effectively capture the local geometric information of point clouds, thereby improving accuracy on various tasks.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096579623000360/pdfft?md5=718a7d943dc6468abf44b38521bcc2cb&pid=1-s2.0-S2096579623000360-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142039956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating animatable 3D cartoon faces from single portraits 从单个肖像生成可动画化的 3D 卡通人脸
Virtual Reality Intelligent Hardware Pub Date : 2024-08-01 DOI: 10.1016/j.vrih.2023.06.010
Chuanyu PAN , Guowei YANG , Taijiang MU , Yu-Kun LAI
{"title":"Generating animatable 3D cartoon faces from single portraits","authors":"Chuanyu PAN ,&nbsp;Guowei YANG ,&nbsp;Taijiang MU ,&nbsp;Yu-Kun LAI","doi":"10.1016/j.vrih.2023.06.010","DOIUrl":"10.1016/j.vrih.2023.06.010","url":null,"abstract":"<div><h3>Background</h3><p>With the development of virtual reality (VR) technology, there is a growing need for customized 3D avatars. However, traditional methods for 3D avatar modeling are either time-consuming or fail to retain the similarity to the person being modeled. This study presents a novel framework for generating animatable 3D cartoon faces from a single portrait image.</p></div><div><h3>Methods</h3><p>First, we transferred an input real-world portrait to a stylized cartoon image using StyleGAN. We then proposed a two-stage reconstruction method to recover a 3D cartoon face with detailed texture. Our two-stage strategy initially performs coarse estimation based on template models and subsequently refines the model by nonrigid deformation under landmark supervision. Finally, we proposed a semantic-preserving face-rigging method based on manually created templates and deformation transfer.</p></div><div><h3>Conclusions</h3><p>Compared with prior arts, the qualitative and quantitative results show that our method achieves better accuracy, aesthetics, and similarity criteria. Furthermore, we demonstrated the capability of the proposed 3D model for real-time facial animation.</p></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096579623000359/pdfft?md5=e0641053e4314662ffe5dca1c167d86b&pid=1-s2.0-S2096579623000359-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142039958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
‘There was a bit of PTSD every time I walked through the office door’: Ransomware harms and the factors that influence the victim organization’s experience 每次走进办公室的门,我都有点创伤后应激障碍":勒索软件的危害和影响受害组织经历的因素
IF 3.9
Journal of Cybersecurity Pub Date : 2024-07-30 DOI: 10.1093/cybsec/tyae013
Gareth Mott, Sarah Turner, Jason R C Nurse, Nandita Pattnaik, Jamie MacColl, Pia Huesch, James Sullivan
{"title":"‘There was a bit of PTSD every time I walked through the office door’: Ransomware harms and the factors that influence the victim organization’s experience","authors":"Gareth Mott, Sarah Turner, Jason R C Nurse, Nandita Pattnaik, Jamie MacColl, Pia Huesch, James Sullivan","doi":"10.1093/cybsec/tyae013","DOIUrl":"https://doi.org/10.1093/cybsec/tyae013","url":null,"abstract":"Ransomware is a pernicious contemporary cyber threat for organizations, with ransomware operators intentionally leveraging a range of harms against their victims in order to solicit increasingly significant ransom payments. This article advances current research by engaging in a topical analysis into the depth and breadth of harms experienced by victim organizations and their members of staff. We, therefore, enhance the understanding of the negative experiences from ransomware attacks, particularly looking beyond the financial impact which dominates current narratives. Having conducted an interview or workshop with 83 professionals including ransomware victims, incident responders, ransom negotiators, law enforcement, and government, we identify a wide array of severe harms. For organizations, the risk of business interruption and/or data exposure presents potentially highly impactful financial and reputational harm(s). The victim organization’s staff can also experience a range of under-reported harms, which include physiological and physical harms that may be acute. We also identify factors that can either alleviate or aggravate the experiencing of harms at the organizational and employee level; including ransomware preparedness, leadership culture, and crisis communication. Given the scale and scope of the identified harms, the paper provides significant new empirical evidence to emphasize ransomware’s positioning as a whole-of-organization crisis phenomenon, as opposed to an ‘IT problem’. We argue that the wider discourse surrounding ransomware harms and impacts should be reflective of the nature of the real-term experience(s) of victims. This, in turn, could help guide efforts to alleviate ransomware harms, through improved organizational ransomware preparedness and tailored post-ransomware mitigation.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141866680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Interplay Between Social Awareness and the Use of Bed Nets in a Malaria Control Program 探索疟疾控制计划中社会意识与蚊帐使用之间的相互作用
Journal of Biosafety and Biosecurity Pub Date : 2024-07-14 DOI: 10.1016/j.jobb.2024.06.005
Iffatricia Haura Febiriana , Dipo Aldila , Bevina Desjwiandra Handari , Puji Budi Setia Asih , Muhamad Hifzhudin Noor Aziz
{"title":"Exploring the Interplay Between Social Awareness and the Use of Bed Nets in a Malaria Control Program","authors":"Iffatricia Haura Febiriana ,&nbsp;Dipo Aldila ,&nbsp;Bevina Desjwiandra Handari ,&nbsp;Puji Budi Setia Asih ,&nbsp;Muhamad Hifzhudin Noor Aziz","doi":"10.1016/j.jobb.2024.06.005","DOIUrl":"10.1016/j.jobb.2024.06.005","url":null,"abstract":"<div><p>This research aims to understand the effect of human awareness and the use of bed nets on malaria control programs. A deterministic host-vector mathematical model was utilized and simplified using the Quasi-Steady State Approximation, assuming the mosquito population is at equilibrium due to its fast, dynamic behavior. The model reveals two equilibrium states: the malaria-free equilibrium and the endemic equilibrium. The malaria-free equilibrium is locally asymptotically stable when the basic reproduction number is less than one and unstable if it is larger than one. Conversely, the malaria-endemic equilibrium is unique and stable if the reproduction number exceeds one and does not exist otherwise. Based on incidence data from Papua, parameter estimation and sensitivity analyses indicate that human awareness and the use of bed nets significantly reduce the reproduction number. To address budget constraints for interventions, the model was reformulated as an optimal control problem, characterized using the Pontryagin Maximum Principle, and solved with the forward–backward sweep method. Numerical experiments were conducted to assess the impact of various scenarios on the malaria control program. Cost-effectiveness analyses employing ACER, ICER, and IAR metrics suggest that while the combined implementation of awareness campaigns and bed nets effectively reduces infections, it incurs high costs. In contrast, implementing human awareness campaigns alone emerges as the best strategy based on ACER, ICER, and IAR standards. This study demonstrates that enhancing human awareness and promoting the use of bed nets are effective strategies for controlling malaria. However, due to budget constraints, focusing solely on awareness campaigns proves to be the most cost-effective intervention. This approach not only reduces malaria transmission but also optimizes resource allocation, highlighting the importance of targeted educational programs in public health initiatives for malaria control.</p></div>","PeriodicalId":52875,"journal":{"name":"Journal of Biosafety and Biosecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2588933824000359/pdfft?md5=286803da5b7a0c85dfa5ff19326db67a&pid=1-s2.0-S2588933824000359-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141690622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel method for measuring center-axis velocity of unmanned aerial vehicles through synthetic motion blur images 通过合成运动模糊图像测量无人驾驶飞行器中心轴速度的新方法
自主智能系统(英文) Pub Date : 2024-07-09 DOI: 10.1007/s43684-024-00073-x
Quanxi Zhan, Yanmin Zhou, Junrui Zhang, Chenyang Sun, Runjie Shen, Bin He
{"title":"A novel method for measuring center-axis velocity of unmanned aerial vehicles through synthetic motion blur images","authors":"Quanxi Zhan,&nbsp;Yanmin Zhou,&nbsp;Junrui Zhang,&nbsp;Chenyang Sun,&nbsp;Runjie Shen,&nbsp;Bin He","doi":"10.1007/s43684-024-00073-x","DOIUrl":"10.1007/s43684-024-00073-x","url":null,"abstract":"<div><p>Accurate velocity measurement of unmanned aerial vehicles (UAVs) is essential in various applications. Traditional vision-based methods rely heavily on visual features, which are often inadequate in low-light or feature-sparse environments. This study presents a novel approach to measure the axial velocity of UAVs using motion blur images captured by a UAV-mounted monocular camera. We introduce a motion blur model that synthesizes imaging from neighboring frames to enhance motion blur visibility. The synthesized blur frames are transformed into spectrograms using the Fast Fourier Transform (FFT) technique. We then apply a binarization process and the Radon transform to extract light-dark stripe spacing, which represents the motion blur length. This length is used to establish a model correlating motion blur with axial velocity, allowing precise velocity calculation. Field tests in a hydropower station penstock demonstrated an average velocity error of 0.048 m/s compared to ultra-wideband (UWB) measurements. The root-mean-square error was 0.025, with an average computational time of 42.3 ms and CPU load of 17%. These results confirm the stability and accuracy of our velocity estimation algorithm in challenging environments.</p></div>","PeriodicalId":71187,"journal":{"name":"自主智能系统(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s43684-024-00073-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141666199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信