4.6 Article

A Fast Defogging Image Recognition Algorithm Based on Bilateral Hybrid Filtering

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3391297

关键词

IoT; defogging image; bilateral hybrid filtering; robustness

资金

  1. National Natural Science Foundation of China [61872138, 62072170]
  2. Hunan Provincial Science & Technology Project Foundation [2018TP1018, 2020JJ5369]
  3. Scientifc Research Fund of the Hunan Provincial Education Department [19C1157]
  4. Start-Up Funds of Hunan Normal University [531120-3812]
  5. Fujian Provincial Natural Science Foundation of China [2018J01570]
  6. Guangxi Key Laboratory of Crytography and Information Security [GCIS201920]
  7. Open Fund Project of Fujian Provincial Key Laboratory of Information Processing and Intelligent Control (Minjiang University) [MJUKF-IPIC202008]

向作者/读者索取更多资源

This paper proposes a fast defogging image recognition algorithm based on bilateral hybrid filtering. Experimental results show promising defogging effect and speed, with the image recognition rate reaching 98.8% after defogging.
With the rapid advancement of video and image processing technologies in the Internet of Things, it is urgent to address the issues in real-time performance, clarity, and reliability of image recognition technology for a monitoring system in foggy weather conditions. In this work, a fast defogging image recognition algorithm is proposed based on bilateral hybrid filtering. First, the mathematical model based on bilateral hybrid filtering is established. The dark channel is used for filtering and denoising the defogging image. Next, a bilateral hybrid filtering method is proposed by using a combination of guided filtering and median filtering, as it can effectively improve the robustness and transmittance of defogging images. On this basis, the proposed algorithm dramatically decreases the computation complexity of defogging image recognition and reduces the image execution time. Experimental results show that the defogging effect and speed are promising, with the image recognition rate reaching to 98.8% after defogging.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning

Wei Liang, Songyou Xie, Dafang Zhang, Xiong Li, Kuan-ching Li

Summary: The Industrial Internet of Things (IIoT) aims to improve economic benefits by optimizing process controls, but the use of Radio Frequency Identification (RFID) technology in IIoT raises concerns about security and cost. To address these issues, a mutual authentication scheme incorporating Deep Learning techniques is proposed for secure access authentication of IC circuits on the IoT.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2022)

Article Computer Science, Hardware & Architecture

A blockchain-based secure storage and access control scheme for supply chain finance

Dun Li, Dezhi Han, Noel Crespi, Roberto Minerva, Kuan-Ching Li

Summary: Supply chain finance provides credit for small and medium-sized enterprises with low credit lines and small financing scales. This study proposes a Blockchain-based secure storage system, Fabric-SCF, to achieve data security and fine-grained access control. Experimental results show that Fabric-SCF performs efficiently in a simulated real-world operating scenario.

JOURNAL OF SUPERCOMPUTING (2023)

Article Computer Science, Information Systems

A novel oversampling and feature selection hybrid algorithm for imbalanced data classification

Fang Feng, Kuan-Ching Li, Erfu Yang, Qingguo Zhou, Lihong Han, Amir Hussain, Mingjiang Cai

Summary: This article presents a novel hybrid algorithm NBG, which improves the performance of imbalanced classifications by combining oversampling and a feature selection algorithm. The proposed NBG algorithm significantly outperforms existing and recently published algorithms in the classification of imbalanced small-sample data sets.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

DRJOA: intelligent resource management optimization through deep reinforcement learning approach in edge computing

Yifan Chen, Shaomiao Chen, Kuan-Ching Li, Wei Liang, Zhiyong Li

Summary: Mobile edge computing (MEC) enhances computation capabilities of smart mobile devices for computation-intensive applications via efficient computation offloading. However, limitations in wireless and computational resources often hinder MEC development. To address offloading in time-varying wireless networks, offloading decisions and resource allocation must be jointly managed. Traditional optimization methods struggle with combinatorial optimization in dynamic network environments. Therefore, we propose a deep reinforcement learning (DRL)-based approach, named DRJOA, for optimizing offloading decisions, computation, and wireless resource allocation. Simulation results demonstrate that DRJOA outperforms benchmark methods in offloading decisions and system utility.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2023)

Retraction Computer Science, Information Systems

撤稿声明: Smart city information acquisition system based on internet of things (Retraction of Vol 22, Pg S9013, 2019)

Qian Zhang, Maozhu Jin, Yanan Wang, Xia Lei

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2022)

Article Economics

Does Short-and-Distort Scheme Really Exist? A Bitcoin Futures Audit Scheme through BIRCH & BPNN Approach

Dun Li, Dezhi Han, Zibin Zheng, Tien-Hsiung Weng, Kuan-Ching Li, Ming Li, Shaokang Cai

Summary: Short and Distort (S & D) is a prevalent price manipulation scheme in the futures trading market, especially in the context of Bitcoin futures. This article presents the first detailed empirical study on S & D, combining the analysis of available information and cryptocurrencies, proposing a problematic definition and discriminatory criteria for S & D in Bitcoin futures. Additionally, a model for real-time detection of S & D in perpetual and term contracts is developed, demonstrating higher accuracy and robustness compared to previous studies. The results highlight significant S & D manipulation in both perpetual and term contracts, with Binance exchange being relatively secure and Bittrex exchange being the most vulnerable to S & D.

COMPUTATIONAL ECONOMICS (2023)

Article Engineering, Electrical & Electronic

An evolutive framework for server placement optimization to digital twin networks

Lijun Xiao, Dezhi Han, Tien-Hsiung Weng, Shaomiao Chen, Han Deng, Alireza Souri, Kuan-Ching Li

Summary: Digital twin network (DTN) is crucial for efficient optimization in modern networks as it has real-time data and interacts with the physical network. This research proposes an evolutionary framework for server layout optimization, which improves the efficiency of evolutionary algorithms and reduces computational cost. Offline-learning and self-examining guided local search methods are used to reduce search space and improve search efficiency. A look-up table-based hybrid approach is used for solution evaluation, reducing computational overhead. Experimental results demonstrate significant improvements in search efficiency and convergence performance.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation

Lijun Xiao, Dezhi Han, Dun Li, Wei Liang, Ce Yang, Kuan-Ching Li, Arcangelo Castiglione

Summary: With the advancements in computing and networking technologies, there has been a rise in cryptocurrencies or digital tokens, offering various payment services with different costs, quality, and safety. Analyzing blockchain transaction data and historical transaction trends can help identify illegal behaviors, such as money laundering, at an early stage. In this article, a novel method called CTDM is proposed, which combines EvolveGCN with MGU and global representations to achieve better performance in abnormal transaction detection compared to existing methods.

SOFT COMPUTING (2023)

Article Computer Science, Information Systems

Channel Reconstruction-Aided MUSIC Algorithms for Joint AoA&AoD Estimation in MIMO Systems

Teng Ma, Yue Xiao, Xia Lei

Summary: This letter discusses a novel one-snapshot multiple signal classification (MUSIC)-derived algorithm based on channel reconstruction for joint angle-of-arrival (AoA) and angle-of-departure (AoD) estimation in multi-input multi-output (MIMO) arrays. Compared to conventional two-dimensional MUSIC (2D-MUSIC), the proposed algorithm not only avoids the problem of matrix rank deficit but also achieves significant complexity reduction while maintaining satisfactory accuracy. Simulation results confirm the utility and advancement of the algorithm, particularly in scenarios with high real-time requirements.

IEEE WIRELESS COMMUNICATIONS LETTERS (2023)

Review Mathematics

A Systematic Review of Consensus Mechanisms in Blockchain

Sisi Zhou, Kuanching Li, Lijun Xiao, Jiahong Cai, Wei Liang, Arcangelo Castiglione

Summary: Since the birth of Bitcoin, blockchain has evolved from a critical cryptocurrency technology to an enabling technology, revolutionizing fields requiring credibility and high-quality data for decision making. In business intelligence and business process management, users can build their blockchain-enabled collaboration and data-sharing ecosystem. This paper presents the development process of blockchain and introduces important consensus mechanisms, providing a comparison and analysis of these mechanisms to lay a foundation for selecting appropriate consensus mechanisms for different scenarios and application fields.

MATHEMATICS (2023)

Article Computer Science, Interdisciplinary Applications

MedRSS: A blockchain-based scheme for secure storage and sharing of medical records

Zhijie Sun, Dezhi Han, Dun Li, Tien-Hsiung Weng, Kuan-Ching Li, Xiaojun Mei

Summary: This article proposes a blockchain-based solution for medical record data storage and sharing, utilizing Hyperledger fabric blockchain and encryption technology to ensure the security and shareability of medical records. Experiments have shown that this solution outperforms existing approaches.

COMPUTERS & INDUSTRIAL ENGINEERING (2023)

Article Physics, Multidisciplinary

Hot topics with decaying attention in social networks: Modeling and analysis of message spreading

Pei Li, Zhiming Lin, Kuanching Li, Subhash Bhalla

Summary: In this study, a message spreading model for social networks is proposed, which introduces decaying attention and modifies the duplicate forwarding model. User influence is defined and theoretically analyzed through generating functions based on this model. The diffusion threshold is further investigated and its existence and uniqueness are proved. Simulation results demonstrate the efficiency of user influence in this model, and analysis of user influence and diffusion thresholds show its accuracy and promising potential.

PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS (2023)

Article Computer Science, Hardware & Architecture

On Stablecoin: Ecosystem, architecture, mechanism and applicability as payment method

Dun Li, Dezhi Han, Tien-Hsiung Weng, Zibin Zheng, Hongzhi Li, Kuan-Ching Li

Summary: Stablecoins have facilitated the growth of decentralized payments and the emergence of a new generation of payment systems using cryptocurrencies and Blockchain technology. However, the existing research lacks a comprehensive overview of Stablecoins that focuses on their full context, stabilization mechanisms, and payment applicability. This paper provides a thorough summary of the definition, current state, and ecosystem of Stablecoins. It discusses the system structure, stability mechanisms, and their applicability in payment scenarios. The study identifies asset-backed Stablecoins as the most efficient and widely used, while cryptocurrency-backed Stablecoins are more balanced in relation to the original concept. Algorithm-backed Stablecoins show significant potential for development but are hesitant due to the lack of collateral or deposit reserves, making them prone to collapse. The paper concludes by presenting possible future trends for Stablecoins.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Information Systems

SEE-3D: Sentiment-driven Emotion-Cause Pair Extraction Based on 3D-CNN

Xin Xu, Guangli Zhu, Houyue Wu, Shunxiang Zhang, Kuan-Ching Li

Summary: As an emotional cause detection task, Emotion-Cause Pair Extraction (ECPE) provides technical support for intelligent psychological counseling, empty-nest elderly care, and other fields. Different from existing methods, this paper proposes an extraction model named SEE-3D, which considers the influence of sentimental intensity to improve extraction accuracy. The results of experiments show that the accuracy of ECPE can be effectively improved by the SEE-3D model.

COMPUTER SCIENCE AND INFORMATION SYSTEMS (2023)

Review Computer Science, Information Systems

TS-GCN: Aspect-level Sentiment Classification Model for Consumer Reviews

Shunxiang Zhang, Tong Zhao, Houyue Wu, Guangli Zhu, KuanChing Li

Summary: This paper proposes a classification model for consumer reviews called TS-GCN, which can classify sentiment from both explicit and implicit aspects. The model processes the text using the BERT and BiLSTM models to obtain text features, and the GCN model is used for explicit sentiment classification. The TS model is then used to predict implicit sentiment words, improving the accuracy of sentiment classification.

COMPUTER SCIENCE AND INFORMATION SYSTEMS (2023)

暂无数据