More Latest Research

Article  |  01 Aug 2019

A novel gradient climbing control for seeking the best communication point for data collection from a seabed platform using a single unmanned surface vehicle

A novel controller for finding the best communication point is proposed for collecting data from a seabed platform by a single unmanned surface vehicle (USV) using underwater acoustic communication (UAC). As far as we know, extremum seeking based on climbing control is usually implemented by multiple vehicles or agents because of the large range of measurement and easy acquisition of gradient estimation. A single vehicle cannot rapidly estimate the field because of the limited extent for measurement; therefore, it is difficult for a single vehicle to seek the extremum point in a field. In this study, an oscillation motion (OM) is designed for a single USV to acquire UAC’s link strength data between the seabed platform and the USV. The field for UAC’s link strength is updated using new measurement from an OM of the USV based on a multi-variable weight linear iteration method. A controller for seeking the best UAC’s point of the USV is designed using gradient climbing and artificial potential considering iterative estimation of an unknown field and an OM operation, and the stability is proved. The reliability and efficiency are shown in simulation results.

Jiu-cai JIN

Article  |  01 Aug 2019

Detecting interaction/complexitywithin crowd movements using braid entropy

The segmentation of moving and non-moving regions in an image within the field of crowd analysis is a crucial process in terms of understanding crowd behavior. In many studies, similar movements were segmented according to the location, adjacency to each other, direction, and average speed. However, these segments may not in turn indicate the same types of behavior in each region. The purpose of this study is to better understand crowd behavior by locally measuring the degree of interaction/complexity within the segment. For this purpose, the flow of motion in the image is primarily represented as a series of trajectories. The image is divided into hexagonal cells and the finite time braid entropy (FTBE) values are calculated according to the different projection angles of each cell. These values depend on the complexity of the spiral structure that the trajectories generated throughout the movement and show the degree of interaction among pedestrians. In this study, behaviors of different complexities determined in segments are pictured as similar movements on the whole. This study has been tested on 49 different video sequences from the UCF and CUHK databases.

Murat AKPULAT

Article  |  01 Aug 2019

De-scattering and edge-enhancement algorithms for underwater image restoration

Image restoration is a critical procedure for underwater images, which suffer from serious color deviation and edge blurring. Restoration can be divided into two stages: de-scattering and edge enhancement. First, we introduce a multi-scale iterative framework for underwater image de-scattering, where a convolutional neural network is used to estimate the transmission map and is followed by an adaptive bilateral filter to refine the estimated results. Since there is no available dataset to train the network, a dataset which includes 2000 underwater images is collected to obtain the synthetic data. Second, a strategy based on white balance is proposed to remove color casts of underwater images. Finally, images are converted to a special transform domain for denoising and enhancing the edge using the non-subsampled contourlet transform. Experimental results show that the proposed method significantly outperforms state-of-the-art methods both qualitatively and quantitatively.

Pan-wang PAN

Article  |  01 Aug 2019

Malware homology identification based on a gene perspective

Malware homology identification is important in attacking event tracing, emergency response scheme generation, and event trend prediction. Current malware homology identification methods still rely on manual analysis, which is inefficient and cannot respond quickly to the outbreak of attack events. In response to these problems, we propose a new malware homology identification method from a gene perspective. A malware gene is represented by the subgraph, which can describe the homology of malware families. We extract the key subgraph from the function dependency graph as the malware gene by selecting the key application programming interface (API) and using the community partition algorithm. Then, we encode the gene and design a frequent subgraph mining algorithm to find the common genes between malware families. Finally, we use the family genes to guide the identification of malware based on homology. We evaluate our method with a public dataset, and the experiment results show that the accuracy of malware classification reaches 97% with high efficiency.

Bing-lin ZHAO