Brain tumor segmentation remains a challenge in medical image segmentation tasks. With the application of transformer in various computer vision tasks, transformer blocks show the capability of learning long-distance dependency in global space, which is complementary to CNNs. In this paper, we proposed a novel transformer-based generative adversarial network to automatically segment brain tumors with multi-modalities MRI.
View Article and Find Full Text PDFIn this article, the tracking problem of networked discrete-time second-order nonlinear multiagent systems (MASs) is studied. First, for the MASs without communication delay, a novel method, called distributed model-free sliding-mode control algorithm is proposed, which can make the system converge quickly without the accurate model. Furthermore, for the MASs with delay, in order to eliminate the influence of time delay on the system, a distributed model-free sliding-mode predictive control strategy based on time-delay compensation technology is proposed, which can actively compensate for time delay while ensuring system stability and consensus tracking performance requirements.
View Article and Find Full Text PDFMEMS (Micro-Electro-Mechanical Systems) gyroscope is the core component in the posture recognition and assistant positioning, of which the complex noise limits its performance. It is essential to filter the noise and obtain the true value of the measurements. Then an adaptive filtering method was proposed.
View Article and Find Full Text PDFThe control effect of various intelligent terminals is affected by the data sensing precision. The filtering method has been the typical soft computing method used to promote the sensing level. Due to the difficult recognition of the practical system and the empirical parameter estimation in the traditional Kalman filter, a neuron-based Kalman filter was proposed in the paper.
View Article and Find Full Text PDFThis paper studies denial-of-services (DoS) attacks against industrial cyber-physical systems (ICPSs) for which we built a proper ICPS model and attack model. According to the impact of different attack rates on systems, instead of directly studying the time delay caused by the attacks some security zones are identified, which display how a DoS attack destroys the stable status of the ICPS. Research on security zone division is consistent with the fact that ICPSs' communication devices actually have some capacity for large network traffic.
View Article and Find Full Text PDFDue to the low and uneven illumination that is typical of a recirculating aquaculture system (RAS), visible and near infrared (NIR) images collected from RASs always have low brightness and contrast. To resolve this issue, this paper proposes an image enhancement method based on the Multi-Scale Retinex (MSR) algorithm and a greyscale nonlinear transformation. First, the images are processed using the MSR algorithm to eliminate the influence of low and uneven illumination.
View Article and Find Full Text PDFAlgal bloom is a typical phenomenon of the eutrophication of rivers and lakes and makes the water dirty and smelly. It is a serious threat to water security and public health. Most scholars studying solutions for this pollution have studied the principles of remediation approaches, but few have studied the decision-making and selection of the approaches.
View Article and Find Full Text PDFIEEE Trans Cybern
August 2017
In this paper, we predeploy a large number of smart agents to monitor an area of interest. This area could be divided into many Voronoi cells by using the knowledge of Voronoi diagram and every Voronoi site agent is responsible for monitoring and tracking the target in its cell. Then, a cooperative relay tracking strategy is proposed such that during the tracking process, when a target enters a new Voronoi cell, this event triggers the switching of both tracking agents and communication topology.
View Article and Find Full Text PDF