Yandong Hou, Zhengbo Wu, Xinghua Ren, Kaiwen Liu and Zhengquan Chen
High-resolution remote sensing images possess a wealth of semantic information. However, these images often contain objects of different sizes and distributions, which make the…
Abstract
Purpose
High-resolution remote sensing images possess a wealth of semantic information. However, these images often contain objects of different sizes and distributions, which make the semantic segmentation task challenging. In this paper, a bidirectional feature fusion network (BFFNet) is designed to address this challenge, which aims at increasing the accurate recognition of surface objects in order to effectively classify special features.
Design/methodology/approach
There are two main crucial elements in BFFNet. Firstly, the mean-weighted module (MWM) is used to obtain the key features in the main network. Secondly, the proposed polarization enhanced branch network performs feature extraction simultaneously with the main network to obtain different feature information. The authors then fuse these two features in both directions while applying a cross-entropy loss function to monitor the network training process. Finally, BFFNet is validated on two publicly available datasets, Potsdam and Vaihingen.
Findings
In this paper, a quantitative analysis method is used to illustrate that the proposed network achieves superior performance of 2–6%, respectively, compared to other mainstream segmentation networks from experimental results on two datasets. Complete ablation experiments are also conducted to demonstrate the effectiveness of the elements in the network. In summary, BFFNet has proven to be effective in achieving accurate identification of small objects and in reducing the effect of shadows on the segmentation process.
Originality/value
The originality of the paper is the proposal of a BFFNet based on multi-scale and multi-attention strategies to improve the ability to accurately segment high-resolution and complex remote sensing images, especially for small objects and shadow-obscured objects.
Details
Keywords
Zhengquan Chen, Lu Han and Yandong Hou
This paper proposes a novel method of fault detection, which is based on H_/H∞ Runge–Kutta observer and an adaptive threshold for a class of closed-loop non-linear systems. The…
Abstract
Purpose
This paper proposes a novel method of fault detection, which is based on H_/H∞ Runge–Kutta observer and an adaptive threshold for a class of closed-loop non-linear systems. The purpose of this paper is to improve the rapidity and accuracy of fault detection.
Design/methodology/approach
First, the authors design the H_/H∞ Runge–Kutta fault detection observer, which is used as a residual generator to decouple the residual from the input. The H_ performance index metric in the specified frequency domain is used to describe how sensitive the residual to the fault. The H∞ norm is used to describe the residual robustness to the external disturbance of the systems. The residual generator is designed to achieve the best tradeoff between robustness against unknown disturbances but sensitivity to faults, thus realizing the accurate detection of the fault by suppressing the influence of noise and disturbance on the residual. Next, the design of the H_/H∞ fault detection observer is transformed into a convex optimization problem and solved by linear matrix inequality. Then, a new adaptive threshold is designed to improve the accuracy of fault detection.
Findings
The effectiveness and correctness of the method are tested in simulation experiments.
Originality/value
This paper presents a novel approach to improve the accuracy and rapidity of fault detection for closed-loop non-linear system with disturbances and noise.
Details
Keywords
Ramaraj Palanisamy and Yang Wu
This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for…
Abstract
Purpose
This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility?
Design/methodology/approach
These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables.
Findings
The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues.
Research limitations/implications
The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems.
Practical implications
The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES.
Social implications
Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES.
Originality/value
This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.