Barcode technology plays a crucial role in automatic identification and data acquisition systems, with extensive applications in retail, warehousing, healthcare, and industrial automation. However, barcode images ofte...
详细信息
Barcode technology plays a crucial role in automatic identification and data acquisition systems, with extensive applications in retail, warehousing, healthcare, and industrial automation. However, barcode images often suffer from blurriness due to lighting conditions, camera quality, motion blur, and noise, adversely affecting their readability and system performance. This paper proposes a multi-scale real-time deblurring method based on edge feature guidance. Our designed multi-scale deblurring network integrates an edge feature fusion module (EFFM) to restore image edges better. Additionally, we introduce a feature filtering mechanism (FFM), which effectively suppresses noise interference by precisely filtering and enhancing critical signal features. Moreover, by incorporating wavelet reconstruction loss, the method significantly improves the restoration of details and textures. Extensive experiments on various barcode datasets demonstrate that our method significantly enhances barcode clarity and scanning accuracy, especially in noisy environments. Furthermore, our algorithm ensures robustness and real-time performance. The research results indicate that our method holds significant promise for enhancing barcode imageprocessing, with potential applications in retail, logistics, inventory management, and industrial automation.
image editing methods based on diffusion models are significantly superior to traditional methods. However, due to their slow sampling speed, high computational complexity, and weak data generalization ability, these ...
详细信息
ISBN:
(纸本)9798350359329;9798350359312
image editing methods based on diffusion models are significantly superior to traditional methods. However, due to their slow sampling speed, high computational complexity, and weak data generalization ability, these have encountered certain limitations in practical applications. This paper proposes an efficient sparse blocks inference method for diffusion models to address this issue. It also compensates and trains the sampled feature maps by reusing low-frequency information and introduces Lp-norm to replace Euclidean distance to calculate the loss function, thereby enhancing the reconstruction effect of highfrequency image features. This method takes low-frequency sparse block data inputs as constraints, using the masks of the difference and converting them into indices to achieve the reproduction of high-resolution data. Experiments on the LSUN and CelebAHQ dataset, our method improves the inference speed of DDIM by 2.68 x, PD by 1.53 x and SDEdit by 5.5 x, reduces the computational complexity of DDIM by 4.1 x, PD by 1.7 x and SDEdit by 4.8 x.
This research thoroughly analyses the effects of various image distortions on different neural network architectures, utilizing the imageNet validation dataset. The study reveals that distortions such as blur, noise, ...
详细信息
ISBN:
(纸本)9798350359329;9798350359312
This research thoroughly analyses the effects of various image distortions on different neural network architectures, utilizing the imageNet validation dataset. The study reveals that distortions such as blur, noise, JPEG compression, and grid patterns significantly elevate error rates. Contrast change yielded inconsistent impacts, only occasionally increasing error rates, while rescaling the image drastically (when target size was more than five times smaller than original) led to substantial model performance degradation, although the images became difficult for even humans to recognize at such scales. Among the architectures tested, EfficientNet models demonstrated superior robustness, which can be attributed to their scalable input sizes. The Vision Transformer (ViT), trained on the extensive JFT-300M dataset, also showcased notable resilience to distortions. Other architectures like ConvNeXt, Swin, and ResNetD were more susceptible to the tested distortions. MobileNetV3-based models seem to provide an exceptionally good ratio between the robustness and model size, but this could also be caused by the fact that models from this family have inherently higher base error rates, which intrinsically allows for a larger margin of error.
Deep learning softwares are designed using artificialneuralnetworks for various applications by training and testing them with an appropriate dataset. The raw image samples available in the dataset may contain noisy...
详细信息
Deep learning softwares are designed using artificialneuralnetworks for various applications by training and testing them with an appropriate dataset. The raw image samples available in the dataset may contain noisy and unclear information due to radiation, heat and poor lighting conditions. Therefore, the researchers are trying to filter and enhance such noisy images through preprocessing steps for providing a valid feature information to the neural network layers included in the deep learning software. However, there are certain claims that roam around the researchers such as an image may lose some useful information when it is not preprocessed with an appropriate filter or enhancement technique. Hence, the work reviews the efficacy of the methodologies that are designed with and without a preprocessing step. Also, the work summarizes the common reasons and statements highlighted by the researchers for using and avoiding the preprocessing steps on designing a deep learning approach. The study is conducted to provide a clarity toward the requirement and non-requirement of preprocessing step in a deep learning software.
In the field of computer vision, image denoising remains a fundamental and challenging problem, playing a crucial role in the preprocessing of various imageprocessing tasks. The introduction of Convolutional neural N...
详细信息
ISBN:
(纸本)9798350391961;9798350391954
In the field of computer vision, image denoising remains a fundamental and challenging problem, playing a crucial role in the preprocessing of various imageprocessing tasks. The introduction of Convolutional neuralnetworks (CNNs) into the image denoising domain has yielded significant improvements across different levels of visual tasks. In recent years, models based on the Swin Transformer have also been applied to the image denoising field, demonstrating superior denoising performance that surpasses CNN-based methods, thus becoming advanced techniques in current image denoising research. This paper proposes a Swin-Conv module that combines the local modeling capabilities of residual convolutional layers with the non-local modeling capabilities of the Swin Transformer and integrates this module into the UNet architecture for image denoising. For the dataset used in the model training process, data augmentation techniques were employed to randomly enhance the dataset, thereby improving overall robustness. The results indicate that the proposed Swin Transformer Residual Conv U-Net model shows improvement over current advanced networks, achieving PSNR and SSIM values of 36.09 and 0.963 at sigma = 15, 33.87 and 0.915 at sigma = 25, and 28.96 and 0.810 at sigma = 50.
BP neuralnetworks have a wide range of applications and can cope with a variety of problems. In the past, many scholars have applied neuralnetworks to various problems. However, BP neuralnetworks require a large nu...
详细信息
Adopting Machine Learning (ML) in manufacturing quality assurance (QA) has accelerated with Industry 4.0, enabling automated defect detection, predictive maintenance, and real-time process optimization. However, selec...
详细信息
Adopting Machine Learning (ML) in manufacturing quality assurance (QA) has accelerated with Industry 4.0, enabling automated defect detection, predictive maintenance, and real-time process optimization. However, selecting the most effective ML model remains challenging due to performance variability, scalability constraints, and inconsistent evaluation metrics across manufacturing sectors. This systematic review analyzes over 300 peerreviewed studies over the last two decades (mostly analyzing the recent works) to evaluate the effectiveness of widely used ML algorithms-artificialneuralnetworks (ANNs), Support Vector Machines (SVMs), Random Forests (RFs), Decision Trees (DTs), and K-Nearest Neighbors (KNN)-in QA applications. Performance metrics include accuracy, precision, speed, recall, computational efficiency, scalability, and real-time processing capabilities. Findings reveal that ANNs outperform other models in image-based defect detection, while SVMs and RFs excel in predictive maintenance and process parameter optimization. DTs provide better interpretability for process control, and KNN is effective for small-scale QA implementations. In specific case scenarios, RF models showed particular strength in handling high-dimensional sensor data in fault detection in manufacturing quality assurance operations. The study presents a comparative assessment framework, guiding algorithm selection based on industry-specific requirements and operational constraints. This review provides the latest implementation of ML in QA along with quantitative evidence on which algorithm offers the most optimization in specific industrial settings, which would help in algorithm selection in manufacturing quality assurance in future for both researchers and industrial experts. Also, it offers an overview of the major and minor algorithms based on their performance metrics.
To solve the problem of detecting graffiti (tags), an artificialneural network with the YOLOv5 architecture was used. This architecture is known for its high operating speed and low computing power requirements, enab...
详细信息
This study presents a novel approach to phishing email detection, leveraging artificialneuralnetworks (ANN) with soft attention in natural language processing (NLP) through the integration of BERT encoders. Addressi...
详细信息
ISBN:
(纸本)9783031837890;9783031837906
This study presents a novel approach to phishing email detection, leveraging artificialneuralnetworks (ANN) with soft attention in natural language processing (NLP) through the integration of BERT encoders. Addressing the critical need for effective aritifical intelligence (AI)-driven cybersecurity solutions, this research combines BERT's NLP capabilities with a modified crayfish optimization algorithm (COA) to fine-tune the hyperparameters of deep neural network models, enhancing classification accuracy. Experimental results show that our optimized model achieves a phishing detection accuracy of 92.5%, outperforming several high-performing optimizers. Comparative analysis demonstrates that this approach offers superior detection capabilities, underscoring its potential for real-world applications. This work advances the field by refining BERT's application with optimization algorithms and provides a valuable framework for future cybersecurity research.
The symbiotic use of logarithmic approximation in floating-point (FP) multiplication can significantly reduce the hardware complexity of a multiplier. However, it is difficult for a limited number of logarithmic FP mu...
详细信息
The symbiotic use of logarithmic approximation in floating-point (FP) multiplication can significantly reduce the hardware complexity of a multiplier. However, it is difficult for a limited number of logarithmic FP multipliers (LFPMs) to fit in a specific error-tolerant application, such as neuralnetworks (NNs) and digital signal processing, due to their unique error characteristics. This article proposes a design framework for generating LFPMs. We consider two FP representation formats with different ranges of mantissas, the IEEE 754 Standard FP Format and the Nearest Power of Two FP Format. For both logarithm and anti-logarithm computation, the applicable regions of inputs are first evenly divided into several intervals, and then approximation methods with negative or positive errors are developed for each sub-region. By using piece-wise functions, different configurations of approximation methods throughout applicable regions are created, leading to LFPMs with various trade-offs between accuracy and hardware cost. The variety of error characteristics of LFPMs is discussed and the generic hardware implementation is illustrated. As case studies, two LFPM designs are presented and evaluated in applications of JPEG compression and NNs. They do not only increase the classification accuracy, but also achieve smaller PDPs compared to the exact FP multiplier, while being more accurate than a recent logarithmic FP design.
暂无评论