The diagnosis of retinal diseases using the vasculature of Fundus images has long been a focus of both ophthalmologists and medical research. Using computer-aided techniques to provide segmentation of blood vessels he...
详细信息
In the context. of smart cities, edge-aware machine are widely used. These systems involve scenarios where large volumes of image data are stored locally. They also involve scenarios where image data is uploaded to ed...
详细信息
ISBN:
(纸本)9798400709630
In the context. of smart cities, edge-aware machine are widely used. These systems involve scenarios where large volumes of image data are stored locally. They also involve scenarios where image data is uploaded to edge clouds, posing significant privacy risks. 'therefore, it is necessary to encrypt images containing sensitive information. However, edge computational devices typically have limited computational ability. To address the need t'or privacy protection, this paper proposes a partial image encryption algorithm based on object detection. First, our approach uses an object detection model to identify private areas in images (such as license plates) and applies a specific encryption strategy to license plate areas. At the same time, the computational burden on edge devices is reduced. Additionally, we introduce a chaotic mapping algorithm based on image segmentation and compare its performance with traditional chaotic mapping algorithms. Experimental results show that the improved algorithm performs better in encrypting sensitive areas while also exhibiting superior performance in gray value histogram analysis and scatter plot analysis.
The image captioning is utilized to develop the explanations of the sentences describing the series of scenes captured in the image or picture forms. The practice of using image captioning is vast although it is a ted...
详细信息
Digital image restoration has become important for many image applications. Therefore, image Noise removal is an essential issue in an imageprocessing fields. In this paper, we presented a hybrid system, based on Sel...
详细信息
In order to comply with the trend of intelligent visual communication, this study proposed an innovative visual communication scenario based on imageprocessingalgorithms. The framework aims to optimize traditional k...
详细信息
ISBN:
(数字)9798331505745
ISBN:
(纸本)9798331505752
In order to comply with the trend of intelligent visual communication, this study proposed an innovative visual communication scenario based on imageprocessingalgorithms. The framework aims to optimize traditional key technologies such as the image generation, editing, style transfer and image compression. First, as the foundation of visual communication, this study proposes a generative adversarial network model based on text semantic information for image generation and editing. The model achieves stable image generation and efficient editing from a theoretical level through paired training of text and image pairs. Secondly, for image style transfer, this study designed an improved VGG19 convolutional neural network. At the same time, the adaptive instance normalization technology was combined to optimize the effect of style transfer. Finally, in terms of image compression, the study proposed an improved generative adversarial network (REviSED-GAN) model. This model can dynamically adjust the compression error based on structured information to improve image compression efficiency. Through comparative tests, the proposed image style transfer and image compression algorithms have shown excellent performance in terms of structural similarity, image quality and compression ratio.
To address challenging issues in wireless communications, researchers have developed deep learning (DL)-based techniques, yielding encouraging outcomes. However, commonly adopted neural network (NN) architectures, suc...
详细信息
ISBN:
(纸本)9798350381771;9798350381764
To address challenging issues in wireless communications, researchers have developed deep learning (DL)-based techniques, yielding encouraging outcomes. However, commonly adopted neural network (NN) architectures, such as convolutional (CNNs) and multi-layer perceptrons, are derived from DL for imageprocessing applications and are not specifically tailored to tackle wireless network challenges. Consequently, they often exhibit poor generalization and scalability issues in large-scale networks and unknown network environments. Graph neural networks (GNNs) have gained recent popularity as a solution to these challenges due to their ability to effectively utilize domain knowledge and graph topology in wireless communications. GNN-based techniques demonstrate nearly optimal performance in massive networks and show good generalization across various system configurations. To leverage GNNs in wireless systems, we have designed a cell-free massive MIMO (CF-mMIMO) system, presented as a GNN structure. The proposed CF-mMIMO system is employed to analyze the effectiveness of different GNN models and various optimization algorithms. The system exhibits effective performance against optimal benchmarks and provides valuable insights for the next-generation research community.
The predominant function of most facial analysis systems revolves around facial alignment and eye tracking, crucial for locating key facial landmarks in images or videos. While developers have access to various models...
详细信息
Spam SMS messages are a prevalent problem in today's world and have become a source of annoyance for users. This research study proposes a novel approach to detect SMS spam using Natural Language processing (NLP) ...
详细信息
In this paper, we present the performance analysis of new Sub-band Improved Proportionate NLMS algorithm to improve the convergence rate of dispersive acoustical channel identification. Although the existing proportio...
详细信息
Recently, online teaching and learning have seen a notable uptrend in adoption, subsequently increasing interest in conducting online assessments. The limitation of remote online assessments lies in the challenge of s...
详细信息
ISBN:
(纸本)9783031648809;9783031648816
Recently, online teaching and learning have seen a notable uptrend in adoption, subsequently increasing interest in conducting online assessments. The limitation of remote online assessments lies in the challenge of supervising the individual being assessed. For this reason, many consider human supervision a superior method for maintaining the integrity of assessments. This paper introduces algorithm-driven techniques for the automated supervision of online assessment-takers by analysing system processes on their devices and conducting random photographic monitoring. These techniques, along with their associated algorithms, have been encapsulated into a proof of concept tool. The approach aims to deter assessment-takers from accessing unauthorised files on their devices during assessments and to instil a sense of being monitored. The system is built around two primary components: one that monitors process activity and another that analyses images captured through the assessment-taker's device webcam. Data collected through these methods are further analysed using facial recognition and additional algorithms to detect behaviours potentially indicative of cheating during the assessment. Initial testing of the proposed tool achieved a 96.3% accuracy rate in image analysis for identifying cheating behaviour. Moreover, university lecturers' evaluations strongly support the tool's potential to deter cheating, its effectiveness in detection, and its role in maintaining the integrity of online assessments. Future research is recommended to address the challenges identified with the proof of concept tool, with the objective of enhancing both the accuracy and the overall effectiveness of the proposed techniques.
暂无评论