In order to increase the chaotic parameter range, improve the initial sensitivity of the chaotic system and the security of the image encryption algorithm, This paper proposed a new image encryption based on combinati...
详细信息
Cancer detection from histopathology images is based on extraction of spatial information from whole slide images(WSI) using imageprocessing tools. Machine learning algorithms and state-of-the art convolution neural ...
详细信息
The intuitive control of robot swarms becomes crucial when humans are working in close proximity with the swarm in unknown environments. In such operations, it is necessary to maintain the autonomy of the swarm while ...
详细信息
ISBN:
(数字)9781665405935
ISBN:
(纸本)9781665405935
The intuitive control of robot swarms becomes crucial when humans are working in close proximity with the swarm in unknown environments. In such operations, it is necessary to maintain the autonomy of the swarm while giving the human operator enough means to influence the decision-making process of the robots. This paper presents a human-swarm interaction approach using full-body action recognition to control an autonomous flock of unmanned aerial vehicles. We estimate the full-body pose of the human operator and use a k-nearest neighbor algorithm to classify the action made by the humans. Finally, the swarm uses the identified action to decide its goal direction. We demonstrate the practicality of our approach with a multi-stage experimental setup to evaluate the prediction accuracy and robustness of the system.
Especially in static situations, image stitching has been routinely used to seamlessly merge many photographs into a panorama. Using it in dynamic and real-time environments, however, presents a number of difficulties...
详细信息
ISBN:
(数字)9798331509293
ISBN:
(纸本)9798331509309
Especially in static situations, image stitching has been routinely used to seamlessly merge many photographs into a panorama. Using it in dynamic and real-time environments, however, presents a number of difficulties, such as managing shifting objects, changing surroundings, and processing limitations. An image stitching look at that works well in dynamic real-time situations is presented in this paper. The method makes use of GNN-based feature matching, dynamic object removal, and real-time synthesis techniques. Comparative studies suggest that, in comparison to traditional methods like SIFT and ORB, the suggested approach meets real-time processing requirements while achieving greater registration precision, lower homography RMSE, and consistent panoramic outputs. The findings imply that the algorithm might be used in fields where precision and efficiency are required in dynamic circumstances, like parking management systems, sports broadcasting, and autonomous driving.
In order to meet the real-time detection and processing requirements of on-board targets in the field of remote sensing imageprocessing, this paper carries out relevant research from the perspective of software optim...
详细信息
ISBN:
(数字)9798350363951
ISBN:
(纸本)9798350363968
In order to meet the real-time detection and processing requirements of on-board targets in the field of remote sensing imageprocessing, this paper carries out relevant research from the perspective of software optimization and proposes an onboard adaptive image windowing processing method based on differential evolution algorithm to solve the problem of shortage of on-board hardware computing resources. Based on the adaptive differential evolution algorithm, combined with the engineering application scenario, the algorithm innovatively designs an individual objective function to evaluate the “advantages and disadvantages“ of the algorithm evolution results. By coordinating all the target positions to be tracked in the image plane, the algorithm optimizes the number of windows, and considers the application boundary of the algorithm, which can effectively reduce the amount of data to be processed and greatly improve the timeliness of real-time detection on the board without losing the calculation accuracy.
Sign language is the primary means of communication for the deaf and mute community. The regional and national differences in sign language have led to barriers between different sign language systems, making communic...
详细信息
ISBN:
(数字)9798350356656
ISBN:
(纸本)9798350356663
Sign language is the primary means of communication for the deaf and mute community. The regional and national differences in sign language have led to barriers between different sign language systems, making communication between deaf and mute individuals from different regions challenging. This paper proposes a vision-tactile fusion approach to recognize sign language. The scheme applies a flexible sensor data glove to monitor the angle changes of finger joints, as well as visual imageprocessing technology, to integrate tactile and visual data for sign language recognition. The integration is performed through three methods: weighted average, weighted multiplication, and attention weights, with accuracy rates of 95.55%, 97.87%, and 98.83%, respectively.
The proceedings contain 35 papers. The special focus in this conference is on Advances in Distributed Computing and Machine Learning. The topics include: Computer-Aided Bundle Branch Block Detection Using Symbolic Fea...
ISBN:
(纸本)9789819718405
The proceedings contain 35 papers. The special focus in this conference is on Advances in Distributed Computing and Machine Learning. The topics include: Computer-Aided Bundle Branch Block Detection Using Symbolic Features of ECG Signal;block-Chain and Cloud-Based Tender Allocation System;reliability Assessment of IoT-Enabled systems Using Fault Trees and Bayesian Networks;resnet-50 Integrated with Attention Mechanism for Remote Sensing Classification;revolutionizing Data Annotation with Convergence of Deep Learning and Active Learning to Enhance Credibility on Twitter Datasets;statistical and Deep-Learning Approaches for Individual Carbon Footprint Calculation in India;intelligent Healthcare System Using Emerging Technologies: A Comprehensive Survey;Efficient Energy Management by Using SJF Scheduling in Wireless Sensor Network;cost Effective and Energy Efficient Drip Irrigation System for IoT Enabled Smart Agriculture;facial Detection and Recognition in Drone imagery Using FaceNet;valluvan: processing Name Board images to Enhance Communication for Native Tamil Speakers;Optimized VM Migration for Energy and Cost Reduction Using TSO Algorithm in Cloud Computing;A Study on the Mental Health Among Indian Population in the Post COVID-19 Pandemic Using Computational Intelligence;Cloud-Based Anomaly Detection for Broken Rail Track Using LSTM Autoencoders and Cross-modal Audio Analysis;Face Recognition Using CNN for Monitoring and Surveillance of Neurological Disorder Patients;a Novel Approach to Breast Cancer Histopathological image Classification Using Cross-colour Space Feature Fusion and Quantum–Classical Stack Ensemble Method;comparative Analysis of Deep Learning-Based Hybrid algorithms for Liver Disease Prediction;preface;performance Improvements of Covert Timing Channel Detection in the Era of Artificial Intelligence;sign Detection Using an N-Gram Language Model and MobileNet.
The high prevalence of chronic wounds, along with their impact on the patient’s life quality and healthcare systems, make them a relevant public health issue and have motivated the rise of digital health solutions to...
详细信息
Road image analysis is an important task for automatic road inventory. The determination geometric dimensions for the road and the identification road objects are subprocess of constructing a road digital image. In th...
详细信息
Crowdsourcing is becoming increasingly important for contemporary applications in machine learning and artificial intelligence. However, crowdsourcing systems may be susceptible to adversarial attacks where a subset o...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
Crowdsourcing is becoming increasingly important for contemporary applications in machine learning and artificial intelligence. However, crowdsourcing systems may be susceptible to adversarial attacks where a subset of annotators deliberately provide erroneous responses. This paper introduces a novel algorithm for identifying adversarial attacks in crowdsourcing systems by recasting the problem as dense subgraph detection in bipartite graphs. In particular, we represent crowdsourced data as a weighted bipartite graph between workers and data points which are connected with edges whose weights are computed from annotators’ responses. The constructed bipartite graph is then analyzed with a sequential peeling algorithm to detect the dense subgraph that includes adversarial attacks. Compared to previous methods where only adversaries are detected, our proposed method can simultaneously identify adversarial annotators as well as affected data points. Preliminary results on real datasets showcase the potential of this novel approach.
暂无评论