Snapshot compressive imaging (SCI) uses a 2D sensor to obtain higher dimensional data and then reconstructs the underlying high-dimension data by elaborate algorithms. Applying SCI to capture hyperspectral images is k...
详细信息
Pedestrian trajectory prediction plays a pivotal role in ensuring the safety and efficiency of various applications, including autonomous vehicles and traffic management systems. This paper proposes a novel method for...
详细信息
False correspondence removal remains a challenge for many feature-matching-based applications. This paper proposes a solution that revisits the local semantic context via position-attentive learning. First, a cross-di...
False correspondence removal remains a challenge for many feature-matching-based applications. This paper proposes a solution that revisits the local semantic context via position-attentive learning. First, a cross-divisional module is introduced to extract semantic features from image-patch pairs. Then, through a position-attentive mechanism, the parametric positions and extracted semantic features are jointly utilized to compute the probabilities of a set of putative correspondences. The proposed approach is evaluated on several indoor and outdoor challenging datasets, containing up to 70%+ false correspondences. In most cases, the solution outperforms existing algorithms in terms of matching precision and F1-score. Furthermore, an ablation study indicates that revisiting the semantic context improves precision by nearly 5%. The code is available at the link below 1 .
Waste management is a pressing global issue, and the need for efficient waste separation processes is becoming increasingly important. Incorporating Machine Learning techniques with waste separation has yielded promis...
详细信息
Cyberbullying has become a widespread concern in our society, and its detection has grown in significance. In recent years, machine learning algorithms have exhibited considerable potential in detecting cyberbullying....
详细信息
With the escalating demand for image observation and video transmission in underwater environments, real-time wireless multimedia transmission stands as the pivotal stride in the advancement of ocean exploration and o...
详细信息
ISBN:
(数字)9798350355895
ISBN:
(纸本)9798350355901
With the escalating demand for image observation and video transmission in underwater environments, real-time wireless multimedia transmission stands as the pivotal stride in the advancement of ocean exploration and observation systems. While acoustic communication remains the most dependable solution for underwater wireless communication, multimedia transmission still grapples with the challenges of limited band-width and poor channel quality. In this paper, we introduce a self-developed underwater acoustic modem especially tailored to real-time multimedia transmission. This comprehensive design spans across hardware components, the application layer, data link layer, and the physical layer. The utilization of multi-band retransmission mechanisms and sophisticated physical layer algorithms contributes to the system's resilience against the complexities of the underwater acoustic channel. Subsequent communication experiments have been conducted in both Zhoushan, Zhejiang, and the South China Sea, focusing on horizontal and vertical underwater acoustic channels respectively. Through these trials, the system's demodulation and retransmission capabilities have been duly validated, resulting in the successful transmission of multimedia video files on multiple occasions.
A star sensor takes the stars as the reference sources for attitude measurement to output the star vectors in the coordinate system of the star sensor, providing high-precision measurement data for the attitude contro...
详细信息
Violations of the roadway leads to a decrease in the level of driver safety and the condition of the car, reduces the speed of movement. Violations include cracks, pits, ruts, the size of which can change every day, d...
详细信息
The auxiliary recognition method based on multi-scale feature algorithms is a technology used to improve the accuracy of image recognition. Traditional image recognition algorithms often face difficulties in processin...
The auxiliary recognition method based on multi-scale feature algorithms is a technology used to improve the accuracy of image recognition. Traditional image recognition algorithms often face difficulties in processingimages with rich details, as changes in details may lead to difficulty in feature extraction and a decrease in accuracy. To overcome this problem, multi-scale feature algorithms have been introduced, which can analyze images at different scales and capture feature information at different levels. The Committed step of this method include the following aspects: First, the original image is divided into multiple sub images of different scales by using image pyramid technology. Then, for each sub image, feature extraction algorithms are used to extract its feature representation. These features can be local features, global features, or mixed features, selected according to specific application requirements. Next, by fusing features at different scales, a comprehensive feature representation is obtained. Finally, this feature representation can be used for image recognition tasks such as object detection, classification, etc.
The development of computer vision systems stimulates the development of various applications in the field of image recognition. Methods and algorithms for image recognition in document processingsystems play a cruci...
The development of computer vision systems stimulates the development of various applications in the field of image recognition. Methods and algorithms for image recognition in document processingsystems play a crucial role. There is a lot of research in this direction, and one of the most difficult problems is handwritten text recognition. This includes the tasks of signature identification, which the authors of the paper consider. The article considers the main stages of signature analysis to establish authorship. They are the preprocessing of the signature, representation in a form convenient for applying author identification. A dataset containing sample signatures of various people is used. The described tools became means to develop software for preprocessingimages of signatures, extracting characteristics and identifying the author of the signature.
暂无评论