This paper explores the challenges and solutions in graph visualization, a critical tool used across various fields for representing complex relationships between objects. As the complexity and volume of these relatio...
详细信息
ISBN:
(纸本)9798350380170;9798350380163
This paper explores the challenges and solutions in graph visualization, a critical tool used across various fields for representing complex relationships between objects. As the complexity and volume of these relationships increase, the readability and effectiveness of graph visualization diminish. Individual techniques such as node layout and edge bundling have been employed to mitigate this issue, with methods like the Kamada-Kawai for node layout and Force Directed Edge Bundling for edge bundling showing success. However, these techniques are often conducted separately in network visualization. This paper discusses a method proposed by Meikari et al. that aims to improve visualization results by simultaneously conducting node layout and edge bundling. This method uses evolutionary computation to optimize both aspects at once, potentially preventing the decrease in effectiveness due to inappropriate node layouts or overemphasis on edge bundling. However, the execution time and validation of this method remain significant challenges. This paper aims to further explore and address these issues.
The traditional digital landscape architecture planning (hereinafter referred to as DLAP) system has problems such as long planning time and rough planning details. This article designs a DLAP system using visualizati...
详细信息
Almost all existing software for visualization of biomedical volumes provides three-dimensional (3D) rendering. The most common techniques for 3D rendering of volume data are maximum intensity projection (MIP) and dir...
详细信息
ISBN:
(纸本)9783031490613;9783031490620
Almost all existing software for visualization of biomedical volumes provides three-dimensional (3D) rendering. The most common techniques for 3D rendering of volume data are maximum intensity projection (MIP) and direct volume rendering (DVR). Recently, rendering algorithms based on Monte-Carlo path tracing (MCPT) have also been considered. Depending on the algorithm, level of detail, volume size, and transfer function, rendering can be quite slow. In this paper, we present a simple and intuitive voxelization method for biomedical volume rendering optimization. The main advantage of the proposed method, besides the fast structure construction and traversal, is its straightforward application to MIP, DVR and MCPT rendering techniques (multi-target optimization). The same single structure (voxel grid) can be used for empty space skipping, optimized maximum intensity calculation and advanced Woodcock tracking. The performance improvement results suggest the use of the proposed method especially in cases where different rendering techniques are combined.
People have successfully applied complex network theory to many cross-cutting fields, including social network construction, route planning, and association information mining. For complex networks, the visualization ...
详细信息
ISBN:
(纸本)9798350310801
People have successfully applied complex network theory to many cross-cutting fields, including social network construction, route planning, and association information mining. For complex networks, the visualization of network topology is one of the main ways to express and convey information. With the help of visualizationtechniques, users can visually and intuitively perceive the objects and inter-object relationships expressed by the network. However, many complex network visualization algorithms often ignore the user's intuitive cognitive needs for complex networks, making the final generated network visualization results suffer from path intersection and node overlap. This paper proposes a visualizationoptimization algorithm based on the simulated annealing algorithm oriented to the mainstream force layout algorithm to optimize and design a reasonable optimization function. It adjusts the structures that are unfavorable to visual cognition and improves the cognitive efficiency of users in the visualization of network topology. The author expects that the research in this paper will be helpful for the optimization of network topology visualization algorithms for complex networks and their applications.
Feature visualization is one of the most popular techniques used to interpret the internal behavior of individual units of trained deep neural networks. Based on activation maximization, they consist of finding synthe...
详细信息
ISBN:
(纸本)1577358872
Feature visualization is one of the most popular techniques used to interpret the internal behavior of individual units of trained deep neural networks. Based on activation maximization, they consist of finding synthetic or natural inputs that maximize neuron activations. This paper introduces an optimization framework that aims to deceive feature visualization through adversarial model manipulation. It consists of fine-tuning a pre-trained model with a specifically introduced loss that aims to maintain model performance, while also significantly changing feature visualization. We provide evidence of the success of this manipulation on several pre-trained models for the classification task with ImageNet.
Accurate stock price prediction and analysis are now essential for businesses and investors in today's market. The accuracy with which traditional approaches to forecasting and visualizing stock data may predict f...
详细信息
As software becomes larger and more complex, the need for effective visualizationtechniques that can adaptively display different levels of detail is increasing. With the visualization of software security vulnerabil...
详细信息
ISBN:
(纸本)9798331511425;9798331511432
As software becomes larger and more complex, the need for effective visualizationtechniques that can adaptively display different levels of detail is increasing. With the visualization of software security vulnerabilities, software practitioners may understand the code issues well and look for necessary solutions. While there are existing solutions for visualizing software securely in complex codebases, a critical need still exists for novel interactive visualizationtechniques that can adaptively present various aspects of software systems, including security vulnerabilities, code structures, dependencies, relationships, and performance bottlenecks. As software systems become increasingly complex, the Level of Detail (LoD) mechanism encounters several challenges in enabling the efficient exploration and comprehension of sophisticated code structures in a user-friendly manner. To address these challenges, this paper proposes an advanced LoD mechanism, utilizing a city metaphor for software visualization. This approach enhances software visualization by dynamically adjusting the Level of Detail (LoD) presented based on user roles and tasks, code metrics, and real-time code changes. This method is expected to contribute to more effective outcomes, particularly in enhancing the effectiveness of content-aware LoD switching, real-time performance optimization, and user-centric customizations. Furthermore, this approach seamlessly integrates into the software development process, providing continuous feedback and enabling developers to identify security vulnerabilities and performance bottlenecks.
In the present paper, existing visualization algorithms for rendering of atmospheric clouds are described, particle system algorithm and raymarching algorithm are compared. The raymarching algorithm is chosen as a rel...
详细信息
Recent research revealed that embedding a node-link diagram in a flat torus avoids edge crossings, improves aesthetic metrics, and has advantages in tasks such as path tracking and understanding network structures. Ho...
详细信息
ISBN:
(纸本)9798350393811;9798350393804
Recent research revealed that embedding a node-link diagram in a flat torus avoids edge crossings, improves aesthetic metrics, and has advantages in tasks such as path tracking and understanding network structures. However, the effectiveness of torus layouts using graphs and the influence of the cell size, the size of the torus space used during torus layouts on the drawing results have not been investigated. In this study, we clarified that the optimal cell size that minimizes the stress of drawing results differs depending on the graph through computational experiments using benchmark graph data. Moreover, we uncovered that in graphs with enabled torus layouts, the stress function depending on the cell size, is close to an unimodal function. We focused on this unimodal property and proposed an algorithm to determine whether a torus is valid from the drawing results and the optimal cell size using the golden-section search. Reportedly, the aesthetic metrics of graphs with optimal cell sizes outperformed empirically used cell sizes through computational experiments.
In recent years, Face Anti-Spoofing (FAS) has played a crucial role in preserving the security of face recognition technology. With the rise of counterfeit face generation techniques, the challenge posed by digitally ...
详细信息
ISBN:
(纸本)9798350365474
In recent years, Face Anti-Spoofing (FAS) has played a crucial role in preserving the security of face recognition technology. With the rise of counterfeit face generation techniques, the challenge posed by digitally edited faces to face anti-spoofing is escalating. Existing FAS technologies primarily focus on intercepting physically forged faces and lack a robust solution for cross-domain FAS challenges. Moreover, determining an appropriate threshold to achieve optimal deployment results remains an issue for intra-domain FAS. To address these issues, we propose a visualization method that intuitively reflects the training outcomes of models by visualizing the prediction results on datasets. Additionally, we demonstrate that employing data augmentation techniques, such as downsampling and Gaussian blur, can effectively enhance performance on cross-domain tasks. Building upon our data visualization approach, we also introduce a methodology for setting threshold values based on the distribution of the training dataset. Ultimately, our methods secured us second place in both the Unified Physical-Digital Face Attack Detection competition and the Snapshot Spectral Imaging Face Anti-spoofing contest. The training code is available at https://***/SeaRecluse/CVPRW2024.
暂无评论