Holography is an ideal three-dimensional display technology, and it can reconstruct natural-looking three-dimensional objects with sufficient depth. In this paper, we propose a system model that uses computer holograp...
详细信息
ISBN:
(纸本)9798350330946;9798350330953
Holography is an ideal three-dimensional display technology, and it can reconstruct natural-looking three-dimensional objects with sufficient depth. In this paper, we propose a system model that uses computer holography and electro holography to stream holographic videos. The holographic video is generated by synthesizing computer-generated holograms calculated by using light waves from a virtual object designed on a computer. The holographic video is streamed from a transmitter to a receiver with display devices via networks, and three-dimensional objects are optically reconstructed by using electroholography with a spatial light modulator. The transmission performances of streaming holographic video over wired LAN (1000BASE-T), wireless LAN (ieee 802.11ax), and local 5G network were evaluated.
Person re-identification is an important branch in the field of computer vision. In recent years, convolutional neural networks-based models, especially for the residual network, have made significant progress with th...
详细信息
Federated learning is a distributed machine learning method that has important research significance in areas such as privacy, data heterogeneity, communication efficiency, and incentive mechanisms. Data imbalance is ...
详细信息
The process of fusing infrared and visible images necessitates integrating thermal radiation information from infrared image with the edge and texture detail captured by visible images. Most current fusion methods are...
详细信息
Transformer-based network architectures have gradually replaced convolutional neural networks in computer vision. Compared with convolutional neural networks, Transformer is able to learn global information of images ...
详细信息
ISBN:
(纸本)9781665488679
Transformer-based network architectures have gradually replaced convolutional neural networks in computer vision. Compared with convolutional neural networks, Transformer is able to learn global information of images and has better feature extraction capability. However, due to the lack of inductive bias, vision Transformers require a large amount of data for pre-training, such as ViT. local-based Transformers effectively reduce the computational complexity, but could not establish long-range dependencies and do not perform as well on small-scale datasets. In response to these problems, OPSe Transformer is proposed. A global attention calculation module is designed to be added behind each stage of the vision Transformer, using a slightly larger and overlapping key patch and value patch to enhance the exchange of information between two adjacent windows and to aggregate global information in the local Transformer. In addition, a self-supervised learning proxy task is added to the architecture, corresponding to the loss function of the proxy task to constrain the training of the model on the dataset, so that the vision Transformer can learn spatial information within an image and improve the training effect of the network. Comparative experiments are conducted on the tiny-ImageNet, CIFAR-10/100, and other datasets, and the experimental results show that compared with the baseline algorithm, our model improves the accuracy by up to 3.91%.
Online learning algorithms adjust the synaptic weights when the neurons fire spikes during the learning process of spiking neural networks, which are shown to be more suitable and effective for processing spatio-tempo...
详细信息
To address the challenge of rapid mushroom identification in natural environments, this study proposes a mushroom identification model based on a feature fusion network, using nine types of mushrooms as research objec...
详细信息
In this paper, we deal with a wireless sensor network (WSN) infrastructure management problem where a provider wants to partition a network into a given number of nodedisjoint subgraphs (called slices) for running dif...
详细信息
ISBN:
(数字)9781665480017
ISBN:
(纸本)9781665480017
In this paper, we deal with a wireless sensor network (WSN) infrastructure management problem where a provider wants to partition a network into a given number of nodedisjoint subgraphs (called slices) for running different user applications. Nodes in the given infrastructure use energy harvesting for prolonged service time. The nodes manage fluctuations in their stored energy by adjusting their transmission range. We assume that each node is assigned an importance weight, and model the overall network using a probabilistic graph. In this context, we formalize a problem, denoted k-WBS-RU (for k weighted balanced slices with range uncertainty), to partition the network into k slices subject to some connectivity and operation constraints. We devise a solution to the problem, and present numerical results on the quality of the obtained slices. We also discuss an application of the proposed framework and solution when the assigned weights are derived from an area coverage application.
Face clustering is a method for unlabeled image annotation and has attracted increasing attention. Existing methods have made significant breakthroughs by introducing Graph Convolutional networks (GCNs) on the affinit...
ISBN:
(纸本)9798350307184
Face clustering is a method for unlabeled image annotation and has attracted increasing attention. Existing methods have made significant breakthroughs by introducing Graph Convolutional networks (GCNs) on the affinity graph. However, such graphs will contain many vertex pairs with inconsistent similarities and labels, thus degrading the model's performance. There are already relevant efforts for this problem, but the information about features needs to be mined further. In this paper, we define a new concept called confidence edge and guide the construction of graphs. Furthermore, a novel confidence-GCN is proposed to cluster face images by deriving more confidence edges. Firstly, local Information Fusion is advanced to obtain a more accurate similarity metric by considering the neighbors of vertices. Then Unsupervised Neighbor Determination is used to discard low-quality edges based on similarity differences. Moreover, we elaborate that the remaining edges retain the most beneficial information to demonstrate the validity. At last, the confidence-GCN takes the graph as the input and fully uses the confidence edges to complete the clustering. Experiments show that our method outperforms existing methods on the face and person datasets to achieve state-of-the-art. At the same time, comparable results are obtained on the fashion dataset.
The interaction between the Internet of Things (IoT) and edge computing plays a critical role in processing and analyzing massive amounts of data. However, due to the malicious attacks of underlying IoT edge networks,...
详细信息
暂无评论