The proceedings contain 16 papers. The topics discussed include: performance evaluation of recent object detection models for traffic safety applications on edge;tracking of artillery shell using optical flow;action r...
ISBN:
(纸本)9781450397926
The proceedings contain 16 papers. The topics discussed include: performance evaluation of recent object detection models for traffic safety applications on edge;tracking of artillery shell using optical flow;action recognition with non-uniform key frame selector;a view direction-driven approach for automatic room mapping in mixed reality;automatic gait gender classification using convolutional neural networks;deep 3D-2D convolutional neural networks combined with Mobinenetv2 for hyperspectral image classification;attention based BiGRU-2DCNN with hunger game search technique for low-resource document-level sentiment classification;strategies of multi-step-ahead forecasting for chaotic time series using autoencoder and LSTM neural networks: a comparative study;semi-supervised defect segmentation with uncertainty-aware pseudo-labels from multi-branch network;and security analysis of visual based share authentication and algorithms for invalid shares generation in malicious model.
With the deployment of the fifth generation (5G) wireless systems gathering momentum across the world, possible technologies for 6G are under active research discussions. In particular, the role of machine learning (M...
详细信息
ISBN:
(纸本)9798350302615
With the deployment of the fifth generation (5G) wireless systems gathering momentum across the world, possible technologies for 6G are under active research discussions. In particular, the role of machine learning (ML) in 6G is expected to enhance and aid emerging applications such as virtual and augmented reality, vehicular autonomy computer vision and internet of everything. This will result in large segments of wireless data traffic comprising image, video and speech. The ML algorithms process these for classification/recognition/estimation through the learning models located on cloud servers. This requires wireless transmission of data from edge devices to the cloud server. Channel estimation, handled separately from recognition step, is critical for accurate learning performance. Toward combining the learning for both channel and the ML data, we introduce implicit channel learning to perform the ML tasks without estimating the wireless channel. Here, the ML models are trained with channel-corrupted datasets in place of nominal data. Without channel estimation, the proposed approach exhibits approximately 60% improvement in image and speech classification tasks for diverse scenarios such as millimeter wave and IEEE 802.11p vehicular channels.
The proceedings contain 31 papers. The special focus in this conference is on Internet of Everything and Quantum Information processing. The topics include: Revolutionizing Agriculture: A Mobile App for Rapid Plant Di...
ISBN:
(纸本)9783031619281
The proceedings contain 31 papers. The special focus in this conference is on Internet of Everything and Quantum Information processing. The topics include: Revolutionizing Agriculture: A Mobile App for Rapid Plant Disease Prediction and Sustainable Food Security;EMG Based Human machine Integration for IoT Based Instruments;medrack: Bridging Trust and Technology for Safer Drug Supply Chain Using Ethereum and IoT;a Review on Tuberculosis Pattern Detection Based on Various machine Learning Techniques;sensor Based Hand Gesture Identification for Human machine Interface;an Improved Detection System Using Genetic Algorithm and Decision Tree;a Detailed Analysis of Colorectal Polyp Segmentation with U-Network;a Review on Internet of Things (IoT): Parkinson’s Disease Monitoring Device;machine Learning-Based Prediction of Temperature Rise in Squirrel Cage Induction Motor (SCIM);quantum Many-Body Problems: Quantum machine Learning applications;Experimental Study on the Impact of Airborne Dust Deposition on PV Modules Using Internet of Things;bidirectional Converter with Time Utilization-Based Tariff Investigation and IoT Monitoring of Charging Parameters Based on G2V and V2G Operations;predictive Analysis of Telecom Customer Churn Using machine Learning Techniques;baker’s Map Based Chaotic image Encryption in Military Surveillance Systems;Cyber Security Investigation of GPS-Spoofing Attack in Military UAV Networks;ioT Based Enhanced Safety Monitoring System for Underground Coal Mines Using LoRa Technology;ioT Based Hydroponic System for Sustainable Organic Farming;predicting Stride Length from Acceleration Signals Using Lightweight machine Learning Algorithms;unveiling Hate: Multimodal Perspectives and Knowledge Graphs;vision-Based Toddler Activity Recognition: Challenges and applications;automated W-Sitting Posture Detection in Toddlers.
Today, technological advancement in production of radar images can be seen with high spatial resolution and also the availability of these images' significant growth in interpretation and processing of high-resolu...
详细信息
Convolutional neural networks (CNNs) are widely used in machine learning (ML) applications such as imageprocessing. CNN requires heavy computations to provide significant accuracy for many ML tasks. Therefore, the ef...
详细信息
Convolutional neural networks (CNNs) are widely used in machine learning (ML) applications such as imageprocessing. CNN requires heavy computations to provide significant accuracy for many ML tasks. Therefore, the efficient implementations of CNNs to improve performance using limited resources without accuracy reduction is a challenge for ML systems. One of the architectures for the efficient execution of CNNs is the array-based accelerator, that consists of an array of similar processing elements (PEs). The array accelerators are popular as high-performance architecture using the features of parallel computing and data reuse. These accelerators are optimized for a set of CNN layers, not for individual layers. Using the same accelerator dimension size to compute all CNN layers with varying shapes and sizes leads to the resource underutilization problem. We propose a flexible and scalable architecture for array-based accelerator that increases resource utilization by resizing PEs to better match the different shapes of CNN layers. The low-cost partial reconfiguration improves resource utilization and performance, resulting in a 23.2% reduction in computational times of GoogLeNet compared to the state-of-the-art accelerators. The proposed architecture decreases the on-chip memory access rate by 26.5% with no accuracy loss.
image categorization is a fundamental task in computer vision, with applications in domains such as object recognition, medical imaging, and autonomous systems. Traditional approaches frequently fail to balance accura...
详细信息
Assessing the quality of pansharpened images is a critical issue in order to obtain a quantitative score to represent the quality and compare the performance of different fusion methods. Most of the introduced metrics...
详细信息
image-to-image translation is the process of transforming an image from one domain to another, where the goal is to learn the mapping between an input image and an output image. This task has been generally performed ...
详细信息
In this paper we present TruFor, a forensic framework that can be applied to a large variety of image manipulation methods, from classic cheapfakes to more recent manipulations based on deep learning. We rely on the e...
详细信息
ISBN:
(纸本)9798350301298
In this paper we present TruFor, a forensic framework that can be applied to a large variety of image manipulation methods, from classic cheapfakes to more recent manipulations based on deep learning. We rely on the extraction of both high-level and low-level traces through a transformer-based fusion architecture that combines the RGB image and a learned noise-sensitive fingerprint. The latter learns to embed the artifacts related to the camera internal and external processing by training only on real data in a self-supervised manner. Forgeries are detected as deviations from the expected regular pattern that characterizes each pristine image. Looking for anomalies makes the approach able to robustly detect a variety of local manipulations, ensuring generalization. In addition to a pixel-level localization map and a whole-image integrity score, our approach outputs a reliability map that highlights areas where localization predictions may be error-prone. This is particularly important in forensic applications in order to reduce false alarms and allow for a large scale analysis. Extensive experiments on several datasets show that our method is able to reliably detect and localize both cheapfakes and deepfakes manipulations outperforming state-of-the-art works. Code is publicly available at https://***/TruFor/.
In the robot application system incorporating dexterous hand, a vision-based robot grasping system is proposed to address the lack of robustness of dexterous hand in grasping fixed attitude objects. First, a 6DOF robo...
详细信息
暂无评论