In recent years, with the application of Multi-access edge computing (MEC) technology in the power internet of Things (PIOT), the power internet of Things has gradually formed a development trend of large connections,...
详细信息
image segmentation is critical to object-oriented image processing. Many conventional segmentation algorithms are based on the superpixel, since it integrates the pixels with similar colors and locations in prior and ...
详细信息
ISBN:
(纸本)9781665464956
image segmentation is critical to object-oriented image processing. Many conventional segmentation algorithms are based on the superpixel, since it integrates the pixels with similar colors and locations in prior and is beneficial for segmentation. Recently, several segmentation algorithms based on deep learning were developed. However, due to the irregular shape and size of superpixels, it is hard to apply the superpixel directly in a leaning-based segmentation algorithm. In this paper, we propose a novel segmentation method that well integrates the techniques of the deep neural network (DNN), the superpixel, adaptive loss functions, and multi-layer feature extraction. First, different from other learning-based algorithm, which applies an image or its bounding boxes as the input, we adopt the mean and the histogram differences of the features of two superpixels as the input of the DNN to determine whether they should be merged. Moreover, to well consider both largescaled and small-scaled features, a hierarchical architecture is adopted. For different layers, the DNN models with different loss functions are applied. A larger penalty for over-merging is applied in the first layer and a larger penalty for oversegmentation is applied in the following layer. Moreover, according to human perception, the features of colors, areas, the gradient at the boundary, and the texton, which is highly related to the texture, are applied. Experiments show that the proposed method outperforms other state-of-the-art image segmentation methods and produces highly accurate segmentation results.
Due to rapid growth in technology there is a need to secure multimedia data like audio, video, text etc. available on the internet. In the proposed work, visual cryptography based watermarking techniques are proposed ...
详细信息
With the continuous development and popularisation of internet of Things (IoT) technology, the regulation and protection of computer network information security has become increasingly important. The application of I...
详细信息
ISBN:
(纸本)9798350376548
With the continuous development and popularisation of internet of Things (IoT) technology, the regulation and protection of computer network information security has become increasingly important. The application of IoT information technology enables various devices and systems to communicate and interact with each other, however, it also brings new security challenges and risks. In this context, it is particularly urgent and necessary to develop effective regulation and protection strategies. This paper focuses on computer network information security in the internet of Things environment, considering the rapid development of the internet of Things and its unique security challenges, to study the regulation and protection strategies to adapt to this field. First, this content investigates the shortcomings of traditional information security strategies in dealing with the diversity, large-scale deployment, data privacy protection, real-time monitoring and cross-border integration of the IOT, and discusses the important exploration results and existing defects in the field of IOT security in the current academia and industry. based on a step-by-step exploration of existing references and methods, this content designs a multi-level security protection system that covers security requirements from the device layer to the application layer. In threat detection, the system shows an average of 95% threat detection accuracy, ensuring efficient security monitoring. The system stability and performance evaluation experiment shows that the CPU usage maintenance rate is about 65% on average, and the memory usage is about 55% on average. The above data indicates that the system maintains good stability while operating efficiently. In the adaptive defense mechanism effect test, the system shows an average of about 3 defense mechanism adjustments per day, indicating its high adaptability in a dynamic security environment. The above experimental results jointly verify the effectiv
Improved fuzzy c-means (FCM) clustering algorithms have been widely used for image recognition and localization. However, in industrial assembly systems, the unsatisfactory pixel merging and segmentation results betwe...
详细信息
The Antarctic ice sheet is an important part of the Earth system and plays a key role in the global climate system. The frequency modulated continuous wave (FMCW) radar can be used to obtain the changes of the transmi...
详细信息
In this paper, we present an automatic modulation classification (AMC) algorithm for identifying overlapped signals. The proposed algorithm leverages dual-type images as deep learning input data, which is composed of ...
详细信息
With the advancement of internet and computer technology in the last decade, the ease of editing and altering digital images has significantly increased. Therefore, it is now more crucial than ever for sensitive indus...
详细信息
The proceedings contain 11 papers. The topics discussed include: accurate shadow height measurement technology of the SAR image;millimeter wave radar fall detection algorithm based on improved transformer;an end-to-en...
ISBN:
(纸本)9798400700040
The proceedings contain 11 papers. The topics discussed include: accurate shadow height measurement technology of the SAR image;millimeter wave radar fall detection algorithm based on improved transformer;an end-to-end learning based covolutional neural network for single image defogging algorithm;ornaments and barlines recognition of numbered musical notation using YOLOv5;study on hyperspectral remote sensing images of GF-5 de-blurring based on sparse representation;design and implementation of target tracking system in low illumination environment based on FPGA;SAR image geometry correction technologybased on block parallel signal processing;speech recognition method based on deep learning of artificial intelligence: an example of BLSTM-CTC model;and high precision reference measurement technology for mechanical scanning radar.
As a fundamental task in the field of computer vision, super-resolution reconstruction has a wide range of applications on the industrial internet. However, most of the existing super-resolution reconstruction methods...
详细信息
ISBN:
(数字)9781665460569
ISBN:
(纸本)9781665460569
As a fundamental task in the field of computer vision, super-resolution reconstruction has a wide range of applications on the industrial internet. However, most of the existing super-resolution reconstruction methods are based on convolutional neural networks for feature extraction, which have the problems of low model representation efficiency and insufficient explanation of the extraction process, which limit the performance of the model in industrial internet scenarios. In recent years, although transformers have been proposed to solve the above problems well and achieve good results in image classification tasks, there is still room for improvement in the adaptability of super-resolution reconstruction tasks. Therefore, in this paper, an improved transformer-basedimage super-resolution reconstruction model is designed to effectively improve the performance of the image super-resolution reconstruction model. Experiments show that the adaptation of the Transformer mechanism on the super-resolution reconstruction task in this paper can practically improve the performance of the model on public datasets and industrial internet scenario datasets.
暂无评论