Skin cancer images have hair occlusion problems, which greatly affects the accuracy of diagnosis and classification. Current dermoscopic hair removal methods use segmentation networks to locate hairs, and then uses re...
详细信息
Skin cancer images have hair occlusion problems, which greatly affects the accuracy of diagnosis and classification. Current dermoscopic hair removal methods use segmentation networks to locate hairs, and then uses repair networks to perform image repair. However, it is difficult to segment hair and capture the overall structure between hairs because of the hair being thin, unclear, and similar in color to the entire image. When conducting image restoration tasks, the only available images are those obstructed by hair, and there is no corresponding ground truth (supervised data) of the same scene without hair obstruction. In addition, the texture information and structural information used in existing repair methods are often insufficient, which leads to poor results in skin cancer image repair. To address these challenges, we propose the intersection-union dual-stream cross-attention Lova-SwinUnet (IUDC-LS). Firstly, we propose the Lova-SwinUnet module, which embeds Lovasz loss function into Swin-Unet, enabling the network to better capture features of various scales, thus obtaining better hair mask segmentation results. Secondly, we design the intersection-union (IU) module, which takes the mask results obtained in the previous step for pairwise intersection or union, and then overlays the results on the skin cancer image without hair to generate the labeled training data. This turns the unsupervised image repair task into the supervised one. Finally, we propose the dual-stream cross-attention (DC) module, which makes texture information and structure information interact with each other, and then uses cross-attention to make the network pay attention to the more important texture information and structure information in the fusion process of texture information and structure information, so as to improve the effect of image repair. The experimental results show that the PSNR index and SSIM index of the proposed method are increased by 5.4875 and 0.0401 compared w
Recent years have witnessed the rapid growth of social network services. Real-world social networks are huge and changing over time. Consequently, the problems in this area have become more complex. Community detectio...
详细信息
Currently, smart contract vulnerabilities (SCVs) have emerged as a major factor threatening the transaction security of blockchain. Existing state-of-the-art methods rely on deep learning to mitigate this threat. They...
详细信息
High-performance computing and deep learning domains have been motivating the design of domain-specific *** these processors can provide promising computation capability,they are notorious for exotic programming *** i...
详细信息
High-performance computing and deep learning domains have been motivating the design of domain-specific *** these processors can provide promising computation capability,they are notorious for exotic programming *** improve programming productivity and fully exploit the performance potential of these processors,domain-specific compilers(DSCs) have been ***,building DSCs for emerging processors requires tremendous engineering efforts because the commonly used compilation stack is difficult to be *** to the advent of multilevel intermediate representation(MLIR),DSC developers can leverage reusable infrastructure to extend their customized functionalities without rebuilding the entire compilation *** this paper,we further demonstrate the effectiveness of MLIR by extending its reusable infrastructure to embrace a heterogeneous many-core processor(Sunway processor).In particular,we design a new Sunway dialect and corresponding backend for the Sunway processor,fully exploiting its architectural advantage and hiding its programming *** show the ease of building a DSC,we leverage the Sunway dialect and existing MLIR dialects to build a stencil compiler for the Sunway *** experimental results show that our stencil compiler,built with a reusable approach,can even perform better than state-of-the-art stencil compilers.
This paper presents optimizations of the GENESIS molecular dynamics (MD) software for LUMI. GENESIS is a state-of-the-art MD program capable of simulating large-scale biological systems, yet it requires significant op...
详细信息
The rapid growth of computer vision-based applications, including smart cities and autonomous driving, has created a pressing demand for efficient 360∘ image compression and computer vision analytics. In most circums...
Aiming at the problems of inaccuracy in detecting theαphase contour of TB6 titanium *** combining computer vision technology with human vision mechanisms,the spatial characteristics of theαphase can be simulated to ...
详细信息
Aiming at the problems of inaccuracy in detecting theαphase contour of TB6 titanium *** combining computer vision technology with human vision mechanisms,the spatial characteristics of theαphase can be simulated to obtain the contour ***,an algorithm forαphase contour detection of TB6 titanium alloy fused with multi-scale fretting features is ***,through the response of the classical receptive field model based on fretting and the suppression of new non-classical receptive field model based on fretting,the information maps of theαphase contour of the TB6 titanium alloy at different scales are obtained;then the information map of the smallest scale contour is used as a benchmark,the neighborhood is constructed to judge the deviation of other scale contour information,and the corresponding weight value is calculated;finally,Gaussian function is used to weight and fuse the deviation information,and the contour detection result of TB6 titanium alloyαphase is *** the Visual Studio 2013 environment,484 metallographic images with different temperatures,strain rates,and magnifications were *** results show that the performance evaluation F value of the proposed algorithm is 0.915,which can effectively improve the accuracy ofαphase contour detection of TB6 titanium alloy.
Kirigami metamaterials have gained increasing attention due to their unusual mechanical properties under ***,most metamaterial designs obtained with trial-and-error approaches tend to lose their desirable properties u...
详细信息
Kirigami metamaterials have gained increasing attention due to their unusual mechanical properties under ***,most metamaterial designs obtained with trial-and-error approaches tend to lose their desirable properties under large tensile strains due to occurrence of instability caused by out-of-plane *** cope with this limitation,this paper presents a systematic approach of cut layout optimizing for designingkirigami metamaterials working at large tensile strains by fully exploiting their out-of-plane buckling *** method can also mitigate the local stress concentration issue at the hinges of conventional kirigami designsworking at in-plane deformation *** effectiveness of the proposed method is demonstrated through several examples regarding metamaterial design with negative Poisson’s ratio and specified flip angle *** isshown that the proposed method is capable of addressing the highly nonlinear deformation impacts on the mechanical performance under large stretching,to meet the growing and diverse demands in the field of kirigamimetamaterials.
The (k,z)-Clustering problem in Euclidean space Rd has been extensively studied. Given the scale of data involved, compression methods for the Euclidean (k,z)-Clustering problem, such as data compression and dimension...
详细信息
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to netw...
详细信息
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to networks and brings huge challenge to servicing user *** caching,which utilizes the storage and computation resources of the edge to bring resources closer to end users,is a promising way to relieve network burden and enhance user *** this paper,we aim to survey the edge caching techniques from a comprehensive and systematic *** first present an overview of edge caching,summarizing the three key issues regarding edge caching,i.e.,where,what,and how to cache,and then introducing several significant caching *** then carry out a detailed and in-depth elaboration on these three issues,which correspond to caching locations,caching objects,and caching strategies,*** particular,we innovate on the issue“what to cache”,interpreting it as the classification of the“caching objects”,which can be further classified into content cache,data cache,and service ***,we discuss several open issues and challenges of edge caching to inspire future investigations in this research area.
暂无评论