Multi-person pose estimation based on monocular cameras is one of the hot research topics in computer vision. Current monocular multi-person 3D pose estimation methods often treat individuals as independent entities f...
详细信息
With the increasing complexity of application scenarios, the fusion of different remote sensing data types has gradually become a trend, which can greatly improve the utilization of massive remote sensing *** the prob...
With the increasing complexity of application scenarios, the fusion of different remote sensing data types has gradually become a trend, which can greatly improve the utilization of massive remote sensing *** the problem of change detection for heterogeneous remote images can be much more complicated than the traditional change detection for homologous remote sensing images,
Audio-driven talking-head synthesis has become a significant focus in the field of virtual human applications. However, existing methodologies face challenges in effectively synchronizing audio and video, especially i...
详细信息
Accurately diagnosing Alzheimer's disease is essential for improving elderly ***,accurate prediction of the mini-mental state examination score also can measure cognition impairment and track the progression of Al...
详细信息
Accurately diagnosing Alzheimer's disease is essential for improving elderly ***,accurate prediction of the mini-mental state examination score also can measure cognition impairment and track the progression of Alzheimer's ***,most of the existing methods perform Alzheimer's disease diagnosis and mini-mental state examination score prediction separately and ignore the relation between these two *** address this challenging problem,we propose a novel multi-task learning method,which uses feature interaction to explore the relationship between Alzheimer's disease diagnosis and minimental state examination score *** our proposed method,features from each task branch are firstly decoupled into candidate and non-candidate parts for ***,we propose feature sharing module to obtain shared features from candidate features and return shared features to task branches,which can promote the learning of each *** validate the effectiveness of our proposed method on multiple *** Alzheimer's disease neuroimaging initiative 1 dataset,the accuracy in diagnosis task and the root mean squared error in prediction task of our proposed method is 87.86%and 2.5,*** results show that our proposed method outperforms most state-of-the-art *** proposed method enables accurate Alzheimer's disease diagnosis and mini-mental state examination score ***,it can be used as a reference for the clinical diagnosis of Alzheimer's disease,and can also help doctors and patients track disease progression in a timely manner.
Integrating single-cell RNA-seq (scRNA-seq) data and single-cell ATAC-seq (scATAC-seq) data provides a more comprehensive view of cellular heterogeneity. However, the high sparsity in scATAC-seq data presents signific...
详细信息
With the rapid development of the Internet of Things(Io T),the amount of data from intelligent devices is propagating at unprecedented scales. Meanwhile, machine learning(ML),which relies heavily on such data, is revo...
详细信息
With the rapid development of the Internet of Things(Io T),the amount of data from intelligent devices is propagating at unprecedented scales. Meanwhile, machine learning(ML),which relies heavily on such data, is revolutionizing many aspects of our lives [1]. However, conventional centralized ML offers little scalability for efficiently processing this huge amount of data.
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo...
详细信息
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud *** on cloud platforms usually have some subjective or objective attacks,which make the outsourced graph data in an insecure *** issue of privacy data protection has become an important obstacle to data sharing and *** to query outsourcing graph data safely and effectively has become the focus of *** query is a basic and frequently used operation in graph,and it will effectively promote the query range and query ability if multi-keyword fuzzy search can be supported at the same *** work proposes to protect the privacy information of outsourcing graph data by encryption,mainly studies the problem of multi-keyword fuzzy adjacency query,and puts forward a *** our scheme,we use the Bloom filter and encryption mechanism to build a secure index and query token,and adjacency queries are implemented through indexes and query tokens on the cloud *** proposed scheme is proved by formal analysis,and the performance and effectiveness of the scheme are illustrated by experimental *** research results of this work will provide solid theoretical and technical support for the further popularization and application of encrypted graph data processing technology.
Mobile edge computing(MEC)-enabled satellite-terrestrial networks(STNs)can provide Internet of Things(IoT)devices with global computing ***,the network state information is uncertain or *** deal with this situation,we...
详细信息
Mobile edge computing(MEC)-enabled satellite-terrestrial networks(STNs)can provide Internet of Things(IoT)devices with global computing ***,the network state information is uncertain or *** deal with this situation,we investigate online learning-based offloading decision and resource allocation in MEC-enabled STNs in this *** problem of minimizing the average sum task completion delay of all IoT devices over all time periods is *** decompose this optimization problem into a task offloading decision problem and a computing resource allocation problem.A joint optimization scheme of offloading decision and resource allocation is then proposed,which consists of a task offloading decision algorithm based on the devices cooperation aided upper confidence bound(UCB)algorithm and a computing resource allocation algorithm based on the Lagrange multiplier *** results validate that the proposed scheme performs better than other baseline schemes.
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to netw...
详细信息
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to networks and brings huge challenge to servicing user *** caching,which utilizes the storage and computation resources of the edge to bring resources closer to end users,is a promising way to relieve network burden and enhance user *** this paper,we aim to survey the edge caching techniques from a comprehensive and systematic *** first present an overview of edge caching,summarizing the three key issues regarding edge caching,i.e.,where,what,and how to cache,and then introducing several significant caching *** then carry out a detailed and in-depth elaboration on these three issues,which correspond to caching locations,caching objects,and caching strategies,*** particular,we innovate on the issue“what to cache”,interpreting it as the classification of the“caching objects”,which can be further classified into content cache,data cache,and service ***,we discuss several open issues and challenges of edge caching to inspire future investigations in this research area.
In the process of realizing the Internet of Everything through the Internet of Things (IoT), the massive deployment of sensor nodes poses significant security challenges. This paper introduces a novel approach to anom...
详细信息
暂无评论