Moving target detection is one of the most basic tasks in computer *** conventional wisdom,the problem is solved by iterative optimization under either Matrix Decomposition(MD)or Matrix Factorization(MF)*** utilizes f...
详细信息
Moving target detection is one of the most basic tasks in computer *** conventional wisdom,the problem is solved by iterative optimization under either Matrix Decomposition(MD)or Matrix Factorization(MF)*** utilizes foreground information to facilitate background *** uses noise-based weights to fine-tune the *** both noise and foreground information contribute to the recovery of the *** jointly exploit their advantages,inspired by two framework complementary characteristics,we propose to simultaneously exploit the advantages of these two optimizing approaches in a unified framework called Joint Matrix Decomposition and Factorization(JMDF).To improve background extraction,a fuzzy factorization is *** fuzzy membership of the background/foreground association is calculated during the factorization process to distinguish their contributions of both to background *** describe the spatio-temporal continuity of foreground more accurately,we propose to incorporate the first order temporal difference into the group sparsity constraint *** temporal constraint is adjusted *** foreground and the background are jointly estimated through an effective alternate optimization process,and the noise can be modeled with the specific probability *** experimental results of vast real videos illustrate the effectiveness of our *** with the current state-of-the-art technology,our method can usually form the clearer background and extract the more accurate ***-noise experiments show the noise robustness of our method.
Detecting oriented targets in remote sensing images amidst complex and heterogeneous backgrounds remains a formidable challenge in the field of object *** frameworks for oriented detection modules are constrained by i...
详细信息
Detecting oriented targets in remote sensing images amidst complex and heterogeneous backgrounds remains a formidable challenge in the field of object *** frameworks for oriented detection modules are constrained by intrinsic limitations,including excessive computational and memory overheads,discrepancies between predefined anchors and ground truth bounding boxes,intricate training processes,and feature alignment *** overcome these challenges,we present ASL-OOD(Angle-based SIOU Loss for Oriented Object Detection),a novel,efficient,and robust one-stage framework tailored for oriented object *** ASL-OOD framework comprises three core components:the Transformer-based Backbone(TB),the Transformer-based Neck(TN),and the Angle-SIOU(Scylla Intersection over Union)based Decoupled Head(ASDH).By leveraging the Swin Transformer,the TB and TN modules offer several key advantages,such as the capacity to model long-range dependencies,preserve high-resolution feature representations,seamlessly integrate multi-scale features,and enhance parameter *** improvements empower the model to accurately detect objects across varying *** ASDH module further enhances detection performance by incorporating angle-aware optimization based on SIOU,ensuring precise angular consistency and bounding box *** approach effectively harmonizes shape loss and distance loss during the optimization process,thereby significantly boosting detection *** evaluations and ablation studies on standard benchmark datasets such as DOTA with an mAP(mean Average Precision)of 80.16 percent,HRSC2016 with an mAP of 91.07 percent,MAR20 with an mAP of 85.45 percent,and UAVDT with an mAP of 39.7 percent demonstrate the clear superiority of ASL-OOD over state-of-the-art oriented object detection *** findings underscore the model’s efficacy as an advanced solution for challenging remote sensing object detection tasks.
作者:
Alsharif, MaramRawat, Danda B.
Department of Electrical Engineering & Computer Science WashingtonDC20059 United States
Machine learning-based Intrusion detection (ML-IDS) gained a lot of interest from the research community as security threats facing the IoT are on the rise. Researchers focused on improving intrusion detection efficie...
详细信息
Now Unmanned Aerial Vehicle (UAV) with Mobile Edge Computing (MEC) severs and Device-to-Device (D2D) communications provide offload computing services for User Devices (UDs). However, the UAV has relatively high trans...
详细信息
Inductive wireless power transfer (WPT) system uses alternating magnetic field to transmit power from the transmitter to the receiver. To confine the magnetic field, WPT coils are realized with high permeability subst...
详细信息
This paper proposes a face recognition system based on steerable pyramid transform (SPT) and local directional pattern (LDP) for e-health secured login in cloud domain. In an e-health login, patients periodically forg...
详细信息
Accurately assessing power transformers' health condition and calculating their probability of failure (PoF) can facilitate decision-making with respect to the operation and maintenance of transformers. Among vari...
详细信息
Software aging is the gradual decline in performance that occurs with continuous software operation. As the demands on software systems increase, assessing the risk of software aging becomes crucial, especially in mod...
详细信息
Many recent FPGA-based Processor-in-Memory (PIM) architectures have appeared with promises of impressive levels of parallelism but with performance that falls short of expectations due to reduced maximum clock frequen...
详细信息
Skin cancer is a highly prevalent form of cancer worldwide. The clinical assessment of skin lesions is crucial for evaluating the disease's characteristics. However, this assessment is often hindered by the variab...
详细信息
暂无评论