Blurred text documents such as historical documents, handwritten manuscripts, old newspapers, moist invoices or legal agreements, old books, hand written notes often present readability challenges because the quality ...
详细信息
We present a lightweight and efficient semisupervised video object segmentation network based on the space-time memory *** some extent,our method solves the two difficulties encountered in traditional video object se...
详细信息
We present a lightweight and efficient semisupervised video object segmentation network based on the space-time memory *** some extent,our method solves the two difficulties encountered in traditional video object segmentation:one is that the single frame calculation time is too long,and the other is that the current frame’s segmentation should use more information from past *** algorithm uses a global context(GC)module to achieve highperformance,real-time *** GC module can effectively integrate multi-frame image information without increased memory and can process each frame in real ***,the prediction mask of the previous frame is helpful for the segmentation of the current frame,so we input it into a spatial constraint module(SCM),which constrains the areas of segments in the current *** SCM effectively alleviates mismatching of similar targets yet consumes few additional *** added a refinement module to the decoder to improve boundary *** model achieves state-of-the-art results on various datasets,scoring 80.1%on YouTube-VOS 2018 and a J&F score of 78.0%on DAVIS 2017,while taking 0.05 s per frame on the DAVIS 2016 validation dataset.
The advancements in sensing technologies,information processing,and communication schemes have revolutionized the healthcare *** Healthcare Records(EHR)facilitate the patients,doctors,hospitals,and other stakeholders ...
详细信息
The advancements in sensing technologies,information processing,and communication schemes have revolutionized the healthcare *** Healthcare Records(EHR)facilitate the patients,doctors,hospitals,and other stakeholders to maintain valuable data and medical *** traditional EHRs are based on cloud-based architectures and are susceptible to multiple cyberattacks.A single attempt of a successful Denial of Service(DoS)attack can compromise the complete healthcare *** article introduces a secure and immutable blockchain-based framework for the Internet of Medical Things(IoMT)to address the stated *** proposed architecture is on the idea of a lightweight private blockchain-based network that facilitates the users and hospitals to perform multiple healthcare-related operations in a secure and trustworthy *** efficacy of the proposed framework is evaluated in the context of service execution time and *** experimental outcomes indicate that the proposed design attained lower service execution time and higher throughput under different control parameters.
Accessing wireless services is convenient but not secure. The issue of privacy and security is highly demanded on the internet. The information is sent with the undesired threats of eavesdroppers. Secure communication...
详细信息
Dysarthria, dysphonia, and hypophonia are the early symptoms of Parkinson's disease. Thus, vocal attributes are frequently used for the initial diagnosis of Parkinson's disease, but the role of gender in ...
详细信息
File entropy is one of the major indicators of crypto-ransomware because the encryption by ransomware increases the randomness of file ***,entropy-based ransomware detection has certain limitations;for example,when di...
详细信息
File entropy is one of the major indicators of crypto-ransomware because the encryption by ransomware increases the randomness of file ***,entropy-based ransomware detection has certain limitations;for example,when distinguishing ransomware-encrypted files from normal files with inherently high-level entropy,misclassification is very *** addition,the entropy evaluation cost for an entire file renders entropy-based detection impractical for large *** this paper,we propose two indicators based on byte frequency for use in ransomware detection;these are termed EntropySA and DistSA,and both consider the interesting characteristics of certain file subareas termed“sample areas”(SAs).For an encrypted file,both the sampled area and the whole file exhibit high-level randomness,but for a plain file,the sampled area embeds informative structures such as a file header and thus exhibits relatively low-level randomness even though the entire file exhibits high-level *** and DistSA use“byte frequency”and a variation of byte frequency,respectively,derived from sampled *** indicators cause less overhead than other entropy-based detection methods,as experimentally proven using realistic ransomware *** evaluate the effectiveness and feasibility of our indicators,we also employ three expensive but elaborate classification models(neural network,support vector machine and threshold-based approaches).Using these models,our experimental indicators yielded an average Fl-measure of 0.994 and an average detection rate of 99.46%for file encryption attacks by realistic ransomware samples.
The Sign Language Translation and Voice Impairment Support System (SLT-VISS) represents a groundbreaking application of deep learning methodology aimed at facilitating communication for individuals with hearing impair...
详细信息
The banking sector is widely acknowledged for its intrinsic unpredictability and susceptibility to risk. Bank loans have emerged as one of the most recent services offered over the past several decades. Banks typicall...
详细信息
This is particularly true for the senior population, whose quality of life has been drastically reduced as a result of the increasing incidence of several health problems. Over 27 million people in the United States s...
详细信息
Recently,a new research trend in our video salient object detection(VSOD)research community has focused on enhancing the detection results via model self-fine-tuning using sparsely mined high-quality keyframes from th...
详细信息
Recently,a new research trend in our video salient object detection(VSOD)research community has focused on enhancing the detection results via model self-fine-tuning using sparsely mined high-quality keyframes from the given *** such a learning scheme is generally effective,it has a critical limitation,i.e.,the model learned on sparse frames only possesses weak generalization *** situation could become worse on“long”videos since they tend to have intensive scene ***,in such videos,the keyframe information from a longer time span is less relevant to the previous,which could also cause learning conflict and deteriorate the model ***,the learning scheme is usually incapable of handling complex pattern *** solve this problem,we propose a divide-and-conquer framework,which can convert a complex problem domain into multiple simple ***,we devise a novel background consistency analysis(BCA)which effectively divides the mined frames into disjoint *** for each group,we assign an individual deep model on it to capture its key attribute during the fine-tuning *** the testing phase,we design a model-matching strategy,which could dynamically select the best-matched model from those fine-tuned ones to handle the given testing *** experiments show that our method can adapt severe background appearance variation coupling with object movement and obtain robust saliency detection compared with the previous scheme and the state-of-the-art methods.
暂无评论