Parkinson’s disease (PD) is one of the most fatal and progressive nervous system illnesses affecting movement. It is a common neurological illness that causes disabilities, shortens people’s lives, and has no treatm...
详细信息
Image captioning is an emerging field in machine *** refers to the ability to automatically generate a syntactically and semantically meaningful sentence that describes the content of an *** captioning requires a comp...
详细信息
Image captioning is an emerging field in machine *** refers to the ability to automatically generate a syntactically and semantically meaningful sentence that describes the content of an *** captioning requires a complex machine learning process as it involves two sub models:a vision sub-model for extracting object features and a language sub-model that use the extracted features to generate meaningful ***-based vision transformers models have a great impact in vision field *** this paper,we studied the effect of using the vision transformers on the image captioning process by evaluating the use of four different vision transformer models for the vision sub-models of the image captioning The first vision transformers used is DINO(self-distillation with no labels).The second is PVT(Pyramid Vision Transformer)which is a vision transformer that is not using convolutional *** third is XCIT(cross-Covariance Image Transformer)which changes the operation in self-attention by focusing on feature dimension instead of token *** last one is SWIN(Shifted windows),it is a vision transformer which,unlike the other transformers,uses shifted-window in splitting the *** a deeper evaluation,the four mentioned vision transformers have been tested with their different versions and different configuration,we evaluate the use of DINO model with five different backbones,PVT with two versions:PVT_v1and PVT_v2,one model of XCIT,SWIN *** results show the high effectiveness of using SWIN-transformer within the proposed image captioning model with regard to the other models.
Virtual reality (VR) has become one of the most emerging technologies of this decade. Researchers can now exchange and study data like never before with the help of virtual reality-based tools. It’s a key pipeline st...
详细信息
Nowadays, online secure payment systems are being used much more frequently. Advancement in online secure payment system is also enabled multiple threats that affected the privacy and security of the individuals espec...
详细信息
The objective of this paper is to explore the significance of rhythmic bands for imagined speech classification and the severity detection of epileptic seizures from electroencephalogram (EEG) signals. Non-invasive de...
详细信息
Non-Orthogonal Multiplex Access(NOMA)can be deployed in Unmanned Aerial Vehicle(UAV)networks to improve spectrum *** to the broadcasting feature of NOMA-UAV networks,it is essential to focus on the security of the wir...
详细信息
Non-Orthogonal Multiplex Access(NOMA)can be deployed in Unmanned Aerial Vehicle(UAV)networks to improve spectrum *** to the broadcasting feature of NOMA-UAV networks,it is essential to focus on the security of the wireless *** paper focuses on maximizing the secrecy sum rate under the constraint of the achievable rate of the legitimate *** tackle the non-convexity optimization problem,a reinforcement learning-based alternative optimization algorithm is ***,with the help of successive convex approximations,the optimal power allocation scheme with a given UAV trajectory is obtained by using convex optimization ***,through plenty of explorations of the wireless environment,the Q-learning networks approach the optimal location transition strategy of the UAV,even without the wireless channel state information.
Social networks, that have grown so prevalent nowadays, enable users to exchange information and save a significant amount of personal data about them. Although the information that is stored can be useful for enhanci...
详细信息
The Internet is being connected to billions of mobile and Internet of Things (IoT) devices, generating zillions of Bytes of data at the network edge. This is in addition to developments in mobile computing and the Int...
详细信息
AI applications have become ubiquitous,bringing significant convenience to various *** e-commerce,AI can enhance product recommendations for individuals and provide businesses with more accurate predictions for market...
详细信息
AI applications have become ubiquitous,bringing significant convenience to various *** e-commerce,AI can enhance product recommendations for individuals and provide businesses with more accurate predictions for market strategy ***,if the data used for AI applications is damaged or lost,it will inevitably affect the effectiveness of these AI ***,it is essential to verify the integrity of e-commerce *** existing Provable Data Possession(PDP)protocols can verify the integrity of cloud data,they are not suitable for e-commerce scenarios due to the limited computational capabilities of edge servers,which cannot handle the high computational overhead of generating homomorphic verification tags in *** address this issue,we propose PDP with Outsourced Tag Generation for AI-driven e-commerce,which outsources the computation of homomorphic verification tags to cloud servers while introducing a lightweight verification method to ensure that the tags match the uploaded ***,the proposed scheme supports dynamic operations such as adding,deleting,and modifying data,enhancing its ***,experiments show that the additional computational overhead introduced by outsourcing homomorphic verification tags is acceptable compared to the original PDP.
The field of artificial intelligence has witnessed significant advancements with the advent of Generative Adversarial Networks, revolutionizing image generation techniques. The literature review covers seminal works a...
详细信息
暂无评论