Hand gesture recognition (HGR) is one of the main axes of the Human-computer Interaction (HCI) research field. And computer vision is a very active dedicated research area. However, traditional vision-based methods, l...
详细信息
The emerging trend of Low-code/No-code development has garnered significant attention from both the business and academic communities. This article provides a systematic literature review that explores the different a...
The emerging trend of Low-code/No-code development has garnered significant attention from both the business and academic communities. This article provides a systematic literature review that explores the different aspects of Low-code/No-code development. The review focuses on gathering state-of-the-art research, methodologies, and frameworks in this field. It also identifies key challenges and benefits associated with Low-code/No-code development. This review aims to provide a comprehensive understanding of the current trends and advancements in this kind of software engineering. This study could serve as a valuable resource for researchers, practitioners, and organizations looking to adopt Low-code/No-code approaches. Overall, this review contributes to the existing body of knowledge by providing insightful findings and suggestions for future research directions in the Low-code/No-code development realm.
Heterogeneous Networks (HetNets) leverage multiple communication interfaces (e.g., Wi-Fi, cellular, Bluetooth) seamlessly integrated to enhance connectivity and capacity across diverse environments. These capabilities...
详细信息
ISBN:
(数字)9798331513269
ISBN:
(纸本)9798331513276
Heterogeneous Networks (HetNets) leverage multiple communication interfaces (e.g., Wi-Fi, cellular, Bluetooth) seamlessly integrated to enhance connectivity and capacity across diverse environments. These capabilities can be advantageous for covert communication, where the objective is to ensure undetectable transmission in the presence of an adversary. This work investigates optimal power allocation strategies for covert communication within HetNets under maximum power constraints. We propose a polynomial-time (m 2 ) algorithm for optimal link configuration by allocating power across multiple modes. Next, we address network-level covertness by allocating the end-to-end covertness constraint across links in a two-hop system that maximizes throughput. Leveraging the link configuration approach, we derive the optimal power allocation for each mode and link, ensuring the overall transmission remains undetectable. Numerical results demonstrate that the proposed method outperforms existing single-link and two-hop approaches, achieving higher efficiency and security in covert communication across HetNets.
Boosting has been proven to be effective in improving the generalization of machine learning models in many fields. It is capable of getting high-diversity base learners and getting an accurate ensemble model by combi...
详细信息
Boosting has been proven to be effective in improving the generalization of machine learning models in many fields. It is capable of getting high-diversity base learners and getting an accurate ensemble model by combining a sufficient number of weak learners. However, it is rarely used in deep learning due to the high training budget of the neural network. Another method named snapshot ensemble can significantly reduce the training budget, but it is hard to balance the tradeoff between training costs and diversity. Inspired by the ideas of snapshot ensemble and boosting, we propose a method named snapshot boosting. A series of operations are performed to get many base models with high diversity and accuracy, such as the use of the validation set, the boosting-based training framework, and the effective ensemble strategy. Last, we evaluate our method on the computer vision(CV) and the natural language processing(NLP) tasks, and the results show that snapshot boosting can get a more balanced trade-off between training expenses and ensemble accuracy than other well-known ensemble methods.
Existing text-to-image editing methods tend to excel either in rigid or non-rigid editing but encounter challenges when combining both, resulting in misaligned outputs with the provided text prompts. In addition, inte...
详细信息
ISBN:
(数字)9798350390155
ISBN:
(纸本)9798350390162
Existing text-to-image editing methods tend to excel either in rigid or non-rigid editing but encounter challenges when combining both, resulting in misaligned outputs with the provided text prompts. In addition, integrating reference images for control remains challenging. To address these issues, we present a versatile image editing framework capable of executing both rigid and non-rigid edits, guided by either textual prompts or reference images. We leverage a dual-path injection scheme to handle diverse editing scenarios and introduce an integrated self-attention mechanism for fusion of appearance and structural information. To mitigate potential visual artifacts, we further employ latent fusion techniques to adjust intermediate latents. Compared to previous work, our approach represents a significant advance in achieving precise and versatile image editing. Comprehensive experiments validate the efficacy of our method, showcasing competitive or superior results in text-based editing and appearance transfer tasks, encompassing both rigid and non-rigid settings.
The objective of this work is to develop a durable MEMS sensor for in situ monitoring of advanced reactor piping. Existing sensors for structural health monitoring (SHM) in nuclear reactor environments have limited te...
详细信息
Given the importance of forests and their role in maintaining the ecological balance, which directly affects the planet, the climate, and the life on this planet, this research presents the problem of forest fire moni...
详细信息
The absorber material CdSeTe/CdTe has a high absorption coefficient of 10 4 cm 1 , allowing for extremely thin absorbers, with a graded bandgap from 1.40 to 1.50 eV, which is very close to the optimum for single junct...
详细信息
ISBN:
(数字)9781665464260
ISBN:
(纸本)9781665475822
The absorber material CdSeTe/CdTe has a high absorption coefficient of 10
4
cm
1
, allowing for extremely thin absorbers, with a graded bandgap from 1.40 to 1.50 eV, which is very close to the optimum for single junction solar cells. In this work, we have fabricated different absorber thicknesses ranging from 0.5 m to 0.8 m to study ultra-thin absorbers for CdSeTe/CdTe solar cells. Decreasing the absorber thickness, the costs and the environmental consumption are strongly reduced. In this paper, we analyze the impact of the thickness reduction on the electrical parameters of the devices containing Se. Currently, our best-performing ultra-thin CdSeTe/CdTe solar cell has an efficiency of 11 %.
Despite opaque machine learning models outperform transparent models, users are still unable to comprehend and trust their ***, Explainable Artificial Intelligence (XAI) becomes a prominent research area. The main obj...
Despite opaque machine learning models outperform transparent models, users are still unable to comprehend and trust their ***, Explainable Artificial Intelligence (XAI) becomes a prominent research area. The main objective of this discipline is providing new techniques, tools and models that explain how opaque machine learning models operate to give predictions or simply offer some information about system *** this article, we present an experimental evaluation of explainable models used in XAI, namely: LIME, SHAP, ANCHOR and EBM. Those models are applied on the results of two opaque machine learning models: Random Forest and XGBoost. Our experimental evaluation covers various aspects for comparison including:•Examining the explainability coverage of methods.•Comparing explanations provided by each method.
Chinese Spelling Check (CSC) aims to detect and correct Chinese spelling errors. Most Chinese spelling errors are the misuse of semantically, phonetically or graphically similar characters. Previous state-of-the-art w...
Chinese Spelling Check (CSC) aims to detect and correct Chinese spelling errors. Most Chinese spelling errors are the misuse of semantically, phonetically or graphically similar characters. Previous state-of-the-art works on the CSC task pursue transitions from misspelled sentences to correct sentences directly. However, it is difficult to force the current CSC methods to find the correct answer at one run. Thus, we propose a simple and effective method for CSC task by making fully use of the trained model to generate multiple candidate sentences and simply ranking to select the best, in which no additional training and parameters are required. The experimental results show that our approach outperforms previous methods and achieves the state-of-the-art performances.
暂无评论