Over the past years, the main research innovations in face recognition focused on training deep neural networks on large-scale identity-labeled datasets using variations of multi-class classification losses. However, ...
详细信息
Rtecently a lot of works have been investigating to find the tenuous groups,i.e.,groups with few social interactions and weak relationships among members,for reviewer selection and psycho-educational group ***,the met...
详细信息
Rtecently a lot of works have been investigating to find the tenuous groups,i.e.,groups with few social interactions and weak relationships among members,for reviewer selection and psycho-educational group ***,the metrics(e.g.,k-triangle,k-line,and k-tenuity)used to measure the tenuity,require a suitable k value to be specified which is difficult for users without background ***,in this paper we formulate the most tenuous group(MTG)query in terms of the group distance and average group distance of a group measuring the tenuity to eliminate the influence of parameter k on the tenuity of the *** address the MTG problem,we first propose an exact algorithm,namely MTGVDIS,which takes priority to selecting those vertices whose vertex distance is large,to generate the result group,and also utilizes effective filtering and pruning *** MTGVDIS is not fast enough,we design an efficient exact algorithm,called MTG-VDGE,which exploits the degree metric to sort the vertexes and proposes a new combination order,namely degree and reverse based branch and bound(DRBB).MTG-VDGE gives priority to those vertices with small *** a large p,we further develop an approximation algorithm,namely MTG-VDLT,which discards candidate attendees with high degree to reduce the number of vertices to be *** experimental results on real datasets manifest that the proposed algorithms outperform existing approaches on both efficiency and group tenuity.
Great progress has been made toward accurate face detection in recent ***,the heavy model and expensive computation costs make it difficult to deploy many detectors on mobile and embedded devices where model size and ...
详细信息
Great progress has been made toward accurate face detection in recent ***,the heavy model and expensive computation costs make it difficult to deploy many detectors on mobile and embedded devices where model size and latency are highly *** this paper,we present a millisecond-level anchor-free face detector,YuNet,which is specifically designed for edge *** are several key contributions in improving the efficiency-accuracy ***,we analyse the influential state-of-theart face detectors in recent years and summarize the rules to reduce the size of ***,a lightweight face detector,YuNet,is *** detector contains a tiny and efficient feature extraction backbone and a simplified pyramid feature fusion *** the best of our knowledge,YuNet has the best trade-off between accuracy and *** has only 75856 parameters and is less than 1/5 of other small-size *** addition,a training strategy is presented for the tiny face detector,and it can effectively train models with the same distribution of the training *** proposed YuNet achieves 81.1%mAP(single-scale)on the WIDER FACE validation hard track with a high inference efficiency(Intel i7-12700K:1.6ms per frame at 320×320).Because of its unique advantages,the repository for YuNet and its predecessors has been popular at GitHub and gained more than 11K stars at https://***/ShiqiYu/***:Face detection,object detection,computer version,lightweight,inference efficiency,anchor-free mechanism.
Container technology, as the key enabler behind microservice architectures, is widely applied in Cloud and Edge Computing. A long and continuous running of operating system (OS) hosting container-based services can en...
详细信息
Recently, significant progress has been made in face presentation attack detection (PAD), which aims to secure face recognition systems against presentation attacks, owing to the availability of several face PAD datas...
详细信息
Mobile applications(apps for short)often need to display ***,inefficient image displaying(IID)issues are pervasive in mobile apps,and can severely impact app performance and user *** paper first establishes a descript...
详细信息
Mobile applications(apps for short)often need to display ***,inefficient image displaying(IID)issues are pervasive in mobile apps,and can severely impact app performance and user *** paper first establishes a descriptive framework for the image displaying procedures of IID *** on the descriptive framework,we conduct an empirical study of 216 real-world IID issues collected from 243 popular open-source Android apps to validate the presence and severity of IID issues,and then shed light on these issues’characteristics to support research on effective issue *** the findings of this study,we propose a static IID issue detection tool TAPIR and evaluate it with 243 real-world Android ***,49 and 64 previously-unknown IID issues in two different versions of 16 apps reported by TAPIR are manually confirmed as true positives,respectively,and 16 previously-unknown IID issues reported by TAPIR have been confirmed by developers and 13 have been ***,we further evaluate the performance impact of these detected IID issues and the performance improvement if they are *** results demonstrate that the IID issues detected by TAPIR indeed cause significant performance degradation,which further show the effectiveness and efficiency of TAPIR.
Explainable Artificial Intelligence(XAI)has an advanced feature to enhance the decision-making feature and improve the rule-based technique by using more advanced Machine Learning(ML)and Deep Learning(DL)based *** thi...
详细信息
Explainable Artificial Intelligence(XAI)has an advanced feature to enhance the decision-making feature and improve the rule-based technique by using more advanced Machine Learning(ML)and Deep Learning(DL)based *** this paper,we chose e-healthcare systems for efficient decision-making and data classification,especially in data security,data handling,diagnostics,laboratories,and *** Machine Learning(FML)is a new and advanced technology that helps to maintain privacy for Personal Health Records(PHR)and handle a large amount of medical data *** this context,XAI,along with FML,increases efficiency and improves the security of e-healthcare *** experiments show efficient system performance by implementing a federated averaging algorithm on an open-source Federated Learning(FL)*** experimental evaluation demonstrates the accuracy rate by taking epochs size 5,batch size 16,and the number of clients 5,which shows a higher accuracy rate(19,104).We conclude the paper by discussing the existing gaps and future work in an e-healthcare system.
The integration of Large Language Models (LLMs) in Question-Answering (QA) systems has made significant progress, yet they often fail to generate precise answers for queries beyond their training data and hallucinatin...
详细信息
The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the ***,smart healthcare has emerged as a significant application of the IoMT,parti...
详细信息
The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the ***,smart healthcare has emerged as a significant application of the IoMT,particularly in the context of knowledge‐based learning *** healthcare systems leverage knowledge‐based learning to become more context‐aware,adaptable,and auditable while maintain-ing the ability to learn from historical *** smart healthcare systems,devices capture images,such as X‐rays,Magnetic Resonance *** security and integrity of these images are crucial for the databases used in knowledge‐based learning systems to foster structured decision‐making and enhance the learning abilities of ***,in knowledge‐driven systems,the storage and transmission of HD medical images exert a burden on the limited bandwidth of the communication channel,leading to data trans-mission *** address the security and latency concerns,this paper presents a lightweight medical image encryption scheme utilising bit‐plane decomposition and chaos *** results of the experiment yield entropy,energy,and correlation values of 7.999,0.0156,and 0.0001,*** validates the effectiveness of the encryption system proposed in this paper,which offers high‐quality encryption,a large key space,key sensitivity,and resistance to statistical attacks.
The advent of Mobile Edge Computing (MEC) offers significant benefits in terms of reduced latency and improved throughput for distributed applications and services. However, the integration of streaming services in th...
详细信息
暂无评论