Free-viewpoint video allows the user to view objects from any virtual perspective,creating an immersive visual *** technology enhances the interactivity and freedom of multimedia ***,many free-viewpoint video synthesi...
详细信息
Free-viewpoint video allows the user to view objects from any virtual perspective,creating an immersive visual *** technology enhances the interactivity and freedom of multimedia ***,many free-viewpoint video synthesis methods hardly satisfy the requirement to work in real time with high precision,particularly for sports fields having large areas and numerous moving *** address these issues,we propose a freeviewpoint video synthesis method based on distance field *** central idea is to fuse multiview distance field information and use it to adjust the search step size *** step size search is used in two ways:for fast estimation of multiobject three-dimensional surfaces,and synthetic view rendering based on global occlusion *** have implemented our ideas using parallel computing for interactive display,using CUDA and OpenGL frameworks,and have used real-world and simulated experimental datasets for *** results show that the proposed method can render free-viewpoint videos with multiple objects on large sports fields at 25 ***,the visual quality of our synthetic novel viewpoint images exceeds that of state-of-the-art neural-rendering-based methods.
Botnets have become a severe security threat not only to the Internet but also to the devices connected to it. Factors like the exponential growth of IoT, the COVID-19 pandemic, and the ever-larger number of cybercrim...
详细信息
Wireless sensor networks (WSNs) have found extensive applications across various fields, significantly enhancing the convenience in our daily lives. Hence, an in-creasing number of researchers are directing their atte...
详细信息
Internet of Things (IoT) applications have recently been widely used in safety-critical scenarios. To prevent sensitive information leaks, IoT device vendors provide hardware-assisted protections, called Trusted Execu...
详细信息
Deep neural networks (DNNs) have been the driving force behind many of the recent advances in machine learning. However, research has shown that DNNs are vulnerable to adversarial examples - input samples that have be...
详细信息
Thinking space came into being with the emergence of human civilization. With the emergence and development of cyberspace, the interaction between those two spaces began to take place. In the collision of thinking and...
详细信息
Thinking space came into being with the emergence of human civilization. With the emergence and development of cyberspace, the interaction between those two spaces began to take place. In the collision of thinking and technology, new changes have taken place in both thinking space and cyberspace. To this end, this paper divides the current integration and development of thinking space and cyberspace into three stages, namely Internet of brain(IoB), Internet of thought(IoTh), and Internet of thinking(IoTk). At each stage, the contents and technologies to achieve convergence and connection of spaces are discussed. Besides, the Internet of creation(IoC) is proposed to represent the future development of thinking space and cyberspace. Finally, a series of open issues are raised, and they will become thorny factors in the development of the Io C stage.
作者:
Xiao, ZhiyuanWang, ChenShen, JianWu, Q. M. JonathanHe, DebiaoZhejiang Sci-Tech University
School of Information Science and Engineering School of Cyber Science and Technology the Zhejiang Provincial Key Laboratory of Digital Fashion and Data Governance Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Hangzhou310018 China University of Windsor
Department of Electrical and Computer Engineering WindsorON Canada Wuhan University
State Key Laboratory of Software Engineering Computer School Wuhan430072 China
In cryptography, side-channel analysis (SCA) is a technique used to recover cryptographic keys by examining the physical leakages that occur during the operation of cryptographic devices. Recent advancements in Deep L...
详细信息
In project management,effective cost estimation is one of the most cru-cial activities to efficiently manage resources by predicting the required cost to fulfill a given ***,finding the best estimation results in softwar...
详细信息
In project management,effective cost estimation is one of the most cru-cial activities to efficiently manage resources by predicting the required cost to fulfill a given ***,finding the best estimation results in software devel-opment is ***,accurate estimation of software development efforts is always a concern for many *** this paper,we proposed a novel soft-ware development effort estimation model based both on constructive cost model II(COCOMO II)and the artificial neural network(ANN).An artificial neural net-work enhances the COCOMO model,and the value of the baseline effort constant A is calibrated to use it in the proposed model *** state-of-the-art publicly available datasets are used for *** backpropagation feed-forward procedure used a training set by iteratively processing and training a neural *** proposed model is tested on the test *** estimated effort is compared with the actual effort *** results show that the effort estimated by the proposed model is very close to the real effort,thus enhanced the reliability and improving the software effort estimation accuracy.
The use of federated learning to achieve blockchain interoperability has become a hot topic in research, because it enables data exchange without revealing any private information. However, the previous work, such as ...
详细信息
Platoon-based autonomous driving is indispensable for traffic automation,but it confronts substantial constraints in rugged terrains with unreliable links and scarce communication *** paper proposes a novel hierarchic...
详细信息
Platoon-based autonomous driving is indispensable for traffic automation,but it confronts substantial constraints in rugged terrains with unreliable links and scarce communication *** paper proposes a novel hierarchical Digital Twin(DT)and consensus empowered cooperative control framework for safe driving in harsh ***,leveraging intra-platoon information exchange,one platoon-level DT is constructed on the leader and multiple vehicle-level DTs are distributed among platoon *** leader first makes critical platoon-driving decisions based on the platoon-level ***,considering the impact of unreliable links on the platoon-level DT accuracy and the consequent risk of unsafe decision-making,a distributed consensus scheme is proposed to negotiate critical decisions *** successful negotiation,vehicles proceed to execute critical decisions,relying on their vehicle-level ***,a Space-Air-Ground-Integrated-Network(SAGIN)enabled information exchange is utilized to update the platoon-level DT for subsequent safe decision-making in scenarios with unreliable links,no roadside units,and obstructed ***,based on this framework,an adaptive platooning scheme is designed to minimize total delay and ensure driving *** results indicate that our proposed scheme improves driving safety by 21.1%and reduces total delay by 24.2%in harsh areas compared with existing approaches.
暂无评论