With the development of artificial intelligence, deep learning has been increasingly used to achieve automatic detection of geographic information, replacing manual interpretation and improving efficiency. However, re...
详细信息
In human communication, expressing human emotion plays an essential role in transferring information to the other individual. The expression forms of human communication are very rich, in different patterns like facia...
详细信息
Cybersecurity has seen widespread adoption across various domains, encompassing critical business infrastructure, residential settings, personal devices, and machinery. This has led to the development of innovative ca...
详细信息
The world has witnessed an exponential increase in the number of Internet Connected computers due to various causes. This exponential increase and the resulting dependence have had far reaching cybersecurity implicati...
详细信息
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc...
详细信息
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of accurately matching and identifying persons across several camera views that do not overlap with one another. This is of utmost importance to video surveillance, public safety, and person-tracking applications. However, vision-related difficulties, such as variations in appearance, occlusions, viewpoint changes, cloth changes, scalability, limited robustness to environmental factors, and lack of generalizations, still hinder the development of reliable person re-ID methods. There are few approaches have been developed based on these difficulties relied on traditional deep-learning techniques. Nevertheless, recent advancements of transformer-based methods, have gained widespread adoption in various domains owing to their unique architectural properties. Recently, few transformer-based person re-ID methods have developed based on these difficulties and achieved good results. To develop reliable solutions for person re-ID, a comprehensive analysis of transformer-based methods is necessary. However, there are few studies that consider transformer-based techniques for further investigation. This review proposes recent literature on transformer-based approaches, examining their effectiveness, advantages, and potential challenges. This review is the first of its kind to provide insights into the revolutionary transformer-based methodologies used to tackle many obstacles in person re-ID, providing a forward-thinking outlook on current research and potentially guiding the creation of viable applications in real-world scenarios. The main objective is to provide a useful resource for academics and practitioners engaged in person re-ID. IEEE
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data *** paper focuses on secure vehicular data communications in the Named Data Networking(NDN).I...
详细信息
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data *** paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure *** paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure *** constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse *** the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are *** is evaluated,and the data results demonstrate that SCD achieves the above objectives.
In response to the escalating concern over road accidents due to driver drowsiness, this research delves into enhancing drowsiness detection systems using advanced deep learning techniques and transfer learning. Prior...
详细信息
This research paper presents an innovative approach for automated bone fracture discovery and bracket using digital image processing ways and the Scale Invariant point Transform (SIFT) algorithm. The proposed system e...
详细信息
Intelligent education is a significant application of artificial intelligence. One of the key research topics in intelligence education is cognitive diagnosis, which aims to gauge the level of proficiency among studen...
详细信息
Intelligent education is a significant application of artificial intelligence. One of the key research topics in intelligence education is cognitive diagnosis, which aims to gauge the level of proficiency among students on specific knowledge concepts(e.g., Geometry). To the best of our knowledge, most of the existing cognitive models primarily focus on improving diagnostic accuracy while rarely considering fairness issues; for instance, the diagnosis of students may be affected by various sensitive attributes(e.g., region). In this paper,we aim to explore fairness in cognitive diagnosis and answer two questions:(1) Are the results of existing cognitive diagnosis models affected by sensitive attributes?(2) If yes, how can we mitigate the impact of sensitive attributes to ensure fair diagnosis results? To this end, we first empirically reveal that several wellknown cognitive diagnosis methods usually lead to unfair performances, and the trend of unfairness varies among different cognitive diagnosis models. Then, we make a theoretical analysis to explain the reasons behind this phenomenon. To resolve the unfairness problem in existing cognitive diagnosis models, we propose a general fairness-aware cognitive diagnosis framework, FairCD. Our fundamental principle involves eliminating the effect of sensitive attributes on student proficiency. To achieve this, we divide student proficiency in existing cognitive diagnosis models into two components: bias proficiency and fair *** design two orthogonal tasks for each of them to ensure that fairness in proficiency remains independent of sensitive attributes and take it as the final diagnosed result. Extensive experiments on the Program for International Student Assessment(PISA) dataset clearly show the effectiveness of our framework.
Cloud computing is an on-demand service resource that includes applications to data centres on a pay-per-use basis. While allocating resources, the node failure causes the cloud service failures. This reduces the qual...
详细信息
暂无评论