While spin-orbit interaction has been extensively studied,few investigations have reported on the interaction between orbital angular momenta(OAMs).In this work,we study a new type of orbit-orbit coupling between the ...
详细信息
While spin-orbit interaction has been extensively studied,few investigations have reported on the interaction between orbital angular momenta(OAMs).In this work,we study a new type of orbit-orbit coupling between the longitudinal OAM and the transverse OAM carried by a three-dimensional(3D)spatiotemporal optical vortex(STOV)in the process of tight *** 3D STOV possesses orthogonal OAMs in the x-y,t-x,and y-t planes,and is preconditioned to overcome the spatiotemporal astigmatism effect.x,y,and t are the axes in the spatiotemporal *** corresponding focused wavepacket is calculated by employing the Debye diffraction theory,showing that a phase singularity ring is generated by the interactions among the transverse and longitudinal vortices in the highly confined *** Fourier-transform decomposition of the Debye integral is employed to analyze the mechanism of the orbit-orbit *** is the first revelation of coupling between the longitudinal OAM and the transverse OAM,paving the way for potential applications in optical trapping,laser machining,nonlinear light-matter interactions,and more.
The current study is defined by two main aims. An effective strategy for improving local search is to combine the Set Algebra-Based Heuristic Algorithm (SAHA) algorithm with the Nelder-Mead simplex method. The approac...
详细信息
Among the technologies that are utilized in the research and development of contemporary science and technology, image classification is an essential technology. Scholars from a variety of nations have not only become...
详细信息
In this study, we utilize a recently proposed non-parametric metaheuristic algorithm known as geometric mean optimization (GMO) to adjust the hidden layer input weights and bias of six ANN variants, namely PSNN, SPNN,...
详细信息
Robots are increasingly being deployed in densely populated environments, such as homes, hotels, and office buildings, where they rely on explicit instructions from humans to perform tasks. However, complex tasks ofte...
详细信息
Robots are increasingly being deployed in densely populated environments, such as homes, hotels, and office buildings, where they rely on explicit instructions from humans to perform tasks. However, complex tasks often require multiple instructions and prolonged monitoring, which can be time-consuming and demanding for users. Despite this, there is limited research on enabling robots to autonomously generate tasks based on real-life scenarios. Advanced intelligence necessitates robots to autonomously observe and analyze their environment and then generate tasks autonomously to fulfill human requirements without explicit commands. To address this gap, we propose the autonomous generation of navigation tasks using natural language dialogues. Specifically, a robot autonomously generates tasks by analyzing dialogues involving multiple persons in a real office environment to facilitate the completion of item transportation between various *** propose the leveraging of a large language model(LLM) through chain-of-thought prompting to generate a navigation sequence for a robot from dialogues. We also construct a benchmark dataset consisting of 625 multiperson dialogues using the generation capability of LLMs. Evaluation results and real-world experiments in an office building demonstrate the effectiveness of the proposed method.
Communication between people with disabilities and people who do not understand sign language is a growing social need and can be a tedious *** of the main functions of sign language is to communicate with each other ...
详细信息
Communication between people with disabilities and people who do not understand sign language is a growing social need and can be a tedious *** of the main functions of sign language is to communicate with each other through hand *** of hand gestures has become an important challenge for the recognition of sign *** are many existing models that can produce a good accuracy,but if the model test with rotated or translated images,they may face some difficulties to make good performance *** resolve these challenges of hand gesture recognition,we proposed a Rotation,Translation and Scale-invariant sign word recognition system using a convolu-tional neural network(CNN).We have followed three steps in our work:rotated,translated and scaled(RTS)version dataset generation,gesture segmentation,and sign word ***,we have enlarged a benchmark dataset of 20 sign words by making different amounts of Rotation,Translation and Scale of the ori-ginal images to create the RTS version *** we have applied the gesture segmentation *** segmentation consists of three levels,i)Otsu Thresholding with YCbCr,ii)Morphological analysis:dilation through opening morphology and iii)Watershed ***,our designed CNN model has been trained to classify the hand gesture as well as the sign *** model has been evaluated using the twenty sign word dataset,five sign word dataset and the RTS version of these *** achieved 99.30%accuracy from the twenty sign word dataset evaluation,99.10%accuracy from the RTS version of the twenty sign word evolution,100%accuracy from thefive sign word dataset evaluation,and 98.00%accuracy from the RTS versionfive sign word dataset ***,the influence of our model exists in competitive results with state-of-the-art methods in sign word recognition.
In real-time embedded control (RTEC) systems, sensors collect data which is processed and sent to different control nodes. RTEC deployments have numerous applications in diverse verticals like industrial control, heal...
详细信息
Person Image Synthesis has been widely used in fashion with extensive application *** point of this task is how to synthesise person image from a single source image under arbitrary *** methods generate the person ima...
详细信息
Person Image Synthesis has been widely used in fashion with extensive application *** point of this task is how to synthesise person image from a single source image under arbitrary *** methods generate the person image with target pose well;however,they fail to preserve the fine style details of the source *** address this problem,a robust style injection(RSI)model is proposed,which is a coarse-to-fine framework to synthesise target the person *** develops a simple and efficient cross-attention based module to fuse the features of both source semantic styles and target pose for achieving the coarse aligned *** adaptive instance normalisation is employed to enhance the aligned features in conjunction with source semantic ***,source semantic styles are further injected into the positional normalisation scheme to avoid the fine style details erosion caused by massive *** training losses,optimal transport theory in the form of energy distance is introduced to constrain data distribution to refine the texture style ***,the authors’model is capable of editing the shape and texture of garments to the target style *** experiments demonstrate that the authors’RSI achieves better performance over the state-of-art methods.
This paper investigates an unmanned aerial vehicle(UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything(V2X)*** to the presence of an eavesdropper(Eve),the system’s com-munication...
详细信息
This paper investigates an unmanned aerial vehicle(UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything(V2X)*** to the presence of an eavesdropper(Eve),the system’s com-munication links may be *** paper proposes deploying an intelligent reflecting surface(IRS)on the UAV to enhance the communication performance of mobile vehicles,improve system flexibility,and alleviate eavesdropping on communication *** links for uploading task data from vehicles to a base station(BS)are protected by IRS-assisted physical layer security(PLS).Upon receiving task data,the computing resources provided by the edge computing servers(MEC)are allocated to vehicles for task *** blockchain-based computation offloading schemes typically focus on improving network performance,such as minimizing energy consumption or latency,while neglecting the Gas fees for computation offloading and the costs required for MEC computation,leading to an imbalance between service fees and resource *** paper uses a utility-oriented computation offloading scheme to balance costs and *** paper proposes alternating phase optimization and power optimization to optimize the energy consumption,latency,and communication secrecy rate,thereby maximizing the weighted total utility of the *** results demonstrate a notable enhancement in the weighted total system utility and resource utilization,thereby corroborating the viability of our approach for practical applications.
In blockchain-based unmanned aerial vehicle(UAV)communication systems,the length of a block affects the performance of the *** transmission performance of blocks in the form of finite character segments is also affect...
详细信息
In blockchain-based unmanned aerial vehicle(UAV)communication systems,the length of a block affects the performance of the *** transmission performance of blocks in the form of finite character segments is also affected by the block ***,it is crucial to balance the transmission performance and blockchain performance of blockchain communication systems,especially in wireless environments involving *** paper investigates a secure transmission scheme for blocks in blockchain-based UAV communication systems to prevent the information contained in blocks from being completely eavesdropped during *** our scheme,using a friendly jamming UAV to emit jamming signals diminishes the quality of the eavesdropping channel,thus enhancing the communication security performance of the source *** the constraints of maneuverability and transmission power of the UAV,the joint design of UAV trajectories,transmission power,and block length are proposed to maximize the average minimum secrecy rate(AMSR).Since the optimization problem is non-convex and difficult to solve directly,we first decompose the optimization problem into subproblems of trajectory optimization,transmission power optimization,and block length ***,based on firstorder approximation techniques,these subproblems are reformulated as convex optimization ***,we utilize an alternating iteration algorithm based on the successive convex approximation(SCA)technique to solve these subproblems *** simulation results demonstrate that our proposed scheme can achieve secure transmission for blocks while maintaining the performance of the blockchain.
暂无评论