Recently, there have been some attempts of Transformer in 3D point cloud classification. In order to reduce computations, most existing methods focus on local spatial attention,but ignore their content and fail to est...
详细信息
Recently, there have been some attempts of Transformer in 3D point cloud classification. In order to reduce computations, most existing methods focus on local spatial attention,but ignore their content and fail to establish relationships between distant but relevant points. To overcome the limitation of local spatial attention, we propose a point content-based Transformer architecture, called PointConT for short. It exploits the locality of points in the feature space(content-based), which clusters the sampled points with similar features into the same class and computes the self-attention within each class, thus enabling an effective trade-off between capturing long-range dependencies and computational complexity. We further introduce an inception feature aggregator for point cloud classification, which uses parallel structures to aggregate high-frequency and low-frequency information in each branch separately. Extensive experiments show that our PointConT model achieves a remarkable performance on point cloud shape classification. Especially, our method exhibits 90.3% Top-1 accuracy on the hardest setting of ScanObjectN N. Source code of this paper is available at https://***/yahuiliu99/PointC onT.
Object segmentation is one of the main activities for the robot to create a sense of its environment. This task is a precursor to other activities, such as autonomous navigation in a given environment. Through sensors...
详细信息
Software is a crucial component in the communication systems,and its security is of paramount ***,it is susceptible to different types of attacks due to potential ***,significant time and effort is required to fix suc...
详细信息
Software is a crucial component in the communication systems,and its security is of paramount ***,it is susceptible to different types of attacks due to potential ***,significant time and effort is required to fix such *** propose an automated program repair method based on controlled text generation ***,we utilize a fine-tuned language model for patch generation and introduce a discriminator to evaluate the generation process,selecting results that contribute most to vulnerability ***,we perform static syntax analysis to expedite the patch verification *** effectiveness of the proposed approach is validated using QuixBugs and Defects4J datasets,demonstrating significant improvements in generating correct patches compared to other existing methods.
In this study, a robust Linear Quadratic Regulator (LQR) controller was developed and evaluated for the Bebop 2 quadrotor drone. Polytopic uncertainties in the dynamic model were taken into account in the control desi...
详细信息
Due to the explosive demand and rapid development of the electronics industry, the integration and complexity of electronic devices have significantly grown. Fault detection has played a vital role in identification o...
详细信息
Early time series classification predicts the class label of a given time series before it is completely observed. In time-critical applications, such as arrhythmia monitoring in ICU, early treatment contributes to th...
详细信息
Predictive maintenance techniques are designed to determine the state of equipment in action to help us know when we can intervene to perform maintenance on it. Predictive maintenance design applies artificial intelli...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
Demand-side flexibility from renewable energy community members increases the benefits of local production and exchanges. To effectively harness this flexibility, end-users must be rewarded for their efforts regarding...
详细信息
We present a plenoptic time-of-flight pixel design using grating arrays with inverse-designed passive photonic power combining to achieve scalable signal-to-noise ratio. Experimental results are presented as a proof-o...
详细信息
暂无评论