Space systems enable essential communications, navigation, imaging and sensing for a variety of domains, including agriculture, commerce, transportation, and emergency operations by first responders. Protecting the cy...
详细信息
Purpose: Watermarking is one of the techniques used to protect multimedia data, and images in particular, from malicious attacks by inserting a signature into these images. However, traditional watermarking schemes en...
详细信息
The optical diffraction effect imposes a radical obstacle preventing conventional optical microscopes from achieving an imaging resolution beyond the Abbe diffraction limit and thereby restricting their usage in a mul...
详细信息
The optical diffraction effect imposes a radical obstacle preventing conventional optical microscopes from achieving an imaging resolution beyond the Abbe diffraction limit and thereby restricting their usage in a multitude of nanoscale *** the past decade,the optical microsphere nanoimaging technique has been demonstrated to be a cost-effective solution for overcoming the diffraction limit and has achieved an imaging resolution of up to about k6k8 in a real-time and label-free manner,making it highly competitive among numerous super-resolution imaging *** this review,we summarize the underlying nano-imaging mechanisms of the microsphere nanoscope and key advancements aimed at imaging performance enhancement:first,to change the working environment or modify the peripheral hardware of a single microsphere nanoscope at the system level;second,to compose the microsphere compound lens;and third,to engineer the geometry or ingredients of *** also analyze challenges yet to be overcome in optical microsphere nano-imaging,followed by an outlook of this technique.
Dear editor,The sparse representation model has received a great amount of attention in various signal and image processing applications. Compressed sensing(CS) [1] has consistently focused on devising sparse represen...
详细信息
Dear editor,The sparse representation model has received a great amount of attention in various signal and image processing applications. Compressed sensing(CS) [1] has consistently focused on devising sparse representation methods that seek to efficiently reconstruct a k-sparse(only k nonzero entries,
In the field of industrial anomaly detection, the scarcity of anomalous data and labels poses significant challenges, necessitating models that can efficiently detect and localize anomalies with minimal reliance on an...
详细信息
ISBN:
(数字)9798350372601
ISBN:
(纸本)9798350372618
In the field of industrial anomaly detection, the scarcity of anomalous data and labels poses significant challenges, necessitating models that can efficiently detect and localize anomalies with minimal reliance on anomalous training data. Traditional approaches often utilize outlier detection strategies on pre-trained features, which are hampered by the inclusion of redundant and irrelevant information, leading to decreased computational efficiency and diminished performance in real-time applications. Addressing these limitations, this paper introduces a novel defect detection and localization strategy that emphasizes rapid feature reconstruction. Our methodology comprises three key components: (1) a robust pre-trained feature extractor that generates descriptive image features, (2) an innovative feature dictionary developed via dictionary learning to embed features from normal images, and (3) a dynamic feature reconstructor designed for swift reconstruction of test features utilizing the dictionary. This approach enables precise anomaly identification and localization by assessing differences between original and reconstructed features. Rigorous testing on the MVTec AD dataset—a benchmark for real-world industrial anomaly detection—validates the method’s superiority, demonstrating substantial improvements in detection speed with minimal impact on accuracy. The findings suggest that this strategy holds significant promise for enhancing the efficiency and reliability of anomaly detection in industrial settings.
Cryptoprocessors play a pivotal role in enhancing the security of modern computing systems by accelerating cryptographic operations and fortifying data protection. This survey delves into the world of cryptoprocessors...
详细信息
Recently, Software-Defined Networking (SDN) architecture has offered great benefits due to the separation between the control and network elements such as routers and switches. Unfortunately, the enormous growth of at...
详细信息
PROBLEM In recent years,the rapid development of artificial intelligence (AI) technology,especially machine learning and deep learning, is profoundly changing human production and *** various fields,such as robotics,f...
详细信息
PROBLEM In recent years,the rapid development of artificial intelligence (AI) technology,especially machine learning and deep learning, is profoundly changing human production and *** various fields,such as robotics,face recognition,autonomous driving and healthcare,AI is playing an important ***,although AI is promoting the technological revolution and industrial progress,its security risks are often *** studies have found that the wellperforming deep learning models are extremely vulnerable to adversarial examples [1-3].The adversarial examples are crafted by applying small,humanimperceptible perturbations to natural examples,but can mislead deep learning models to make wrong *** vulnerability of deep learning models to adversarial examples can raise security and safety threats to various realworld applications.
With the burgeon deployment of the fifth-generation new radio (5 G NR) networks, the codebook plays a crucial role in enabling the base station (BS) to acquire the channel state information (CSI). Different 5 G NR cod...
详细信息
In parallel with the proliferation and extension of wireless sensor networks (WSNs), as well as the diversity of their applications, such networks continue to fail to operate for lengthy periods of time due to node fa...
详细信息
暂无评论