Salient object detection(SOD)in RGB and depth images has attracted increasing research *** RGB-D SOD models usually adopt fusion strategies to learn a shared representation from RGB and depth modalities,while few meth...
详细信息
Salient object detection(SOD)in RGB and depth images has attracted increasing research *** RGB-D SOD models usually adopt fusion strategies to learn a shared representation from RGB and depth modalities,while few methods explicitly consider how to preserve modality-specific *** this study,we propose a novel framework,the specificity-preserving network(SPNet),which improves SOD performance by exploring both the shared information and modality-specific ***,we use two modality-specific networks and a shared learning network to generate individual and shared saliency prediction *** effectively fuse cross-modal features in the shared learning network,we propose a cross-enhanced integration module(CIM)and propagate the fused feature to the next layer to integrate cross-level ***,to capture rich complementary multi-modal information to boost SOD performance,we use a multi-modal feature aggregation(MFA)module to integrate the modalityspecific features from each individual decoder into the shared *** using skip connections between encoder and decoder layers,hierarchical features can be fully *** experiments demonstrate that our SPNet outperforms cutting-edge approaches on six popular RGB-D SOD and three camouflaged object detection *** project is publicly available at https://***/taozh2017/SPNet.
Twitter is one of the most popular social networking sites today, and it has become a critical tool for gathering data from numerous individuals throughout the world. The platform hosts a variety of debates spanning f...
详细信息
Internet reviews significantly influence consumer purchase decisions across all types of goods and services. However, fake reviews can mislead both customers and businesses. Many machine learning (ML) techniques have ...
详细信息
By adopting the Online to Offline (O2O) commerce strategy, this paper designs and implements the Bluetooth Low Energy (BLE) indoor positioning technique for an Android APP to let the customer browse online and promote...
详细信息
Groundwater, a vital resource for various purposes, faces increasing threats to its quality due to factors like overuse, pollution and climate change. In the semi-arid climate of the state of Telangana, India, exacerb...
详细信息
Background: Disease diagnosis is a useful phenomenon in healthcare. Machine learning classification methods would considerably improve the healthcare industry by providing a quick diagnosis of the disease. Thus, time ...
详细信息
The vehicular edge computing(VEC)is a new paradigm that allows vehicles to offload computational tasks to base stations(BSs)with edge servers for *** general,the VEC paradigm uses the 5G for wireless communications,wh...
详细信息
The vehicular edge computing(VEC)is a new paradigm that allows vehicles to offload computational tasks to base stations(BSs)with edge servers for *** general,the VEC paradigm uses the 5G for wireless communications,where the massive multi-input multi-output(MIMO)technique will be ***,considering in the VEC environment with many vehicles,the energy consumption of BS may be very *** this paper,we study the energy optimization problem for the massive MIMO-based VEC *** at reducing the relevant BS energy consumption,we first propose a joint optimization problem of computation resource allocation,beam allocation and vehicle grouping *** the original problem is hard to be solved directly,we try to split the original problem into two subproblems and then design a heuristic algorithm to solve *** results show that our proposed algorithm efficiently reduces the BS energy consumption compared to other schemes.
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
Internet of Things(IoT)is a recent paradigm to improve human ***,number devices are connected to the Internet ***,the people can control and monitor the physical things in real-time without *** IoT plays a vital role ...
详细信息
Internet of Things(IoT)is a recent paradigm to improve human ***,number devices are connected to the Internet ***,the people can control and monitor the physical things in real-time without *** IoT plays a vital role in all kind of fields in our world such as agriculture,livestock,transport,and healthcare,grid system,connected home,elderly people carrying system,cypher physical system,retail,and intelligent *** IoT energy conservation is a challenging task,as the devices are made up of low-cost and low-power sensing devices and local *** networks have significant challenges in two areas:network lifespan and energy ***,the clustering is a right choice to prolong the energy in the *** LEACH clustering protocol,sometimes the same node acts as CH again and again *** overcome these issues,this paper proposes the Energy-Aware Cluster-based Routing(EACRLEACH)protocol in WSN based *** Cluster Head(CH)selection is a crucial task in clustering protocol inWSN based *** EACR-LEACH,the CH is selected by using the routing metrics,Residual Energy(RER),Number of Neighbors(NoN),Distance between Sensor Node and Sink(Distance)and Number of Time Node Act as CH(NTNACH).An extensive simulation is conducted on MATLAB *** accomplishment of EACR-LEACH is compared to LEACH and *** proposed EACR-LEACH protocol extends the network’s lifetime by 4%-8%and boosts throughput by 16%–24%.
In the present scenario,Deep Learning(DL)is one of the most popular research algorithms to increase the accuracy of data *** to intra-class differences and inter-class variation,image classification is one of the most...
详细信息
In the present scenario,Deep Learning(DL)is one of the most popular research algorithms to increase the accuracy of data *** to intra-class differences and inter-class variation,image classification is one of the most difficult jobs in image *** or spinach recognition or classification is one of the deep learning applications through its *** is more critical for human skin,bone,and hair,*** provides vitamins,iron,minerals,and *** is beneficial for diet and is readily available in people’s *** researchers have proposed various machine learning and deep learning algorithms to classify plant images more accurately in recent *** paper presents a novel Convolutional Neural Network(CNN)to recognize spinach more *** proposed CNN architecture classifies the spinach category,namely Amaranth leaves,Black nightshade,Curry leaves,and Drumstick *** dataset contains 400 images with four classes,and each type has 100 *** images were captured from the agricultural land located at Thirumanur,Salem district,Tamil *** proposed CNN achieves 97.5%classification *** addition,the performance of the proposed CNN is compared with Support Vector Machine(SVM),Random Forest,Visual Geometry Group 16(VGG16),Visual Geometry Group 19(VGG19)and Residual Network 50(ResNet50).The proposed provides superior performance than other models,namely SVM,Random Forest,VGG16,VGG19 and ResNet50.
暂无评论