The accuracy of solar cell models is crucial for enhancing the performance of solar photovoltaic (PV) systems. However, existing solar cell models lack precise parameters, and the manufacturer's datasheet does not...
详细信息
Electric vehicle (EV) is a fast-growing technology that could help reduce greenhouse gas emissions in the energy and transportation sectors. The characteristics of EVs allow for rapid smart city expansion and serve as...
详细信息
In this paper, we present a novel visual servoing (VS) approach based on latent Denoising Diffusion Probabilistic Models (DDPMs), that explores the application of generative models for vision-based navigation of UAVs ...
详细信息
In this research, we propose a low-cost indoor localization technique using the CSI. By using CSI signal as input data, different locations and human activities are classified effectively using machine learning models...
详细信息
We present a low-cost 5G-SA system based on edge-computing hardware with open-source components and off-the-shelf hardware in this paper. Our system is suitable for nomadic and ad-hoc 5G-SA use cases that require low-...
详细信息
Goal-oriented requirements engineering (GORE) for Systems of Systems (SoS) includes combining individual operational systems local goals to achieve higher-level goals. GORE offers a structured approach to managing com...
详细信息
Image Super-Resolution (SR) is a vital image processing technique aimed at improving the resolution of lowresolution images to generate high-resolution images, which is essential in applications such as medical imagin...
详细信息
Evaluating student competencies is critical to fostering academic success, but the traditional process of assessment and report generation is time-consuming and labor-intensive for teachers. The emergence of Large Lan...
详细信息
This paper studies the equitable and optimal transport (EOT) problem, which has many applications such as fair division problems and optimal transport with multiple agents etc. In the discrete distributions case, the ...
详细信息
This paper studies the equitable and optimal transport (EOT) problem, which has many applications such as fair division problems and optimal transport with multiple agents etc. In the discrete distributions case, the EOT problem can be formulated as a linear program (LP). Since this LP is prohibitively large for general LP solvers, (Scetbon et al., 2021) suggests to perturb the problem by adding an entropy regularization. They proposed a projected alternating maximization algorithm (PAM) to solve the dual of the entropy regularized EOT. In this paper, we provide the first convergence analysis of PAM. A novel rounding procedure is proposed to help construct the primal solution for the original EOT problem. We also propose a variant of PAM by incorporating the extrapolation technique that can numerically improve the performance of PAM. Results in this paper may shed lights on block coordinate (gradient) descent methods for general optimization problems.
Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end *** numerous security tech-niques,face recognition is considered a high-security *** fuse and carry out face ...
详细信息
Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end *** numerous security tech-niques,face recognition is considered a high-security *** fuse and carry out face identification as an access authority into these ***,face identification authentication is sensitive to attacks with a 2-D photo image or captured video to access the system as an authorized *** the existing spoofing detection algorithm,there was some loss in the recreation of *** research proposes an unobtrusive technique to detect face spoofing attacks that apply a single frame of the sequenced set of frames to overcome the above-said *** research offers a novel Edge-Net autoencoder to select convoluted and dominant features of the input diffused ***,this pro-posed method is tested with the Cross-ethnicity Face Anti-spoofing(CASIA),Fetal alcohol spectrum disorders(FASD)*** database has three models of attacks:distorted photographs in printed form,photographs with removed eyes portion,and video *** images are taken with three different quality cameras:low,average,and high-quality real and spoofed *** extensive experimental study was performed with CASIA-FASD,3 Diagnostic Machine Aid-Digital(DMAD)dataset that proved higher results when compared to existing algorithms.
暂无评论