During the last 3 years, researchers have endeavored to extend the efficacy of contrastive learning (CL) towards addressing the challenges inherent in cloud workload prediction, which has demonstrated considerable suc...
详细信息
Photo composition is one of the most important factors in the aesthetics of *** a popular application,composition recommendation for a photo focusing on a specific subject has been ignored by recent deep-learning-base...
详细信息
Photo composition is one of the most important factors in the aesthetics of *** a popular application,composition recommendation for a photo focusing on a specific subject has been ignored by recent deep-learning-based composition recommendation *** this paper,we propose a subject-aware image composition recommendation method,SAC-Net,which takes an RGB image and a binary subject window mask as input,and returns good compositions as crops containing the *** model first determines candidate scores for all possible coarse cropping *** crops with high candidate scores are selected and further refined by regressing their corner points to generate the output recommended cropping *** final scores of the refined crops are predicted by a final score regression *** existing methods that need to preset several cropping windows,our network is able to automatically regress cropping windows with arbitrary aspect ratios and *** propose novel stability losses for maximizing smoothness when changing cropping windows along with view *** results show that our method outperforms state-of-the-art methods not only on the subject-aware image composition recommendation task,but also for general purpose composition *** also have designed a multistage labeling scheme so that a large amount of ranked pairs can be produced *** use this scheme to propose the first subject-aware composition dataset SACD,which contains 2777 images,and more than 5 million composition ranked *** SACD dataset is publicly available at https://***/SACD/.
In this paper, we study the deployment of K heterogeneous UAVs to monitor Points of Interest (PoIs) in a disaster zone, where a PoI may represent a school building or an office building, in which people are trapped. A...
详细信息
Online offensive behaviour continues to rise with the increasing popularity and use of social media. Various techniques have been used to address this issue. However, most existing studies consider offensive content i...
详细信息
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t...
详细信息
Nowadays,smart buildings rely on Internet of things(loT)technology derived from the cloud and fog computing paradigms to coordinate and collaborate between connected *** is characterized by low latency with a wider sp...
详细信息
Nowadays,smart buildings rely on Internet of things(loT)technology derived from the cloud and fog computing paradigms to coordinate and collaborate between connected *** is characterized by low latency with a wider spread and geographically distributed nodes to support mobility,real-time interaction,and location-based *** provide optimum quality of user life in moderm buildings,we rely on a holistic Framework,designed in a way that decreases latency and improves energy saving and services efficiency with different *** EVent system Specification(DEVS)is a formalism used to describe simulation models in a modular *** this work,the sub-models of connected objects in the building are accurately and independently designed,and after installing them together,we easily get an integrated model which is subject to the fog computing *** results show that this new approach significantly,improves energy efficiency of buildings and reduces ***,with DEVS,we can easily add or remove sub-models to or from the overall model,allowing us to continually improve our designs.
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but faul...
详细信息
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but fault tolerance and energy balancing gives equal importance for improving the network *** saving energy in WSNs,clustering is considered as one of the effective methods for Wireless Sensor *** of the excessive overload,more energy consumed by cluster heads(CHs)in a cluster based WSN to receive and aggregate the information from member sensor nodes and it leads to *** increasing the WSNs’lifetime,the CHs selection has played a key role in energy consumption for sensor *** Energy Efficient Unequal Fault Tolerant Clustering Approach(EEUFTC)is proposed for reducing the energy utilization through the intelligent methods like Particle Swarm Optimization(PSO).In this approach,an optimal Master Cluster Head(MCH)-Master data Aggregator(MDA),selection method is proposed which uses the fitness values and they evaluate based on the PSO for two optimal nodes in each cluster to act as Master Data Aggregator(MDA),and Master Cluster *** data from the cluster members collected by the chosen MCH exclusively and the MDA is used for collected data reception from MCH transmits to the ***,the MCH overhead *** the heavy communication of data,overhead controls using the scheduling of Energy-Efficient Time Division Multiple Access(EE-TDMA).To describe the proposed method superiority based on various performance metrics,simulation and results are compared to the existing methods.
Facial expression recognition is a challenging task when neural network is applied to pattern recognition. Most of the current recognition research is based on single source facial data, which generally has the disadv...
详细信息
Diffusion MRI (dMRI) allows for examining microarchitecture profiles and tissue changes using specific microstructure modeling but depends on advanced acquisition protocol and well-established biological model assumpt...
详细信息
Nowadays, Cloud Computing has attracted a lot of interest from both individual users and organization. However, cloud computing applications face certain security issues, such as data integrity, user privacy, and serv...
详细信息
暂无评论