For the telephone broadcast model, an O(n log n)-time algorithm for constructing an optimal broadcasting scheme in a star of cliques with a total of n vertices was recently presented by Ambashankar and Harutyunyan at ...
详细信息
We present a lightweight and efficient semisupervised video object segmentation network based on the space-time memory *** some extent,our method solves the two difficulties encountered in traditional video object se...
详细信息
We present a lightweight and efficient semisupervised video object segmentation network based on the space-time memory *** some extent,our method solves the two difficulties encountered in traditional video object segmentation:one is that the single frame calculation time is too long,and the other is that the current frame’s segmentation should use more information from past *** algorithm uses a global context(GC)module to achieve highperformance,real-time *** GC module can effectively integrate multi-frame image information without increased memory and can process each frame in real ***,the prediction mask of the previous frame is helpful for the segmentation of the current frame,so we input it into a spatial constraint module(SCM),which constrains the areas of segments in the current *** SCM effectively alleviates mismatching of similar targets yet consumes few additional *** added a refinement module to the decoder to improve boundary *** model achieves state-of-the-art results on various datasets,scoring 80.1%on YouTube-VOS 2018 and a J&F score of 78.0%on DAVIS 2017,while taking 0.05 s per frame on the DAVIS 2016 validation dataset.
The proposed protocol offers privacy-preserving authentication across several cloud platforms, flexible key management for consumer data protection, and effective user revocation. Performance evaluation demonstrates t...
详细信息
The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert ***,the existing methods of covert communication in blockchain suffer from...
详细信息
The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert ***,the existing methods of covert communication in blockchain suffer from the predefined channel structure,the capacity of a single transaction is not high,and the fixed transaction behaviors will lower the concealment of the communication ***,this paper proposes a derivation matrix-based covert communication method in *** uses dual-key to derive two types of blockchain addresses and then constructs an address matrix by dividing addresses into multiple layers to make full use of the redundancy of ***,to solve the problem of the lack of concealment caused by the fixed transaction behaviors,divide the rectangular matrix into square blocks with overlapping regions and then encrypt different blocks sequentially to make the transaction behaviors of the channel addresses match better with those of the real ***,the linear congruence algorithm is used to generate random sequence,which provides a random order for blocks encryption,and thus enhances the security of the encryption *** results show that this method can effectively reduce the abnormal transaction behaviors of addresses while ensuring the channel transmission efficiency.
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Rec...
详细信息
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Recognition(HAR)***,the significant computational demands and memory requirements hinder the practical deployment of deep networks in resource-constrained *** paper introduces a novel network pruning method based on the energy spectral density of data in the frequency domain,which reduces the model’s depth and accelerates activity *** traditional pruning methods that focus on the spatial domain and the importance of filters,this method converts sensor data,such as HAR data,to the frequency domain for *** emphasizes the low-frequency components by calculating their energy spectral density ***,filters that meet the predefined thresholds are retained,and redundant filters are removed,leading to a significant reduction in model size without compromising performance or incurring additional computational ***,the proposed algorithm’s effectiveness is empirically validated on a standard five-layer CNNs backbone *** computational feasibility and data sensitivity of the proposed scheme are thoroughly ***,the classification accuracy on three benchmark HAR datasets UCI-HAR,WISDM,and PAMAP2 reaches 96.20%,98.40%,and 92.38%,***,our strategy achieves a reduction in Floating Point Operations(FLOPs)by 90.73%,93.70%,and 90.74%,respectively,along with a corresponding decrease in memory consumption by 90.53%,93.43%,and 90.05%.
High-performance video frame interpolation is challenging for complex scenes with diverse motion and occlusion characteristics. Existing methods, deploying off-the-shelf flow estimators to acquire initial characteriza...
详细信息
Human nervous system,which is composed of neuron and synapse networks,is capable of processing information in a plastic,dataparallel,fault-tolerant,and energy-efficient *** by the ingenious working mechanism of this m...
详细信息
Human nervous system,which is composed of neuron and synapse networks,is capable of processing information in a plastic,dataparallel,fault-tolerant,and energy-efficient *** by the ingenious working mechanism of this miraculous biological data processing system,scientists have been devoting great efforts to ar-tificial neural systems based on synaptic devices in recent *** continuous development of bioinspired sensors and synaptic devices in recent years have made it possible that artificial sensory neural systems are capable of capturing and processing stimuli informa-tion in real *** progress of biomimetic sensory neural systems could provide new methods for next-generation humanoid robotics,human-machine interfaces,and other frontier ***,this review summarized the recent progress of synaptic devices and biomimetic sensory neural ***,the opportunities and remaining challenges in the further development of biomimetic sensory neural systems were also outlined.
The fusion of infrared and visible images is hard due to their different modalities. Different from existing methods using the integer-order gradient, we design an optimization model to fuse infrared and visible image...
详细信息
Typical network traffic is characterized by high-dimensional, polymorphic and massive amounts of data, which is a consistent challenge for pattern-based intrusion detection. Most detection models suffer from low effic...
详细信息
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported w...
详细信息
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported worldwide ***,there is a pressing need to employ diverse landmine detection techniques for their *** effective approach for landmine detection is UAV(Unmanned Aerial Vehicle)based AirborneMagnetometry,which identifies magnetic anomalies in the local terrestrial magnetic *** can generate a contour plot or heat map that visually represents the magnetic field *** the effectiveness of this approach,landmine removal remains a challenging and resource-intensive task,fraughtwith *** computing,on the other hand,can play a crucial role in critical drone monitoring applications like landmine *** processing data locally on a nearby edge server,edge computing can reduce communication latency and bandwidth requirements,allowing real-time analysis of magnetic field *** enables faster decision-making and more efficient landmine detection,potentially saving lives and minimizing the risks involved in the ***,edge computing can provide enhanced security and privacy by keeping sensitive data close to the source,reducing the chances of data exposure during *** paper introduces the MAGnetometry Imaging based Classification System(MAGICS),a fully automated UAV-based system designed for landmine and buried object detection and *** have developed an efficient deep learning-based strategy for automatic image classification using magnetometry dataset *** simulating the proposal in various network scenarios,we have successfully detected landmine signatures present in themagnetometry *** trained models exhibit significant performance improvements,achieving a maximum mean average precision value of 97.8%.
暂无评论