Text perception is crucial for understanding the semantics of outdoor scenes,making it a key requirement for building intelligent systems for driver assistance or autonomous *** information in car-mounted videos can a...
详细信息
Text perception is crucial for understanding the semantics of outdoor scenes,making it a key requirement for building intelligent systems for driver assistance or autonomous *** information in car-mounted videos can assist drivers in making ***,Car-mounted video text images pose challenges such as complex backgrounds,small fonts,and the need for real-time *** proposed a robust Car-mounted Video Text Detector(CVTD).It is a lightweight text detection model based on ResNet18 for feature extraction,capable of detecting text in arbitrary *** model efficiently extracted global text positions through the Coordinate Attention Threshold Activation(CATA)and enhanced the representation capability through stacking two Feature Pyramid Enhancement Fusion Modules(FPEFM),strengthening feature representation,and integrating text local features and global position information,reinforcing the representation capability of the CVTD *** enhanced feature maps,when acted upon by Text Activation Maps(TAM),effectively distinguished text foreground from non-text ***,we collected and annotated a dataset containing 2200 images of Car-mounted Video Text(CVT)under various road conditions for training and evaluating our model’s *** further tested our model on four other challenging public natural scene text detection benchmark datasets,demonstrating its strong generalization ability and real-time detection *** model holds potential for practical applications in real-world scenarios.
IoT devices are more important than ever. In a connected world, IoT devices have many uses. They are no longer merely used at work;they are part of our everyday lives. Security concerns arise if the devices generate, ...
详细信息
Brain tumors are one of the deadliest diseases and require quick and accurate methods of detection. Finding the optimum image for research goals is the first step in optimizing MRI images for pre- and post-processing....
详细信息
The attention-based encoder-decoder technique,known as the trans-former,is used to enhance the performance of end-to-end automatic speech recognition(ASR).This research focuses on applying ASR end-toend transformer-ba...
详细信息
The attention-based encoder-decoder technique,known as the trans-former,is used to enhance the performance of end-to-end automatic speech recognition(ASR).This research focuses on applying ASR end-toend transformer-based models for the Arabic language,as the researchers’community pays little attention to *** Muslims Holy Qur’an book is written using Arabic diacritized *** this paper,an end-to-end transformer model to building a robust Qur’an *** is *** acoustic model was built using the transformer-based model as deep learning by the PyTorch framework.A multi-head attention mechanism is utilized to represent the encoder and decoder in the acoustic *** filter bank is used for feature *** build a language model(LM),the Recurrent Neural Network(RNN)and Long short-term memory(LSTM)were used to train an n-gram word-based *** a part of this research,a new dataset of Qur’an verses and their associated transcripts were collected and processed for training and evaluating the proposed model,consisting of 10 h *** recitations performed by 60 *** experimental results showed that the proposed end-to-end transformer-based model achieved a significant low character error rate(CER)of 1.98%and a word error rate(WER)of 6.16%.We have achieved state-of-the-art end-to-end transformer-based recognition for Qur’an reciters.
Cardiovascular health is becoming more common over the world. Electrocardiography (ECG) is a test that utilizes an electrical signal in the heart to diagnose and monitor cardiac problems. Utilizing the myDAQ data acqu...
详细信息
We developed an information system using an object-oriented programming language and a distributed database (DDB) consisting of multiple interconnected databases across a computer network, managed by a distributed dat...
详细信息
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the *** technology has been widely used and has developed rapidly in big data systems across ...
详细信息
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the *** technology has been widely used and has developed rapidly in big data systems across various *** increasing number of users are participating in application systems that use blockchain as their underlying *** the number of transactions and the capital involved in blockchain grow,ensuring information security becomes *** the verification of transactional information security and privacy has emerged as a critical ***-based verification methods can effectively eliminate the need for centralized third-party ***,the efficiency of nodes in storing and verifying blockchain data faces unprecedented *** address this issue,this paper introduces an efficient verification scheme for transaction ***,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all ***,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous *** analyses and simulation experiments conclusively demonstrate the superior performance of this *** verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional *** findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of *** scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.
In recent years,task offloading and its scheduling optimization have emerged as widely discussed and signif-icant *** multi-objective optimization problems inherent in this domain,particularly those related to resourc...
详细信息
In recent years,task offloading and its scheduling optimization have emerged as widely discussed and signif-icant *** multi-objective optimization problems inherent in this domain,particularly those related to resource allocation,have been extensively ***,existing studies predominantly focus on matching suitable computational resources for task offloading requests,often overlooking the optimization of the task data transmission *** inefficiency in data transmission leads to delays in the arrival of task data at computational nodes within the edge network,resulting in increased service times due to elevated network transmission latencies and idle computational *** address this gap,we propose an Asynchronous Data Transmission Policy(ADTP)for optimizing data transmission for task offloading in edge-computing enabled ultra-dense *** dynamically generates data transmission scheduling strategies by jointly considering task offloading decisions and the fluctuating operational states of edge computing-enabled IoT *** contrast to existing methods,the Deep Deterministic Policy Gradient(DDPG)based task data transmission scheduling module works asynchronously with the Deep Q-Network(DQN)based Virtual Machine(VM)selection module in *** significantly reduces the computational space required for the scheduling *** continuous dynamic adjustment of data transmission bandwidth ensures timely delivery of task data and optimal utilization of network bandwidth *** reduces the task completion time and minimizes the failure rate caused by ***,the VM selection module only performs the next inference step when a new task arrives or when a task finishes its *** a result,the wastage of computational resources is further *** simulation results indicate that the proposed ADTP reduced average data transmission delay and service time by 7.11%and 8.09%,***,the tas
Human age and gender prediction from facial images has garnered significant attention due to its importance in various applications. Traditional models struggle with large-scale variations in unfiltered images. Convol...
详细信息
The proliferation of internet usage and social media platforms has significantly enhanced the ability of individuals to express their opinions on various topics. However, this freedom of expression sometimes morphs in...
详细信息
暂无评论