Advancements in unmanned aerial vehicle (UAV) technology, along with indoor hybrid LiFi-WiFi networks (HLWN), promise the development of cost-effective, energy-efficient, adaptable, reliable, rapid, and on-demand HLWN...
详细信息
In recent years,cross-modal hash retrieval has become a popular research field because of its advantages of high efficiency and low ***-modal retrieval technology can be applied to search engines,crossmodalmedical pro...
详细信息
In recent years,cross-modal hash retrieval has become a popular research field because of its advantages of high efficiency and low ***-modal retrieval technology can be applied to search engines,crossmodalmedical processing,*** existing main method is to use amulti-label matching paradigm to finish the retrieval ***,such methods do not use fine-grained information in the multi-modal data,which may lead to suboptimal *** avoid cross-modal matching turning into label matching,this paper proposes an end-to-end fine-grained cross-modal hash retrieval method,which can focus more on the fine-grained semantic information of multi-modal ***,the method refines the image features and no longer uses multiple labels to represent text features but uses BERT for ***,this method uses the inference capabilities of the transformer encoder to generate global fine-grained ***,in order to better judge the effect of the fine-grained model,this paper uses the datasets in the image text matching field instead of the traditional label-matching *** article experiment on Microsoft COCO(MS-COCO)and Flickr30K datasets and compare it with the previous *** experimental results show that this method can obtain more advanced results in the cross-modal hash retrieval field.
This paper addresses the critical challenge of privacy in Online Social Networks(OSNs),where centralized designs compromise user *** propose a novel privacy-preservation framework that integrates blockchain technology...
详细信息
This paper addresses the critical challenge of privacy in Online Social Networks(OSNs),where centralized designs compromise user *** propose a novel privacy-preservation framework that integrates blockchain technology with deep learning to overcome these *** methodology employs a two-tier architecture:the first tier uses an elitism-enhanced Particle Swarm Optimization and Gravitational Search Algorithm(ePSOGSA)for optimizing feature selection,while the second tier employs an enhanced Non-symmetric Deep Autoencoder(e-NDAE)for anomaly ***,a blockchain network secures users’data via smart contracts,ensuring robust data *** tested on the NSL-KDD dataset,our framework achieves 98.79%accuracy,a 10%false alarm rate,and a 98.99%detection rate,surpassing existing *** integration of blockchain and deep learning not only enhances privacy protection in OSNs but also offers a scalable model for other applications requiring robust security measures.
INTRODUCTION With the rapid development of remote sensing technology,high-quality remote sensing images have become widely *** automated object detection and recognition of these images,which aims to automatically loc...
INTRODUCTION With the rapid development of remote sensing technology,high-quality remote sensing images have become widely *** automated object detection and recognition of these images,which aims to automatically locate objects of interest in remote sensing images and distinguish their specific categories,is an important fundamental task in the *** provides an effective means for geospatial object monitoring in many social applications,such as intelligent transportation,urban planning,environmental monitoring and homeland security.
This paper proposes a distributed algorithm to drive all agents in a heterogeneous multi-agent system (MAS) to the geometric mean of their initial conditions. It is defined as the GM-consensus problem. The proposed GM...
详细信息
Unmanned aerial vehicle (UAV)-assisted mobile communication has been studied in recent years. UAVs can be used as aerial base stations (BSs) to improve the performance of terrestrial mobile network. In this article, m...
详细信息
Ordinal real-world data such as concept hierarchies, ontologies, genealogies, or task dependencies in scheduling often has the property to not only contain pairwise comparable, but also incomparable elements. Order di...
详细信息
Recently, deep convolutional neural networks (CNNs) have achieved outstanding success in sensor-based human activity recognition (HAR) scenario, but at the cost of huge computational complexity, thereby restricting th...
详细信息
With the advancement of automatic navigation, navigation control has become an indispensable core technology in the movement of unmanned vehicles. In particular, research on navigation control in outdoor wooded enviro...
详细信息
Anomaly detection is the identification of instances that substantially deviate from the majority of the data and do not conform to a well-defined normal behavior. Investigating time series anomalies has become increa...
详细信息
暂无评论