The accurate prediction of drug responses based on the genomic profile of a patient is essential to progress in the field of precision *** advent of various deep-learning algorithms based on publicly available large-s...
详细信息
This paper examines the use of supervised machine learning to construct a digital twin model replicating a physical plant. An inverted pendulum simulation has been used as a case study. A comparative study was conduct...
详细信息
As virtual reality (VR) continues to expand, particularly in social VR platforms and immersive gaming, understanding the factors that shape user experience is becoming increasingly important. Avatars and locomotion me...
详细信息
In light of this unmistakable exponential data expansion, visual media archiving must be rethought. Human generated meta-data might not be sufficient for efficient data retrieval. Object detection and object recogniti...
详细信息
Nowadays, machine learning (ML) has attained a high level of achievement in many contexts. Considering the significance of ML in medical and bioinformatics owing to its accuracy, many investigators discussed multiple ...
详细信息
Vanilla image completion approaches exhibit sensitivity to large missing regions, attributed to the limited availability of reference information for plausible generation. To mitigate this, existing methods incorporat...
详细信息
Single-cell RNA sequencing (scRNA-seq) provides expression profiles of individual cells but fails to preserve crucial spatial information. On the other hand, Spatial Transcriptomics technologies are able to analyze sp...
详细信息
A fundamental concept related to strings is that of repetitions. It has been extensively studied in many versions, from both purely combinatorial and algorithmic angles. One of the most basic questions is how many dis...
详细信息
ISBN:
(纸本)9783959773225
A fundamental concept related to strings is that of repetitions. It has been extensively studied in many versions, from both purely combinatorial and algorithmic angles. One of the most basic questions is how many distinct squares, i.e., distinct strings of the form UU, a string of length n can contain as fragments. It turns out that this is always O(n), and the bound cannot be improved to sublinear in n [Fraenkel and Simpson, JCTA 1998]. Several similar questions about repetitions in strings have been considered, and by now we seem to have a good understanding of their repetitive structure. For higher-dimensional strings, the basic concept of periodicity has been successfully extended and applied to design efficient algorithms – it is inherently more complex than for regular strings. Extending the notion of repetitions and understanding the repetitive structure of higher-dimensional strings is however far from complete. Quartics were introduced by Apostolico and Brimkov [TCS 2000] as analogues of squares in two dimensions. Charalampopoulos, Radoszewski, Rytter, Waleń, and Zuba [ESA 2020] proved that the number of distinct quartics in an n × n 2D string is O(n2 log2 n) and that they can be computed in O(n2 log2 n) time. Gawrychowski, Ghazawi, and Landau [SPIRE 2021] constructed an infinite family of n × n 2D strings with Ω(n2 log n) distinct quartics. This brings the challenge of determining asymptotically tight bounds. Here, we settle both the combinatorial and the algorithmic aspects of this question: the number of distinct quartics in an n × n 2D string is O(n2 log n) and they can be computed in the worst-case optimal O(n2 log n) time. As expected, our solution heavily exploits the periodic structure implied by occurrences of quartics. However, the two-dimensional nature of the problem introduces some technical challenges. Somewhat surprisingly, we overcome the final challenge for the combinatorial bound using a result of Marcus and Tardos [JCTA 2004] for permuta
Today’s forensic science introduces a new research area for digital image analysis formultimedia ***,Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegi...
详细信息
Today’s forensic science introduces a new research area for digital image analysis formultimedia ***,Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegitimate benefit or createmisleading publicity by using tempered *** forgery detectionmethods can classify only one of the most widely used Copy-Move and splicing ***,an image can contain one or more types of *** study has proposed a hybridmethod for classifying Copy-Move and splicing images using texture information of images in the spatial ***,images are divided into equal blocks to get scale-invariant *** law has been used for getting texture features,and finally,XGBOOST is used to classify both Copy-Move and splicing *** proposed method classified three types of forgeries,i.e.,splicing,Copy-Move,and ***(CASIA 2.0,MICCF200)and RCMFD datasets are used for training and *** average,the proposed method achieved 97.3% accuracy on benchmarked datasets and 98.3% on RCMFD datasets by applying 10-fold cross-validation,which is far better than existing methods.
Convolutional neural networks (CNNs) and self-attention (SA) have demonstrated remarkable success in low-level vision tasks, such as image super-resolution, deraining, and dehazing. The former excels in acquiring loca...
详细信息
暂无评论