Despite recent progress in semantic image synthesis, complete control over image style remains a challenging problem. Existing methods require reference images to feed style information into semantic layouts, which in...
Despite recent progress in semantic image synthesis, complete control over image style remains a challenging problem. Existing methods require reference images to feed style information into semantic layouts, which indicates that the style is constrained by the given image. In this paper, we propose a model named RUCGAN for user controllable semantic image synthesis, which utilizes a singular color to represent the style of a specific semantic region. The proposed network achieves reference-free semantic image synthesis by injecting color as user-desired styles into each semantic layout, and is able to synthesize semantic images with unusual colors. Extensive experimental results on various challenging datasets show that the proposed method outperforms existing methods, and we further provide an interactive UI to demonstrate the advantage of our approach for style controllability. The codes and UI are available at: https://***/BenjaminJonghyun/RUCGAN
Elliptic curve cryptosystem is a widely-used public key cryptosystem that is vulnerable to physical attacks, especially to Side Channel Analysis (SCA) attacks. This paper investigates a version of the atomic patterns ...
Elliptic curve cryptosystem is a widely-used public key cryptosystem that is vulnerable to physical attacks, especially to Side Channel Analysis (SCA) attacks. This paper investigates a version of the atomic patterns $\boldsymbol{kP}$ algorithm for elliptic curves over prime finite fields. The atomic patterns for Elliptic Curve (EC) point doublings and additions are well-known countermeasures against simple SCA attacks. We implemented a binary left-to-right $\boldsymbol{kP}$ algorithm corresponding to the atomic patterns as proposed by Rondepierre and using the FLECC open-source cryptographic library. The library provides constant-time functions for the implementation of different mathematic operations in prime finite fields, making it suitable for SCA-aware implementations of cryptographic protocols, at a theoretical level. We were able to reveal the scalar k processed during a $\boldsymbol{kP}$ execution analyzing the measured electromagnetic trace of the $\boldsymbol{kP}$ execution. We determined at least two parts in the measured trace where the distinction between EC point doublings and EC point additions is good observable.
Odontogram is a medical record for dental patient. It records the condition of patient's tooth and helps dentist to diagnose patient's tooth and to provide further treatment. Though, many dentists do not fill ...
详细信息
Double auction has been emerged as a popular mechanism to enable dynamic data sharing among moving vehicles for critical applications such as autonomous driving. This paper proposes a novel pre-decision-making-empower...
详细信息
ISBN:
(数字)9798350378412
ISBN:
(纸本)9798350378429
Double auction has been emerged as a popular mechanism to enable dynamic data sharing among moving vehicles for critical applications such as autonomous driving. This paper proposes a novel pre-decision-making-empowered double auction mechanism for data provisioning among moving vehicles (which are classified into data buyers and sellers), who may pass a considered road intersection. To help buyers obtain their required data (e.g., different data types and qualities), while supporting a responsive auction process between vehicles, the proposed mechanism features an unique pre-decision-making empowered two-stages auction to reduce the data trading latency. We further investigate DBSCAN-based clustering algorithm and VCG-based pricing rule for the first stage, to facilitate long-term contracts between buyers and sellers, as well as preference lists for buyers, in advance to practical transactions. Then, the second stage will follow the pre-decisions in the former stage, thus enabling a time-efficient data trading process. Simulations validate our superior performance in social welfare, time efficiency, and maintaining crucial auction properties such as truthfulness and individual rationality.
Chest radiography presents one of the main medical imaging modalities for diagnosing lung diseases. To assist radiologists during interventional procedures, this paper aims at proposing a transfer learning-based class...
详细信息
Programming can help K-12 students to develop their 21st-century core skills. Despite the benefits, programming is not common to be delivered in Indonesian K-12 education. There is a need to understand potential chall...
Programming can help K-12 students to develop their 21st-century core skills. Despite the benefits, programming is not common to be delivered in Indonesian K-12 education. There is a need to understand potential challenges in introducing programming to K-12 students. We developed a questionnaire survey covering four identified dimensions of challenges: administrative, facilities, teachers, and students. We also asked about common programming assessments and their preferred software features for teaching programming. Forty K-12 teachers were invited to complete the survey. The responses were analyzed with thematic analysis using a bigram-based Latent Dirichlet Allocation topic modeling and descriptive statistics. Our study shows that the challenges include limited learning modules, an insufficient number of computers, limited programming skills, and limited computational thinking skills. Scratch was the most common programming language used and many programming assessments were about debugging a program or writing a small program. Visualization and animation can be helpful in teaching programming.
Pending interest table (PIT) is one of the data structures on each named data network router. The speed of delivery of interest as well as the interest served at PIT are several important parameters for measuring PIT ...
Pending interest table (PIT) is one of the data structures on each named data network router. The speed of delivery of interest as well as the interest served at PIT are several important parameters for measuring PIT performance. This research was conducted to analyze the performance of PIT by measuring the round trip time (RTT) of sending data and sending interests from consumers to producers on the Palapa Ring Sumatra topology. Testing is carried out using miniNDN by varying the length of the prefix and the number of interests sent. From the simulation and results of the analysis that has been carried out, it is known that the correlation between the length of the prefix and RTT is directly proportional. The longer the prefix of an interest packet, the higher the RTT value. Apart from the simulation results, the number of interest packets sent is the same as those received at each node.
Due to the push for more sustainable generation, small-scale distributed energy resources (DERs) penetration has increased significantly. Most countries have no remote monitoring and control requirements for DERs belo...
Due to the push for more sustainable generation, small-scale distributed energy resources (DERs) penetration has increased significantly. Most countries have no remote monitoring and control requirements for DERs below a certain size. Therefore, they can be labeled as uncontrollable DERs (UDERs). In isolated systems, the UDERs hosting capacity is limited due to frequency stability concerns, as it is impossible to modify or curtail their generation in a centralized manner. In this paper, we propose the utilization of the active power over-frequency reduction curve for increasing the hosting capacity of UDERs in isolated power systems. Cyprus’s power system has been used to evaluate the proposed solution’s performance. The optimal settings of the curve have been identified, and it was found that UDERs hosting capacity can be increased significantly with the proposed methodology.
Named data networks are a new concept in network architecture that can process data transmission by name. This concept can be utilized in the case of video streaming. TIPHON is a standard used to support streaming mul...
Named data networks are a new concept in network architecture that can process data transmission by name. This concept can be utilized in the case of video streaming. TIPHON is a standard used to support streaming multimedia activities. According to TIPHON, three factors-delay, packet loss, and throughput-can influence how a stream behaves. This study's goal is to evaluate the quality of service (QoS) of video streaming services using an NDN network that adheres to the TIPHON NDN standard. Several things can affect throughput, such as bottlenecks on the computer or network device used.
Active Disturbance Rejection Control (ADRC) is a data-driven algorithm that offers a promising approach for robust control design. This paper investigates the effectiveness of first-order and second-order ADRC for 3D ...
详细信息
暂无评论