Batik is an Indonesian world cultural heritage. Batik consists of many kinds of patterns depending on where the batik comes from, Batik-making techniques continue to develop along with technology development. Among th...
Batik is an Indonesian world cultural heritage. Batik consists of many kinds of patterns depending on where the batik comes from, Batik-making techniques continue to develop along with technology development. Among the batik making techniques that are widely used are hand-written, stamping, and printing. Batik motifs have been widely used as research material, especially in the field of artificial intelligence. The diverse appearance of batik motifs has attracted many researchers to carry out research on making synthetic batik patterns, one of which uses a Generative Adversarial Network. This paper presents a synthetic batik pattern model based on the Wasserstein Generative Adversarial Network with Gradient Penalty. This model has been proven to create new synthetic batik patterns quite well and almost identical with images provided in the dataset, with the notes if the dataset provided is large.
Toward realization of terahertz communications, we propose a method for designing terahertz bandpass filters on all-dielectric substrateless waveguide platforms. The proposed filter is constituted by one-dimensional p...
详细信息
ISBN:
(数字)9798350363548
ISBN:
(纸本)9798350363555
Toward realization of terahertz communications, we propose a method for designing terahertz bandpass filters on all-dielectric substrateless waveguide platforms. The proposed filter is constituted by one-dimensional photonic crystal as a low-pass filter and a two-dimensional photonic crystals as a high - pass filter. Leveraging cascaded photonic-crystal (PhC) claddings, wider stopbands are achieved to accommodate the requirements of different communications channels. The incorporation of both 2D and 1D PhC enables bandpass responses and improve design flexibility. With a low insertion loss of around 1.4 dB and a compact footprint, this novel family of designs is suitable for parallel channelized terahertz communications systems, effectively supporting the increase in the data rate.
Crop Yield Analysis and Prediction is a fast-expanding discipline that is critical for optimizing agricultural methods. A lack of trustworthy data is one of the challenges in estimating crop yields. We develop predict...
Crop Yield Analysis and Prediction is a fast-expanding discipline that is critical for optimizing agricultural methods. A lack of trustworthy data is one of the challenges in estimating crop yields. We develop predictive models for 22 different fruits and vegetables data. The goals of this study are to create accurate and interpretable crop recommendation models. We used multiple machine learning (ML) models for multi-class crop production prediction to fulfill our research goal. We thoroughly examined the influence of climate and nutrient factors on crop yield, considering their complex interactions. To improve the dataset, augmented data techniques were applied. Configuring the parameters and fine-tuning the hyperparameters is our technique to increase the model performance. Furthermore, we employ explainable artificial intelligence (XAI) techniques and interpretability tools like Shapley Additive exPlanations (SHAP) to improve the interpretability of our prediction model. Our findings reveal that the XGBoost model has the best performance model with 99.86% accuracy, followed by SVM Poly Kernel with 99.32% and Random Forest with 98.82%. Feature selection and analysis are emphasized, particularly in regional agricultural contexts. This study contributes to the creation of accurate and interpretable crop recommendation models while also addressing the issue of untrustworthy data, providing useful insights for optimizing agricultural practices.
The green transition has brought about a worldwide-shift to the use of renewables as alternative energy sources. Because of this, high voltage DC has been a field of interest in power electronics due to its capability...
详细信息
Semi-supervised Learning (SSL) has received increasing attention in autonomous driving to reduce the enormous burden of 3D annotation. In this paper, we propose UpCycling, a novel SSL framework for 3D object detection...
Semi-supervised Learning (SSL) has received increasing attention in autonomous driving to reduce the enormous burden of 3D annotation. In this paper, we propose UpCycling, a novel SSL framework for 3D object detection with zero additional raw-level point cloud: learning from unlabeled de-identified intermediate features (i.e., "smashed" data) to preserve privacy. Since these intermediate features are naturally produced by the inference pipeline, no additional computation is required on autonomous vehicles. However, generating effective consistency loss for unlabeled feature-level scene turns out to be a critical challenge. The latest SSL frameworks for 3D object detection that enforce consistency regularization between different augmentations of an unlabeled raw-point scene become detrimental when applied to intermediate features. To solve the problem, we introduce a novel combination of hybrid pseudo labels and feature-level Ground Truth sampling (F-GT), which safely augments unlabeled multi-type 3D scene features and provides high-quality supervision. We implement UpCycling on two representative 3D object detection models: SECOND-IoU and PV-RCNN. Experiments on widely-used datasets (Waymo, KITTI, and Lyft) verify that UpCycling outperforms other augmentation methods applied at the feature level. In addition, while preserving privacy, UpCycling performs better or comparably to the state-of-the-art methods that utilize raw-level unlabeled data in both domain adaptation and partial-label scenarios.
Recent advancements in deep learning-based compression techniques have demonstrated remarkable performance surpassing traditional methods. Nevertheless, deep neural networks have been observed to be vulnerable to back...
详细信息
Recent advancements in deep learning-based compression techniques have demonstrated remarkable performance surpassing traditional methods. Nevertheless, deep neural networks have been observed to be vulnerable to backdoor attacks, where an added pre-defined trigger pattern can induce the malicious behavior of the models. In this paper, we propose a novel approach to launch a backdoor attack with multiple triggers against learned image compression models. Drawing inspiration from the widely used discrete cosine transform (DCT) in existing compression codecs and standards, we propose a frequency-based trigger injection model that adds triggers in the DCT domain. In particular, we design several attack objectives that are adapted for a series of diverse scenarios, including: 1) attacking compression quality in terms of bit-rate and reconstruction quality;2) attacking task-driven measures, such as face recognition and semantic segmentation in downstream applications. To facilitate more efficient training, we develop a dynamic loss function that dynamically balances the impact of different loss terms with fewer hyper-parameters, which also results in more effective optimization of the attack objectives with improved performance. Furthermore, we consider several advanced scenarios. We evaluate the resistance of the proposed backdoor attack to the defensive pre-processing methods and then propose a two-stage training schedule along with the design of robust frequency selection to further improve resistance. To strengthen both the cross-model and cross-domain transferability on attacking downstream CV tasks, we propose to shift the classification boundary in the attack loss during training. Extensive experiments also demonstrate that by employing our trained trigger injection models and making slight modifications to the encoder parameters of the compression model, our proposed attack can successfully inject multiple backdoors accompanied by their corresponding triggers int
We have developed the Shopping Refugees Support Robot that enables the elderly to order items through Social Networking Service (SNS) by voice conversation without relying on smartphones. This paper proposes a detecti...
详细信息
A meta-optic platform for accelerating object classification is demonstrated. End-to-end design is used to co-optimize the optical and digital systems resulting in a high-speed and robust classifier with 93.1% accurac...
This paper presents a design to improve the robustness of visual SLAM(vSLAM). A processing step of feature-removal is added to the tracking thread of the conventional ORB-SLAM2 algorithm to improve the localization ac...
This paper presents a design to improve the robustness of visual SLAM(vSLAM). A processing step of feature-removal is added to the tracking thread of the conventional ORB-SLAM2 algorithm to improve the localization accuracy of a mobile robot in an environment with moving persons. Instance segmentation and motion tracking are intergrated to identify motion state of people in an image. ORB feature points belonging to moving persons are removed for further processing of the vSLAM pipeline. The advantage of this method is that the vSLAM can remove feature points of moving people, while retain those belonging to static people in the environment, which improves the accuracy of robot pose estimation. The improved ORB-SLAM2 algorithm has been implemented in a NVIDIA Xavier embedded system, which is integrated to a mobile robot. In practical robot navigation experiments, the average positioning error of the proposed method is within 4cm for 22.4m travel distance. Compared with conventional ORB-SLAM2, the average accuracy of our vSLAM method improves 97% in a dynamic environment with moving people.
An end-to-end machine learning (ML) lifecycle consists of many iterative processes, from data preparation and ML model design to model training and then deploying the trained model for inference. When building an end-...
详细信息
暂无评论