Multi-image super-resolution consists in fusing multiple images of the same scene to generate an image of higher spatial resolution. Recently, it has been demonstrated that for remotely sensed multispectral Sentine1-2...
Multi-image super-resolution consists in fusing multiple images of the same scene to generate an image of higher spatial resolution. Recently, it has been demonstrated that for remotely sensed multispectral Sentine1-2 images, fusion performed in both spectral and temporal dimensions improves the reconstruction quality. However, the deep networks elaborated for this purpose are quite large and influence of the input data is difficult to interpret. In this paper, we show how to exploit transformer-based image fusion to reduce the number of trainable parameters by 30% and allow for increased interpretability with means of attention rollout. The reported experimental results performed over simulated and real-world data indicate that this does not affect the reconstruction quality, while at the same time the visualization tools may help in developing techniques for input data selection and preprocessing.
The article presents an automated assembly station designed by students as part of Project Based Learning. The task of the project was to familiarize with the issues of integration of automation and control elements o...
详细信息
This paper proposes a classification framework aimed at identifying correlations between job ad requirements and transversal skill sets, with a focus on predicting the necessary skills for individual job descriptions ...
详细信息
Network optimization and continued availability depend on a number of capabilities that are part of network management. The Maintenance, operating and also offering a safeguarded interaction network is very complicate...
Network optimization and continued availability depend on a number of capabilities that are part of network management. The Maintenance, operating and also offering a safeguarded interaction network is very complicated. It calls for the network operators to grapple with low-level vendor particular arrangements to execute the high degree network policies which are complicated. A method for monitoring networks with OpenFlow controller is presented in this paper in two separate functions for the same networks. Bandwidth utilization, Meter values, charts and statistics are provided by the method to extend controller monitoring capabilities. The method architecture and implementation will be introduced in order to present the feature set. Additionally, softswitches are used as a switch and Mininet to evaluate a virtualized network. This analysis shows whether Meters or ports value is better for network management.
作者:
Stanczyk, UrszulaDepartment of Graphics
Computer Vision and Digital Systems Faculty of Automatic Control Electronics and Computer Science Silesian University of Technology Akademicka 2A Gliwice44-100 Poland
Relative or decision reducts belong with mechanisms dedicated to feature selection, and they are embedded in rough set approach to data processing. Algorithms for reduct construction typically aim at dimensionality re...
详细信息
Magnetic nanoparticles can be embedded in electrospun nanofibers and other polymeric matrices to prepare magnetic composites with defined magnetic and mechanical properties. Metal-oxide nanoparticles, such as magnetit...
详细信息
“The cloud“ points out to servers, the databases and software that run on those servers. The Internet has always been constructed of infrastructure, servers and clients. Clients send their requests to servers, and s...
“The cloud“ points out to servers, the databases and software that run on those servers. The Internet has always been constructed of infrastructure, servers and clients. Clients send their requests to servers, and servers reply, but cloud computing is distinct in the form that cloud servers are not just replying to requests with on-demand processing but they are saving data and running programs instead of the client. Cloud computing is a technology that is crossing a great expansion today. In cloud computing you can dynamically expand resources without knowledge of a new infrastructure, without developing new software or preparing new staff and to access such great technology the only things that are asked for are an Internet connection and an Internet browser. The goal of this survey is to present the different cloud security threats and recognize the proper security mechanism used to reduce them.
作者:
Stanczyk, UrszulaBaron, GrzegorzDepartment of Graphics
Computer Vision and Digital Systems Faculty of Automatic Control Electronics and Computer Science Silesian University of Technology Akademicka 2A Gliwice44-100 Poland
Stylometric analysis of texts relies on learning characteristic traits of writing styles for authors. Once these patterns are discovered, they can be compared to the ones present in other text samples, to recognise th...
详细信息
Fault diagnosis in wastewater treatment plants (WWTPs) is important to protect communities and ecosystems from toxic elements discharged into water. In this sense, fault identification of sensors plays an important ro...
详细信息
In this paper, the problem of backward compatibility of active disturbance rejection control (ADRC) is investigated. The goal is to contextualize ADRC to deliver its interpretations from the established field of linea...
详细信息
暂无评论