Tumors are one of the main causes of global mortality, and early diagnosis and precise treatment affect the survival rate of patients. Traditional image analysis relies on the professional knowledge and experience of ...
详细信息
Transformer models have emerged as dominant networks for various tasks in computer vision compared to Convolutional Neural Networks(CNNs).The transformers demonstrate the ability to model long-range dependencies by ut...
详细信息
Transformer models have emerged as dominant networks for various tasks in computer vision compared to Convolutional Neural Networks(CNNs).The transformers demonstrate the ability to model long-range dependencies by utilizing a self-attention *** study aims to provide a comprehensive survey of recent transformerbased approaches in image and video applications,as well as diffusion *** begin by discussing existing surveys of vision transformers and comparing them to this ***,we review the main components of a vanilla transformer network,including the self-attention mechanism,feed-forward network,position encoding,*** the main part of this survey,we review recent transformer-based models in three categories:Transformer for downstream tasks,Vision Transformer for Generation,and Vision Transformer for *** also provide a comprehensive overview of recent transformer models for video tasks and diffusion *** compare the performance of various hierarchical transformer networks for multiple tasks on popular benchmark ***,we explore some future research directions to further improve the field.
This study classifies the actions of football players using sensing data acquired from wearable sensors attached to players and the ball. More than 800 sensing data with the labels of five types of player actions were...
详细信息
The enhancement of Intrusion Detection Systems (IDS) is required to ensure protection of network resources and services. This is a hot research topic, especially in the presence of advanced intrusions and at...
详细信息
High-fidelity(HiFi)sequencing has facilitated the assembly and analysis of the most repetitive region of the genome,the ***,our current understanding of human centromeres is based on a relatively small number of telom...
详细信息
High-fidelity(HiFi)sequencing has facilitated the assembly and analysis of the most repetitive region of the genome,the ***,our current understanding of human centromeres is based on a relatively small number of telomere-to-telomere assemblies,which have not yet captured its full *** this study,we investigated the genomic diversity of human centromere higher order repeats(HORs)via both HiFi reads and haplotype-resolved assemblies from hundreds of samples drawn from ongoing pangenome-sequencing projects and reprocessed them via a novel HOR annotation pipeline,*** used this wealth of data to provide a global survey of the centromeric HOR landscape;in particular,we found that 23 HORs presented significant copy number variability between *** detected three centromere genotypes with unbalanced population frequencies on chromosomes 5,8,and *** inter-assembly comparison of HOR loci further revealed that while HOR array structures are diverse,they nevertheless tend to form a number of specific landscapes,each exhibiting different levels of HOR subunit expansion and possibly reflecting a cyclical evolutionary transition from homogeneous to nested structures and back.
While deep learning excels in computer vision tasks with abundant labeled data, its performance diminishes significantly in scenarios with limited labeled samples. To address this, Few-shot learning (FSL) enables mode...
详细信息
Shadow extraction and elimination is essential for intelligent transportation systems(ITS)in vehicle tracking *** shadow is the source of error for vehicle detection,which causes misclassification of vehicles and a hi...
详细信息
Shadow extraction and elimination is essential for intelligent transportation systems(ITS)in vehicle tracking *** shadow is the source of error for vehicle detection,which causes misclassification of vehicles and a high false alarm rate in the research of vehicle counting,vehicle detection,vehicle tracking,and *** of the existing research is on shadow extraction of moving vehicles in high intensity and on standard datasets,but the process of extracting shadows from moving vehicles in low light of real scenes is *** real scenes of vehicles dataset are generated by self on the Vadodara–Mumbai highway during periods of poor illumination for shadow extraction of moving vehicles to address the above *** paper offers a robust shadow extraction of moving vehicles and its elimination for vehicle *** method is distributed into two phases:In the first phase,we extract foreground regions using a mixture of Gaussian model,and then in the second phase,with the help of the Gamma correction,intensity ratio,negative transformation,and a combination of Gaussian filters,we locate and remove the shadow region from the foreground *** to the outcomes proposed method with outcomes of an existing method,the suggested method achieves an average true negative rate of above 90%,a shadow detection rate SDR(η%),and a shadow discrimination rate SDR(ξ%)of 80%.Hence,the suggested method is more appropriate for moving shadow detection in real scenes.
The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT *** Channel Attacks(SCA)are one of the major *** prime objective of SCA is to acquire the information by observing th...
详细信息
The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT *** Channel Attacks(SCA)are one of the major *** prime objective of SCA is to acquire the information by observing the power consumption,electromagnetic(EM)field,timing analysis,and acoustics of the ***,the attackers perform statistical functions to recover the *** Encryption Standard(AES)algorithm has proved to be a good security solution for constrained IoT *** paper implements a simulation model which is used to modify theAES algorithm using logicalmasking *** invariant of the AES algorithm hides the array of bits during substitution byte transformation of *** model is used against SCAand particularly Power Analysis Attacks(PAAs).Simulation model is designed on MATLAB *** will give better solution by hiding power profiles of the IoT devices against *** future,the lightweight AES algorithm with false key mechanisms and power reduction techniques such as wave dynamic differential logic(WDDL)will be used to safeguard IoT devices against side channel attacks by using Arduino and field programmable gate array(FPGA).
The growing demand for reliable and sustainable energy has driven researchers and engineers to explore renewable energy sources to complement traditional power grids. Wind energy conversion systems (WECS), particularl...
详细信息
Food recognition has captivated much significance for health-related appliances. The traditional schemes mainly concern on the classification of food depending on its names and disregards the basic ingredient composit...
详细信息
暂无评论