Re-identification involves identifying the same person across multiple non-overlapping cameras. Traditional methods rely heavily on pedestrian appearance, assuming consistent clothing in both query and gallery images,...
详细信息
ISBN:
(数字)9798350352894
ISBN:
(纸本)9798350352900
Re-identification involves identifying the same person across multiple non-overlapping cameras. Traditional methods rely heavily on pedestrian appearance, assuming consistent clothing in both query and gallery images, which is unrealistic in real-world scenarios where individuals often change clothes. To address this, we propose the Pose and Style Normalization Network (PSN-Net), which handles clothing and pose variations using adversarial generative networks and feature decoupling. Our model includes a Style Normalization (SN) module to eliminate style differences and a dual-channel feature matching module to enhance pedestrian matching. The results of the comparative and ablation experiments demonstrate that our model can effectively improve pedestrian recognition performance under clothing changes.
With the rapid improvement of medical consumer electronics (CE), the transmission of multiple images has become increasingly common in the medical field. During the transmission and storage of image data, sensitive in...
详细信息
Testing in the automotive industry sector can be maximized with a correctly and efficiently implemented test environment generator (TEG). For the TEG to work properly, it must have functioning parsers. In this paper, ...
详细信息
ISBN:
(数字)9781665483742
ISBN:
(纸本)9781665483759
Testing in the automotive industry sector can be maximized with a correctly and efficiently implemented test environment generator (TEG). For the TEG to work properly, it must have functioning parsers. In this paper, the implementation of three parsers within C++ based TEG is analyzed. These are: model parser,. dbc and. xml communication parser, and. arxml communication parser. Each parser reads files of certain format and extracts appropriate data to store it in the TEG database. The performance of parsers implemented within C++ based TEG are compared with the performance of parsers of Python based TEG. The TEG written in C++ has advantages over a solution written in Python2, like better performance and better protection of intellectual property.
This paper introduces the design and implementation of a compact ground station hardware system for the reception of data from low-Earth orbit (LEO) satellites. Using LoRa technology and System-in-Package (SiP) integr...
详细信息
ISBN:
(数字)9798350386929
ISBN:
(纸本)9798350350746
This paper introduces the design and implementation of a compact ground station hardware system for the reception of data from low-Earth orbit (LEO) satellites. Using LoRa technology and System-in-Package (SiP) integration, the proposed architecture consolidates multiple components into a highly miniaturized form factor, featuring an embedded 2.4 GHz antenna, with overall dimensions of 10mm × 15mm × 3mm. The system is engineered to ensure reliable performance under the demanding conditions of LEO satellite communication, providing robust and efficient data reception and processing capabilities. This cost-effective and space-optimized solution facilitates greater access to satellite-derived data and services, particularly in remote or resource-constrained environments. The prototype was fabricated and rigorously tested using an evaluation kit, effectively validating the technical feasibility of the design.
Clustering algorithms are attracting much application interest due to the significant growth in the rate of data generation. However, the high computational complexity of the existing clustering algorithms has rendere...
详细信息
This paper investigates public key cryptosystems (PKC) in the rank metric and term-rank metric. For security analysis of cryptosystems, we introduce a GPT system. Recently, respective structural attacks this system we...
详细信息
Macular disease is one of the major causes of blindness. Optical coherence tomography (OCT) is a commonly used ophthalmic diagnostic technique to assist ophthalmologists in their analysis and treatment. However, manua...
详细信息
Thinking skills are considered essential to remain competitive in the 21st century. However, low achievement in science subjects reflects students' weaknesses in mastering their thinking skills. The study aims to ...
详细信息
Blockchain technology is widely used to develop software systems in different industries such as finance, healthcare, supply chain management, data management, Internet of Things (IoT). To adopt blockchain, some criti...
详细信息
Blockchain technology is widely used to develop software systems in different industries such as finance, healthcare, supply chain management, data management, Internet of Things (IoT). To adopt blockchain, some critical challenges such as performance, interoperability, availability, security attacks, sustainability, and latency need to be taken into consideration. If the blockchain platform selected is not appropriate, the functionality and quality of the blockchain-based systems will be affected. Additionally, numerous blockchain platforms with unique properties and specifications are available in the market, and the task of selecting the right platform that best meets the project needs is getting complicated. It is crucial to define significant criteria that can help to shortlist the blockchain platforms for further comparison and selection using multicriteria decision-making methods. This research proposes a set of selection criteria that cover both features and quality attributes of the blockchain platforms. A survey was conducted to get the opinions of blockchain practitioners on the suitability of the selection criteria for the evaluation and selection of blockchain platforms.
Group data sharing in cloud settings has become more popular recently as a result of cloud computing's broad acceptance. The need for efficient and safe data exchange in such settings is currently urgent. Another ...
Group data sharing in cloud settings has become more popular recently as a result of cloud computing's broad acceptance. The need for efficient and safe data exchange in such settings is currently urgent. Another particular problem in cloud-based exchange of data is finding a balance of anonymity and traceability. In order to preserve anonymity, this study focuses on providing safe and effective data exchange and storage for organizations via the cloud. In order to accommodate numerous users surreptitiously in public clouds, it suggests a unique traceable collective data sharing system that makes use of key collaboration and group signature techniques. This system ensures that member identities may be tracked when required while enabling group members to converse anonymously using group signatures. Additionally, to allow for safe data exchange and preservation among group members, a shared conference key is obtained via key agreement. Notably, the key generation process for the system uses a symmetrically balanced incomplete block architecture, greatly easing the load on participants while determining a shared conference key. The suggested approach for collective information sharing on the internet of things is shown to be secure and effective via theoretical investigation and empirical assessments.
暂无评论