Dengue fever is mainly caused by female mosquitoes from the genus Aedes. It predominantly occurs in equatorial to sub-tropical regions. The weather factors play a significant role in the mosquito life cycle, so a stud...
详细信息
Precise predictions of indoor climate conditions are required in the implementation of Smart Solar Dryer Dome (SDD). Trend development of prediction models is discussed in this review from 15 selected research papers ...
详细信息
The continuous advancement of communication systems necessitates the development of algorithms capable of identifying and correcting errors that may arise during data transmission and storage. This pursuit of reliabil...
详细信息
ISBN:
(数字)9798331522124
ISBN:
(纸本)9798331522131
The continuous advancement of communication systems necessitates the development of algorithms capable of identifying and correcting errors that may arise during data transmission and storage. This pursuit of reliability is particularly crucial in critical systems and sectors that are challenging to access, such as space exploration, passenger transportation, and financial services. In this context, the Error Correction Code (ECC) is a fundamental tool for providing a certain degree of reliability to these systems. This research proposes a novel technique to enhance the error correction capacity of ECCs by leveraging region overlapping. Specifically, we propose correcting data areas protected by more than one ECC, which allows for the inference of logical correlations between ECCs, thereby augmenting their error detection and correction capability. Our focus is bidimensional codeword structures, commonly known as 2D-ECCs, which entail a hierarchical arrangement of ECCs. We evaluated the ECC proposal, comparing its error correction and detection capabilities. Through this evaluation, we aim to demonstrate the technique's efficacy in bolstering the reliability and resilience of communication systems, particularly in critical domains where precision and accuracy are paramount.
This work compares illumination and communication performance of 2 × 2, 3 × 2 and 4 × 2 MIMO-OFDM VLC links. Results show that not every configuration complies with the recommended illumination levels (...
详细信息
ISBN:
(数字)9798350388176
ISBN:
(纸本)9798350388183
This work compares illumination and communication performance of 2 × 2, 3 × 2 and 4 × 2 MIMO-OFDM VLC links. Results show that not every configuration complies with the recommended illumination levels (≥300 Ix) for operation in indoor environments.
Deception is essential to model real-world agent behaviors in entertainment and serious games. This paper approaches the challenge of planning deceptive routes on topographic terrains where topographic path costs and ...
详细信息
ISBN:
(纸本)9798400716270
Deception is essential to model real-world agent behaviors in entertainment and serious games. This paper approaches the challenge of planning deceptive routes on topographic terrains where topographic path costs and other deceptive path factors are analyzed. The work explores alternative deceptive strategies tuned to explore the terrain costs to determine how deceptive the path search nodes are and to return paths with low topographic costs. In addition to the A* algorithm, the Theta* algorithm is explored in the search for smoother deceptive routes, which better represent routes used by terrestrial agents in real-world adversarial situations. It also analyzes deceptive topographic paths computed according to the Last Deceptive Point (LDP) and Last Topographic Deceptive Point (LDPT) notions, where examples of returned paths are presented with the help of terrain relief scenarios. Experimental results with the proposed methods are statistically analyzed according to various path search metrics, showing that all deceptive strategies with A* compute topographic paths with higher numbers of deceptive nodes on reduced execution times. Moreover, the strategies with Theta* and LDPT return paths that show a useful combination of topographic path quality and number of deceptive nodes.
Digital transformation is about transforming processes, business models, domains, and culture. Studies show that the failure rate of digital transformation is quite high up to 90%. Studies show that the transformation...
详细信息
This study evaluates the performance of the REAL-ESRGAN [1] model on images with varying levels of degradation using the DIV2K dataset [2], such as the Wild, the Mild, the Difficult, and the x8 subsets. REAL-ESRGAN wa...
详细信息
ISBN:
(数字)9798350389654
ISBN:
(纸本)9798350389661
This study evaluates the performance of the REAL-ESRGAN [1] model on images with varying levels of degradation using the DIV2K dataset [2], such as the Wild, the Mild, the Difficult, and the x8 subsets. REAL-ESRGAN was created to solve super-resolution problems and aims to produce high-resolution images from low-resolution images. Experiments were conducted at scales of x2 and x4, and performance was measured using Full-Reference metrics (LPIPS, PSNR, SSIM) and No-Reference metrics (NIQE, MANIQA, CLIPIQA, and PI). The Results were good, especially with the x2 scale; it has higher PSNR and SSIM scores, lower LPIPS and NIQE values, and enhanced visual and perceptual quality. The model faced more significant challenges with the wild and the difficult datasets because they have more complex degradations and compression artifacts; it can be seen with unstable results of Full-Reference and No-Reference metrics. On the contrary, the Mild and x8 datasets yielded better results in both metrics; not only that, even the computational cost for Mild and x8 outperforms the rest of the dataset. This study shows the strengths and limitations of REAL-ESRGAN in handling different levels of image degradation. For future research, the model needs enhancement to tackle the degradation format of the wild and the difficult dataset. It would be good if the REAL-ESRGAN improvement could also maintain the computational cost.
Quantum encoding is a process to transform classical information into quantum states. It plays a crucial role in using quantum algorithms to solve classical problems, especially in quantum machine learning tasks. Ther...
详细信息
Learning to assemble geometric shapes into a larger target structure is a pivotal task in various practical applications. In this work, we tackle this problem by establishing local correspondences between point clouds...
详细信息
Learning to assemble geometric shapes into a larger target structure is a pivotal task in various practical applications. In this work, we tackle this problem by establishing local correspondences between point clouds of part shapes in both coarse- and fine-levels. To this end, we introduce Proxy Match Transform (PMT), an approximate high-order feature transform layer that enables reliable matching between mating surfaces of parts while incurring low costs in memory and compute. Building upon PMT, we introduce a new framework, dubbed Proxy Match TransformeR (PMTR), for the geometric assembly task. We evaluate the proposed PMTR on the large-scale 3D geometric shape assembly benchmark dataset of Breaking Bad and demonstrate its superior performance and efficiency compared to state-of-the-art methods. Project page: https://***/pmtr. Copyright 2024 by the author(s)
In the past ten years, there has been a proliferation of unstructured textual data from a variety of fields, allowing for the analysis of the sentiment polarity of the text authors in each of those datasets. To analyz...
详细信息
暂无评论