Hand-sized DNA sequencers have demonstrated excellent scientific utility. They also present exciting opportunities for the expansion of DNA analysis to a diverse range of uses and users. But this potential is currentl...
详细信息
Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual *** paper presents an image scrambling method that is very useful f...
详细信息
Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual *** paper presents an image scrambling method that is very useful for grayscale secret *** this method,the secret image decomposes in three parts based on the pixel’s threshold *** division of the color image into three parts is very easy based on the color channel but in the grayscale image,it is difficult to *** proposed image scrambling method is implemented in image steganography using discrete wavelet transform(DWT),singular value decomposition(SVD),and sorting *** is no visual difference between the stego image and the cover *** extracted secret image is also similar to the original secret *** proposed algorithm outcome is compared with the existed image steganography *** comparative results show the strength of the proposed technique.
In this work, a chemical sensor for concentration measurement of hydrogen peroxide is proposed based on localized surface plasmon resonance (LSPR). The silver nanoparticles coated by polyvinyl alcohol (PVA) have been ...
详细信息
The advent of large language models (LLMs) has spurred considerable interest in advancing autonomous LLMs-based agents, particularly in intriguing applications within smartphone graphical user interfaces (GUIs). When ...
详细信息
The integration of renewable energy sources into smart grids requires advanced management systems to optimize energy production, storage, and distribution. Conventional methods like Static Energy Allocation (SEA) and ...
详细信息
Remarkable progress has been made in self-supervised monocular depth estimation (SS-MDE) by exploring cross-view consistency, e.g., photometric consistency and 3D point cloud consistency. However, they are very vulner...
详细信息
Remarkable progress has been made in self-supervised monocular depth estimation (SS-MDE) by exploring cross-view consistency, e.g., photometric consistency and 3D point cloud consistency. However, they are very vulnerable to illumination variance, occlusions, texture-less regions, as well as moving objects, making them not robust enough to deal with various scenes. To address this challenge, we study two kinds of robust cross-view consistency in this paper. Firstly, the spatial offset field between adjacent frames is obtained by reconstructing the reference frame from its neighbors via deformable alignment, which is used to align the temporal depth features via a depth feature alignment (DFA) loss. Secondly, the 3D point clouds of each reference frame and its nearby frames are calculated and transformed into voxel space, where the point density in each voxel is calculated and aligned via a voxel density alignment (VDA) loss. In this way, we exploit the temporal coherence in both depth feature space and 3D voxel space for SS-MDE, shifting the “point-to-point” alignment paradigm to the “region-to-region” one. Compared with the photometric consistency loss as well as the rigid point cloud alignment loss, the proposed DFA and VDA losses are more robust owing to the strong representation power of deep features as well as the high tolerance of voxel density to the aforementioned challenges. Experimental results on several outdoor benchmarks show that our method outperforms current state-of-the-art techniques. Extensive ablation study and analysis validate the effectiveness of the proposed losses, especially in challenging scenes. The code and models are available at https://***/sunnyHelen/RCVC-depth.
The security of IoT (Internet of Things) devices and the protection of sensitive information processed by these devices such as personal data, sensor values, process-related information is an important and difficult c...
详细信息
The advent of multi-unmanned aerial vehicle (multi-UAV) networks in mobile edge computing (MEC) introduces dynamic computational topologies where UAVs, acting as mobile edge servers, are tasked with processing data fr...
详细信息
Genetic algorithms become widely used in various optimization as a nature-inspired algorithm. This biological-based algorithm includes three genetic operators: selection, crossover or recombination, and mutation. In t...
详细信息
Integrated sensing and communication (ISAC) boosts network efficiency by using existing resources for diverse sensing applications. In this work, we propose a cell-free massive MIMO (multiple-input multiple-output)-IS...
详细信息
暂无评论