Although having achieved real-time performance on mesh construction, most of the existing LiDAR odometry and meshing methods have difficulties in dealing with cluttered scenes due to relying on explicit meshing techni...
详细信息
Although having achieved real-time performance on mesh construction, most of the existing LiDAR odometry and meshing methods have difficulties in dealing with cluttered scenes due to relying on explicit meshing techniques. To overcome these limitations, we propose a real-time mesh-based LiDAR odometry and mapping approach for large-scale scenes through implicit reconstruction and a parallel spatial-hashing scheme. In order to efficiently reconstruct the triangular meshes using the implicit function, we suggest an incremental voxel meshing strategy that depends on a novel voxel map fusing scans through a single traversal of the current frame. Moreover, we introduce a scalable partition module to compress space. By taking advantage of the rapid access to triangular meshes, we design a robust odometry method with location and feature-based data association to estimate the poses between the input point clouds and the recovered triangular meshes. The experimental results on four public datasets demonstrate the effectiveness of our proposed approach in recovering both accurate motion trajectories and environmental mesh maps. IEEE
Digital media interaction design mainly focuses on the user’s interactive experience in the digital media environment. By designing interaction methods that conform to human cognition and behavioral habits, it improv...
详细信息
Although deep convolution neural network(DCNN)has achieved great success in computer vision field,such models are considered to lack interpretability in *** of fundamental issues is that its decision mechanism is cons...
详细信息
Although deep convolution neural network(DCNN)has achieved great success in computer vision field,such models are considered to lack interpretability in *** of fundamental issues is that its decision mechanism is considered to be a“black-box”*** authors design the binary tree structure convolution(BTSC)module and control the activation level of particular neurons to build the interpretable DCNN ***,the authors design a BTSC module,in which each parent node generates two independent child layers,and then integrate them into a normal DCNN *** main advantages of the BTSC are as follows:1)child nodes of the different parent nodes do not interfere with each other;2)parent and child nodes can inherit ***,considering the activation level of neurons,the authors design an information coding objective to guide neural nodes to learn the particular information coding that is *** the experiments,the authors can verify that:1)the decision-making made by both the ResNet and DenseNet models can be explained well based on the"decision information flow path"(known as the decision-path)formed in the BTSC module;2)the decision-path can reasonably interpret the decision reversal mechanism(Robustness mechanism)of the DCNN model;3)the credibility of decision-making can be measured by the matching degree between the actual and expected decision-path.
This research focuses on Scene Text Recognition (STR), a crucial component in various applications of artificial intelligence such as image retrieval, office automation, and intelligent traffic systems. Recent studies...
详细信息
Sb-based materials exhibit considerable potential for sodium-ion storage owing to their high theoretica ***,the bulk properties of Sb-based materials always result in poor cycling and rate *** overcome these issues,py...
详细信息
Sb-based materials exhibit considerable potential for sodium-ion storage owing to their high theoretica ***,the bulk properties of Sb-based materials always result in poor cycling and rate *** overcome these issues,pyridine-regulated Sb@InSbS_(3)ultrafine nanoplates loaded on reduced graphene oxides(Sb@InSbS_(3)@rGO)were designed and *** the synthesis process,pyridine was initially adopted to coordinate with In^(3+),and uniformly dispersed In_(2)S_(3)ultrafine nanoplates on reduced graphene oxide were generated after ***,partial In^(3+)was exchanged with Sb^(3+),and Sb@InSbS_(3)@rGO was obtained by using the subsequent annealing *** unique structure of Sb@InSbS_(3)@rGO effectively shortened the transfer path of sodium ions and electrons and provided a high *** the anode in sodium-ion batteries,the Sb@InSbS_(3)@rGO electrode demonstrated a significantly higher reversible capacity better stability(445 m Ah·g^(-1)at 0.1 A·g^(-1)after 200 cycles and 212 mAh·g^(-1)at 2 A·g^(-1)after 1200 cycles),and superior rate(210 mAh·g^(-1)at 6.4 A·g^(-1))than the electrode without pyridine(355 mAh·g-1at 0.1 A·g-1after 55 cycles and 109 mAh·g^(-1)at 2 A·g^(-1)after 770 cycles)Furthermore,full cells were assembled by using the Sb@InSbS_(3)@rGO as anode and Na_(3)V_(2)(PO_(4))_(3)as cathode which demonstrated good cycling and rate performances and exhibited promising application *** results indicate that adjusting the microstructure of electrode materials through coordination balance is A·good strategy for obtaining high-capacity,high-rate,and longcycle sodium storage performances.
The SM9 identity-based encryption(IBE) scheme is a cryptographic standard used in China, and has been incorporated into the ISO/IEC standard in 2021. This work primarily proposes a countermeasure to secure the SM9 IBE...
详细信息
The SM9 identity-based encryption(IBE) scheme is a cryptographic standard used in China, and has been incorporated into the ISO/IEC standard in 2021. This work primarily proposes a countermeasure to secure the SM9 IBE scheme if its implementation is tampered with or deviated from the standard *** attacks, known as subversion attacks, are feasible and powerful in real-world cryptographic application scenarios. Our goal is to design a subversion-resilient variant of the SM9 IBE scheme, primarily using the cryptographic reverse firewall(CRF) proposed by Mironov and Stephens-Davidowitz at EUROCRYPT 2015.A CRF can sanitize cryptographic transcripts to eliminate covert channels, necessitating that the underlying primitive be rerandomizable. Unfortunately, the rerandomizability of the SM9 IBE scheme is disabled for ensuring security against chosen ciphertext attack(CCA). Hence, we shift our focus to a relaxed version of CCA security called RCCA security, offering security guarantees comparable to CCA security while allowing for ciphertext rerandomization. For this purpose, we design an efficient and RCCA-secure variant of the SM9 IBE scheme with provable security that can integrate with CRFs to achieve subversion resilience.
The diversified development of the service ecosystem,particularly the rapid growth of services like cloud and edge computing,has propelled the flourishing expansion of the service trading ***,in the absence of appropr...
详细信息
The diversified development of the service ecosystem,particularly the rapid growth of services like cloud and edge computing,has propelled the flourishing expansion of the service trading ***,in the absence of appropriate pricing guidance,service providers often devise pricing strategies solely based on their own interests,potentially hindering the maximization of overall market *** challenge is even more severe in edge computing scenarios,as different edge service providers are dispersed across various regions and influenced by multiple factors,making it challenging to establish a unified pricing *** paper introduces a multi-participant stochastic game model to formalize the pricing problem of multiple edge ***,an incentive mechanism based on Pareto improvement is proposed to drive the game towards Pareto optimal direction,achieving optimal ***,an enhanced PSO algorithm was proposed by adaptively optimizing inertia factor across three *** optimization significantly improved the efficiency of solving the game model and analyzed equilibrium states under various evolutionary *** results demonstrate that the proposed pricing incentive mechanism promotes more effective and rational pricing allocations,while also demonstrating the effectiveness of our algorithm in resolving game problems.
Threshold signature is an important branch of the digital signature scheme,which can distribute signature rights and avoid the abuse of signature *** the continuous development of quantum computation and quantum infor...
详细信息
Threshold signature is an important branch of the digital signature scheme,which can distribute signature rights and avoid the abuse of signature *** the continuous development of quantum computation and quantum information,quantum threshold signatures are gradually becoming more ***,a quantum(t,n)threshold group signature scheme was analyzed that uses techniques such as quantum-controlled-not operation and quantum ***,this scheme cannot resist forgery attack and does not conform to the design of a threshold signature in the signing *** on the original scheme,we propose an improved quantum(t,n)threshold signature scheme using quantum(t,n)threshold secret sharing *** analysis proves that the improved scheme can resist forgery attack and collusion attack,and it is *** the same time,this scheme reduces the level of trust in the arbitrator during the signature phase.
Currently,the video captioning models based on an encoder-decoder mainly rely on a single video input *** contents of video captioning are limited since few studies employed external corpus information to guide the ge...
详细信息
Currently,the video captioning models based on an encoder-decoder mainly rely on a single video input *** contents of video captioning are limited since few studies employed external corpus information to guide the generation of video captioning,which is not conducive to the accurate descrip-tion and understanding of video *** address this issue,a novel video captioning method guided by a sentence retrieval generation network(ED-SRG)is proposed in this ***,a ResNeXt network model,an efficient convolutional network for online video understanding(ECO)model,and a long short-term memory(LSTM)network model are integrated to construct an encoder-decoder,which is utilized to extract the 2D features,3D features,and object features of video data *** features are decoded to generate textual sentences that conform to video content for sentence ***,a sentence-transformer network model is employed to retrieve different sentences in an external corpus that are semantically similar to the above textual *** candidate sentences are screened out through similarity ***,a novel GPT-2 network model is constructed based on GPT-2 network *** model introduces a designed random selector to randomly select predicted words with a high probability in the corpus,which is used to guide and generate textual sentences that are more in line with human natural language *** proposed method in this paper is compared with several existing works by *** results show that the indicators BLEU-4,CIDEr,ROUGE_L,and METEOR are improved by 3.1%,1.3%,0.3%,and 1.5%on a public dataset MSVD and 1.3%,0.5%,0.2%,1.9%on a public dataset MSR-VTT *** can be seen that the proposed method in this paper can generate video captioning with richer semantics than several state-of-the-art approaches.
With the advent of the fourth industrial revolution, data ushered in explosive growth. Federated learning can protect users’ privacy and raw data from being known by third parties. Its client data is only trained loc...
详细信息
暂无评论