With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of *** study presents a new approach to the encryption and compression of color *** is predicat...
详细信息
With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of *** study presents a new approach to the encryption and compression of color *** is predicated on 2D compressed sensing(CS)and the hyperchaotic ***,an optimized Arnold scrambling algorithm is applied to the initial color images to ensure strong ***,the processed images are con-currently encrypted and compressed using 2D *** them,chaotic sequences replace traditional random measurement matrices to increase the system’s ***,the processed images are re-encrypted using a combination of permutation and diffusion *** addition,the 2D projected gradient with an embedding decryption(2DPG-ED)algorithm is used to reconstruct *** with the traditional reconstruction algorithm,the 2DPG-ED algorithm can improve security and reduce computational ***,it has better *** experimental outcome and the performance analysis indicate that this algorithm can withstand malicious attacks and prove the method is effective.
With the advancement of the manufacturing industry,the investigation of the shop floor scheduling problem has gained increasing *** Job shop Scheduling Problem(JSP),as a fundamental scheduling problem,holds considerab...
详细信息
With the advancement of the manufacturing industry,the investigation of the shop floor scheduling problem has gained increasing *** Job shop Scheduling Problem(JSP),as a fundamental scheduling problem,holds considerable theoretical research ***,finding a satisfactory solution within a given time is difficult due to the NP-hard nature of the JSP.A co-operative-guided ant colony optimization algorithm with knowledge learning(namely KLCACO)is proposed to address this *** algorithm integrates a data-based swarm intelligence optimization algorithm with model-based JSP schedule knowledge.A solution construction scheme based on scheduling knowledge learning is proposed for *** problem model and algorithm data are fused by merging scheduling and planning knowledge with individual scheme construction to enhance the quality of the generated individual solutions.A pheromone guidance mechanism,which is based on a collaborative machine strategy,is used to simplify information learning and the problem space by collaborating with different machine processing ***,the KLCACO algorithm utilizes the classical neighborhood structure to optimize the solution,expanding the search space of the algorithm and accelerating its *** KLCACO algorithm is compared with other highperformance intelligent optimization algorithms on four public benchmark datasets,comprising 48 benchmark test cases in *** effectiveness of the proposed algorithm in addressing JSPs is validated,demonstrating the feasibility of the KLCACO algorithm for knowledge and data fusion in complex combinatorial optimization problems.
In this paper, we delve into the investigation of locating broadcast 2-centers of a tree T under the postal model. The problem asks to deploy two broadcast centers so that the maximum communication time from the cente...
详细信息
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a signifi...
详细信息
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a significant *** development of secure communication methods that keep recipient-only data transmissions secret has always been an area of ***,several approaches,including steganography,have been developed by researchers over time to enable safe data *** this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,*** have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)*** this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this *** encoding the data and embedding it into a carry image,this review verifies that it has been ***,embedded text in photos conveys crucial signals about the *** review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data *** the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.
In an Unsupervised Domain Adaptation (UDA) task, extracted features from the entire image lead to a negative transfer of irrelevant knowledge. An attention mechanism may highlight the suitable transferable region of a...
详细信息
This paper introduces a novel local fine-grained visual tracking task, aiming to precisely locate arbitrary local parts of objects. This task is motivated by our observation that in many realistic scenarios, the user ...
详细信息
Text perception is crucial for understanding the semantics of outdoor scenes,making it a key requirement for building intelligent systems for driver assistance or autonomous *** information in car-mounted videos can a...
详细信息
Text perception is crucial for understanding the semantics of outdoor scenes,making it a key requirement for building intelligent systems for driver assistance or autonomous *** information in car-mounted videos can assist drivers in making ***,Car-mounted video text images pose challenges such as complex backgrounds,small fonts,and the need for real-time *** proposed a robust Car-mounted Video Text Detector(CVTD).It is a lightweight text detection model based on ResNet18 for feature extraction,capable of detecting text in arbitrary *** model efficiently extracted global text positions through the Coordinate Attention Threshold Activation(CATA)and enhanced the representation capability through stacking two Feature Pyramid Enhancement Fusion Modules(FPEFM),strengthening feature representation,and integrating text local features and global position information,reinforcing the representation capability of the CVTD *** enhanced feature maps,when acted upon by Text Activation Maps(TAM),effectively distinguished text foreground from non-text ***,we collected and annotated a dataset containing 2200 images of Car-mounted Video Text(CVT)under various road conditions for training and evaluating our model’s *** further tested our model on four other challenging public natural scene text detection benchmark datasets,demonstrating its strong generalization ability and real-time detection *** model holds potential for practical applications in real-world scenarios.
Sentiment analysis in Chinese classical poetry has become a prominent topic in historical and cultural tracing,ancient literature research,***,the existing research on sentiment analysis is relatively *** does not eff...
详细信息
Sentiment analysis in Chinese classical poetry has become a prominent topic in historical and cultural tracing,ancient literature research,***,the existing research on sentiment analysis is relatively *** does not effectively solve the problems such as the weak feature extraction ability of poetry text,which leads to the low performance of the model on sentiment analysis for Chinese classical *** this research,we offer the SA-Model,a poetic sentiment analysis ***-Model firstly extracts text vector information and fuses it through Bidirectional encoder representation from transformers-Whole word masking-extension(BERT-wwmext)and Enhanced representation through knowledge integration(ERNIE)to enrich text vector information;Secondly,it incorporates numerous encoders to remove text features at multiple levels,thereby increasing text feature information,improving text semantics accuracy,and enhancing the model’s learning and generalization capabilities;finally,multi-feature fusion poetry sentiment analysis model is *** feasibility and accuracy of the model are validated through the ancient poetry sentiment *** with other baseline models,the experimental findings indicate that SA-Model may increase the accuracy of text semantics and hence improve the capability of poetry sentiment analysis.
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and ***,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial *** examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong ***,the security of AI models for the digital communication signals identification is the premise of its efficient and credible *** this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial *** we present more detailed adversarial indicators to evaluate attack and defense ***,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research.
Image captioning has gained increasing attention in recent *** characteristics found in input images play a crucial role in generating high-quality *** studies have used visual attention mechanisms to dynamically focu...
详细信息
Image captioning has gained increasing attention in recent *** characteristics found in input images play a crucial role in generating high-quality *** studies have used visual attention mechanisms to dynamically focus on localized regions of the input image,improving the effectiveness of identifying relevant image regions at each step of caption ***,providing image captioning models with the capability of selecting the most relevant visual features from the input image and attending to them can significantly improve the utilization of these ***,this leads to enhanced captioning network *** light of this,we present an image captioning framework that efficiently exploits the extracted representations of the *** framework comprises three key components:the Visual Feature Detector module(VFD),the Visual Feature Visual Attention module(VFVA),and the language *** VFD module is responsible for detecting a subset of the most pertinent features from the local visual features,creating an updated visual features ***,the VFVA directs its attention to the visual features matrix generated by the VFD,resulting in an updated context vector employed by the language model to generate an informative *** the VFD and VFVA modules introduces an additional layer of processing for the visual features,thereby contributing to enhancing the image captioning model’s *** the MS-COCO dataset,our experiments show that the proposed framework competes well with state-of-the-art methods,effectively leveraging visual representations to improve *** implementation code can be found here:https://***/althobhani/VFDICM(accessed on 30 July 2024).
暂无评论