Neural network-based encoder and decoder are one of the emerging techniques for image compression. To improve the compression rate, these models use a special module called the quantizer that improves the entropy of t...
详细信息
The rapid growth of user-generated content, particularly app user reviews, presents a significant challenge in analyzing and extracting useful insights. The unstructured nature, inconsistent quality, and large volume ...
详细信息
This systematic literature review delves into the dynamic realm of graphical passwords, focusing on the myriad security attacks they face and the diverse countermeasures devised to mitigate these threats. The core obj...
详细信息
Dexterous robot manipulation has shone in complex industrial scenarios, where multiple manipulators, or fingers, cooperate to grasp and manipulate objects. When encountering multi-objective optimization with system co...
详细信息
Dexterous robot manipulation has shone in complex industrial scenarios, where multiple manipulators, or fingers, cooperate to grasp and manipulate objects. When encountering multi-objective optimization with system constraints in such scenarios, model predictive control(MPC) has demonstrated exceptional performance in complex multi-robot manipulation tasks involving multi-objective optimization with system constraints. However, in such scenarios, the substantial computational load required to solve the optimal control problem(OCP) at each triggering instant can lead to significant delays between state sampling and control application, hindering real-time performance. To address these challenges, this paper introduces a novel robust tube-based smooth MPC approach for two fundamental manipulation tasks: reaching a given target and tracking a reference trajectory. By predicting the successor state as the initial condition for imminent OCP solving, we can solve the forthcoming OCP ahead of time, alleviating delay effects. Additionally,we establish an upper bound for linearizing the original nonlinear system, reducing OCP complexity and enhancing response speed. Grounded in tube-based MPC theory, the recursive feasibility and closed-loop stability amidst constraints and disturbances are ensured. Empirical validation is provided through two numerical simulations and two real-world dexterous robot manipulation tasks, which shows that the seamless control input by our methods can effectively enhance the solving efficiency and control performance when compared to conventional time-triggered MPC strategies.
Interpretable visual recognition is essential for decision-making in high-stakes situations. Recent advancements have automated the construction of interpretable models by leveraging Visual Language Models (VLMs) and ...
详细信息
IIF(Indirect Immune Florescence)has gained much attention recently due to its importance in medical *** primary purpose of this work is to highlight a step-by-step methodology for detecting autoimmune *** use of IIF f...
详细信息
IIF(Indirect Immune Florescence)has gained much attention recently due to its importance in medical *** primary purpose of this work is to highlight a step-by-step methodology for detecting autoimmune *** use of IIF for detecting autoimmune diseases is widespread in different medical *** 80 different types of autoimmune diseases have existed in various body *** IIF has been used for image classification in both ways,manually and by using the computer-Aided Detection(CAD)*** data scientists conducted various research works using an automatic CAD system with low *** diseases in the human body can be detected with the help of Transfer Learning(TL),an advanced Convolutional Neural Network(CNN)*** baseline paper applied the manual classification to the MIVIA dataset of Human Epithelial cells(HEP)type II cells and the Sub Class Discriminant(SDA)analysis technique used to detect autoimmune *** technique yielded an accuracy of up to 90.03%,which was not reliable for detecting autoimmune disease in the mitotic cells of the *** the current research,the work has been performed on the MIVIA data set of HEP type II cells by using four well-known models of *** augmentation and normalization have been applied to the dataset to overcome the problem of overfitting and are also used to improve the performance of TL *** models are named Inception V3,Dens Net 121,VGG-16,and Mobile Net,and their performance can be calculated through parameters of the confusion matrix(accuracy,precision,recall,and F1 measures).The results show that the accuracy value of VGG-16 is 78.00%,Inception V3 is 92.00%,Dense Net 121 is 95.00%,and Mobile Net shows 88.00%accuracy,***,DenseNet-121 shows the highest performance with suitable analysis of autoimmune *** overall performance highlighted that TL is a suitable and enhanced technique compared to its ***,the proposed technique is used
Robotic arms have been widely used in industrial fields. However, researchers have seldom considered the factors affecting the actual factory environment. For example, when objects are conveyed in a factory, conveyor ...
详细信息
Iris biometrics allow contactless authentication, which makes it widely deployed human recognition mechanisms since the couple of years. Susceptibility of iris identification systems remains a challenging task due to ...
详细信息
The challenge of bankruptcy prediction, critical for averting financial sector losses, is amplified by the prevalence of imbalanced datasets, which often skew prediction models. Addressing this, our study introduces t...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
暂无评论