Emotion recognition is a critical component of affective computing. Training accurate machine learning models for emotion recognition typically requires a large amount of labeled data. Due to the subtleness and comple...
详细信息
We propose BokehMe, a hybrid bokeh rendering framework that marries a neural renderer with a classical physically motivated renderer. Given a single image and a potentially imperfect disparity map, BokehMe generates h...
详细信息
Reversible solid oxide cells (rSOC) can operate in both electrolysis mode and in fuel cell mode with high efficiency and reduced cost using the same device for both functions. When used in dynamic operation with inter...
Reversible solid oxide cells (rSOC) can operate in both electrolysis mode and in fuel cell mode with high efficiency and reduced cost using the same device for both functions. When used in dynamic operation with intermittent electrical power sources, rSOC system switches from the fuel cell (SOFC) to electrolyzer (SOEC) and vice versa depending on load and grid peculiarities. This can lead to temperature profiles within the stack that can potentially lead to the failure of the stack and eventually the system. In the present work, a system-level dynamic model of rSOC is established and validated against experimental data. Subsequently, detailed dynamic thermal behavior of stack during the switching between the two modes is analyzed, and a temperature management controller based on Model Predict control method (MPC) is proposed. Gas flow and temperature at the stack inlet are controlled by air flow and bypass valves, avoiding problems associated with temperature overshoot during transient operation. The simulation results show that the temperature controller has the ability to follow fast thermal changes while maintaining thermal safety, which indicates the competitiveness of the controller.
A distinctive data hiding method based on Jigsaw Sudoku is proposed in this *** from other methods,the proposed method is based on Jigsaw Sudoku which is a kind of irregularly shaped *** to the novelty of Jigsaw Sudok...
详细信息
ISBN:
(纸本)9781510871076
A distinctive data hiding method based on Jigsaw Sudoku is proposed in this *** from other methods,the proposed method is based on Jigsaw Sudoku which is a kind of irregularly shaped *** to the novelty of Jigsaw Sudoku,the proposed method can provide a safer scheme for data hiding than that with pure *** proposed method can hide a certain number of 9-ary numbers in a steganographic image which has a corresponding *** a 256*256 key matrix stretched from a size 9*9 Jigsaw Sudoku,secret message can be hidden in a vector image byte by byte in the form of *** results show that,the proposed method has a better peaksignal-to-noise-ratio(PSNR) compared with some other data hiding methods.
This paper investigates the area coverage problem for multiple Unmanned Surface Vehicles (USVs) in dynamic environments. Multiple USVs are employed to execute the coverage task using the Voronoi Partition method for t...
This paper investigates the area coverage problem for multiple Unmanned Surface Vehicles (USVs) in dynamic environments. Multiple USVs are employed to execute the coverage task using the Voronoi Partition method for task allocation. Parameter adaptive laws are employed to estimate the parameters of the sensing function and the Voronoi cell centroids for updating the target positions in dynamic environments. Additionally, considering the influence of water surface disturbances, a nonholonomic underactuated model analysis is conducted for the USV under non-full constraints, resulting in a motion strategy for USVs. This enables the multiple USVs to effectively cover the task area. Finally, simulation results are presented to validate the effectiveness of the coverage scheme designed in this paper and the ability of USVs to effectively cover dynamic environments.
To address the weak observability of monocular visual–inertial odometers on ground-based mobile robots, this paper proposes a monocular inertial SLAM algorithm combined with wheel speed anomaly detection. The algorit...
详细信息
In this paper,our proposed scheme using two steganography *** other data hiding schemes,this scheme studies the characteristics of the Tangram puzzle model and the secret message bytes that make up the eight binary bi...
详细信息
ISBN:
(纸本)9781510871076
In this paper,our proposed scheme using two steganography *** other data hiding schemes,this scheme studies the characteristics of the Tangram puzzle model and the secret message bytes that make up the eight binary bits that are hidden into the two *** matrix M *,horizontal and vertical coordinate range from 0 to 255,and the pixel pairs in the cover image are used to help hide the secret message bytes in our *** paired pixel points into single and double number hidden in two *** show that the program can hide relatively more pixels in a cover image with less losing image quality.
Learning-based multi-view stereo (MVS) method heavily relies on feature matching, which requires distinctive and descriptive representations. An effective solution is to apply non-local feature aggregation, e.g., Tran...
详细信息
Automatic image cropping models predict reframing boxes to enhance image aesthetics. Yet, the scarcity of labeled data hinders the progress of this task. To overcome this limitation, we explore the possibility of util...
详细信息
The goal of this work is to develop a task-agnostic feature upsampling operator for dense prediction where the operator is required to facilitate not only region-sensitive tasks like semantic segmentation but also det...
详细信息
暂无评论