Augmented reality (AR) technology is a cutting technology. It can enhance the perception of reality and provide more information of the real world. AR technology is used in many fields, like medical, industry, and edu...
详细信息
As one of the core mission of computer vision, object detection has been widely applied with the rapid development of computer technology, especially in the fields of face detection, behavior detection, auto driving, ...
详细信息
The goal of multilingual modelling is to generate multilingual text representations for various downstream tasks in different languages. However, some state-of-the-art pre-trained multilingual models perform poorly on...
详细信息
Adaptive Kriging model has gained growing attention for its effectiveness in reducing the computational costs in time-dependent reliability analysis (TRA). However, the existing methods struggle to identify critical s...
详细信息
Adaptive Kriging model has gained growing attention for its effectiveness in reducing the computational costs in time-dependent reliability analysis (TRA). However, the existing methods struggle to identify critical sample regions, leverage parallel computational resources, and assess the value for sample trajectories, thus restricting improvement in accuracy and efficiency. To address the challenges, this study proposes a time series clustering adaptive enhanced method (TSCM). TSCM first employs the time series clustering technique to partition the sample region efficiently. A novel time-dependent Kriging occurrence learning function is then introduced to account for both the uncertainty of sample trajectories and its influence on the approximated limit state boundary. Subsequently, an adaptive sampling strategy is developed to select training samples in parallel, guided by an uncertainty-based assessment of sample regions. After that, a time-dependent error-based stopping criterion is introduced to determine the training stage and terminate the update process. Finally, TSCM is extended to time-dependent reliability-based design optimization problems. Several numerical examples and an engineering case study demonstrate the superior computational efficiency and accuracy of the proposed method.
This paper presents a stratified image hiding scheme based on chaotic algorithm. In the pretreatment process chaotic sequences are used to encrypt the secret image. The histogram of the processed image is similar to t...
详细信息
This paper presents a stratified image hiding scheme based on chaotic algorithm. In the pretreatment process chaotic sequences are used to encrypt the secret image. The histogram of the processed image is similar to that of white noise. A stratified secret data embedding thought is adopted in the embedding process. As the experimental results show, this algorithm has relatively large embedding capacity, good invisibility and robustness.
DNA computing theories can be applied in cryptography and it is a very hopeful direction. Though still in primitive level, it applies in many fields and solved some hard problems successfully. The art of cryptography ...
详细信息
DNA computing theories can be applied in cryptography and it is a very hopeful direction. Though still in primitive level, it applies in many fields and solved some hard problems successfully. The art of cryptography security is to make anybody can not read it by encoding message. This paper use a new way to show how cryptography works with DNA computing, it can transmit message securely and effectively. The RSA algorithm belongs to asymmetric key cryptography, it is used in this paper connecting with DNA computing technique to encrypt message.
Chaos has been attracted much attention in current research of image encryption. In this paper, we change the location of pixels and pixel values through the combination of chaos with DNA coding. First of all, we tran...
详细信息
Chaos has been attracted much attention in current research of image encryption. In this paper, we change the location of pixels and pixel values through the combination of chaos with DNA coding. First of all, we transform the digital image into DNA coding matrix based on DNA code rules. Secondly, we divided this matrix into four sub matrixes, and disorder these sub matrixes through logistic chaotic sequence. Then, we scramble the sub matrixes by adding new logistic chaotic sequences and get the new sub matrixes. Finally, we join all scrambled DNA sub-matrixes in a DNA sequence and decode the scramble DNA matrix to image matrix. The experiment results demonstrate that the proposed scheme is effective, and it has wide secret key space, strong sensibility, high security and good ability of resisting statistic attack.
Traditional image emotion recognition focuses only on the emotion information embedded in the subject or part of the image, while ignoring the global emotion information. In this paper, we propose a new network based ...
详细信息
Automated speaker verification systems face a higher risk of replay attacks in practice. However, the existing studies face the problem of limited detection capabilities and insufficient use of shallow fine-grained in...
详细信息
ISBN:
(数字)9798350376548
ISBN:
(纸本)9798350376555
Automated speaker verification systems face a higher risk of replay attacks in practice. However, the existing studies face the problem of limited detection capabilities and insufficient use of shallow fine-grained information. To address these issues, we propose the cross-stage mutual distillation(CS-MD) framework, which involves two models learning from a deep network output of each other in different stages of training. This mutual learning approach enhances the ability of shallow networks to capture fine-grained speech information. Additionally, we use an attentional feature fusion module to integrate shallow information more effectively. The multi-scale attention mechanisms in this module can combine local and global speech features while preserving detailed information. Experimental results on the ASVspoof 2019 physical access dataset demonstrate that our proposed method outperforms state-of-the-art methods in terms of EER and min t-DCF metrics, validating the effectiveness of our CS-MD framework.
With the rapid development of DNA computing, people began to use DNA technology to encrypt information. In this paper, we combine the biological characteristics of DNA and the improved sequence of Logistic mapping met...
详细信息
With the rapid development of DNA computing, people began to use DNA technology to encrypt information. In this paper, we combine the biological characteristics of DNA and the improved sequence of Logistic mapping method, encrypt the image. The biological characteristics of DNA can better scramble image pixel, and the improved sequence can better change the pixel values. The encryption effect of this paper is better than traditional encryption, and the correlation of adjacent pixels is very low.
暂无评论