This paper proposes a novel attention model for semantic segmentation, which aggregates multi-scale and context features to refine prediction. Specifically, the skeleton convolutional neural network framework takes in...
详细信息
Numerical P systems(for short, NP systems) are distributed and parallel computing models inspired from the structure of living cells and economics. Enzymatic numerical P systems(for short, ENP systems) are a variant o...
详细信息
Numerical P systems(for short, NP systems) are distributed and parallel computing models inspired from the structure of living cells and economics. Enzymatic numerical P systems(for short, ENP systems) are a variant of NP systems, which have been successfully applied in designing and implementing controllers for mobile robots. Since ENP systems were proved to be Turing universal, there has been much work to simplify the universal systems, where the complexity parameters considered are the number of membranes, the degrees of polynomial production functions or the number of variables used in the *** the number of enzymatic variables, which is essential for ENP systems to reach universality, has not been investigated. Here we consider the problem of searching for the smallest number of enzymatic variables needed for universal ENP systems. We prove that for ENP systems as number acceptors working in the all-parallel or one-parallel mode, one enzymatic variable is sufficient to reach universality; while for the one-parallel ENP systems as number generators, two enzymatic variables are sufficient to reach *** results improve the best known results that the numbers of enzymatic variables are 13 and 52 for the all-parallel and one-parallel systems, respectively.
A distinctive data hiding method based on Jigsaw Sudoku is proposed in this *** from other methods,the proposed method is based on Jigsaw Sudoku which is a kind of irregularly shaped *** to the novelty of Jigsaw Sudok...
详细信息
ISBN:
(纸本)9781510871076
A distinctive data hiding method based on Jigsaw Sudoku is proposed in this *** from other methods,the proposed method is based on Jigsaw Sudoku which is a kind of irregularly shaped *** to the novelty of Jigsaw Sudoku,the proposed method can provide a safer scheme for data hiding than that with pure *** proposed method can hide a certain number of 9-ary numbers in a steganographic image which has a corresponding *** a 256*256 key matrix stretched from a size 9*9 Jigsaw Sudoku,secret message can be hidden in a vector image byte by byte in the form of *** results show that,the proposed method has a better peaksignal-to-noise-ratio(PSNR) compared with some other data hiding methods.
In this paper,our proposed scheme using two steganography *** other data hiding schemes,this scheme studies the characteristics of the Tangram puzzle model and the secret message bytes that make up the eight binary bi...
详细信息
ISBN:
(纸本)9781510871076
In this paper,our proposed scheme using two steganography *** other data hiding schemes,this scheme studies the characteristics of the Tangram puzzle model and the secret message bytes that make up the eight binary bits that are hidden into the two *** matrix M *,horizontal and vertical coordinate range from 0 to 255,and the pixel pairs in the cover image are used to help hide the secret message bytes in our *** paired pixel points into single and double number hidden in two *** show that the program can hide relatively more pixels in a cover image with less losing image quality.
Multi-view learning improves the learning performance by utilizing multi-view data: data collected from multiple sources, or feature sets extracted from the same data source. This approach is suitable for primate brai...
详细信息
作者:
Wang X.Su H.Cai Y.Department of Automation
Shanghai Jiaotong University Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai 200240 China School of Automation
Image Processing and Intelligent Control Key Laboratory of Education Ministry of China Huazhong University of Science and Technology Luoyu Road 1037 Wuhan 430074 China
This paper focuses on the robust semi-global coordinated tracking of general linear systems subject to input saturation together with input additive disturbance and dead zone. A fully distributed algorithm which relat...
详细信息
With the rapid development of computation and communication technologies, the traditional vehicle ad hoc networks (VANETs) are changing to Internet of vehicle (IoV). Vehicular announcement networks in IoV have been wi...
详细信息
ISBN:
(数字)9781728143286
ISBN:
(纸本)9781728143293
With the rapid development of computation and communication technologies, the traditional vehicle ad hoc networks (VANETs) are changing to Internet of vehicle (IoV). Vehicular announcement networks in IoV have been widely used in the communication of vehicles. Generally, we need to solve two problems while establishing a vehicular announcement system. First, we need to protect user's privacy when broadcasting the message. Second, participants usually lack the enthusiasm to reply to the announcement. To solve these two problems, we propose a novel blockchain-based incentive announcement system that not only allows participants to anonymously announce their message on the blockchain in a non-trusted environment, but also motivates witnesses to respond to the request of the traffic information with incentive mechanism. Meanwhile, traffic messages and signatures in our system are tamper-resistant, which are recorded on the blockchain. According to the security and performance analysis, it shows that our system is privacy-preserving and efficient in computation cost.
In this paper, the H∞ consensus of fractional-order multi-agent systems with directed communication graph is investigated. It's the first time to introduce the H∞ control to investigate the consensus problem of ...
详细信息
In this paper, the H∞ consensus of fractional-order multi-agent systems with directed communication graph is investigated. It's the first time to introduce the H∞ control to investigate the consensus problem of the fractional-order multi-agent systems. In view of Mittag-Leffler stability theory and fractional Lyapunov directed method, a sufficient condition is presented to guarantee all the agents reach consensus with the desired H∞ performance. Finally, the results are verified by several numerical simulations.
Regression problems are pervasive in real-world applications. Generally a substantial amount of labeled samples are needed to build a regression model with good generalization ability. However, many times it is relati...
详细信息
暂无评论