As a vital technology in the field of image processing, numerous visible and infrared fusion methods have emerged with the aim of generating a single image containing salient targets and abundant details. However, owi...
详细信息
ISBN:
(数字)9798350349399
ISBN:
(纸本)9798350349405
As a vital technology in the field of image processing, numerous visible and infrared fusion methods have emerged with the aim of generating a single image containing salient targets and abundant details. However, owing to the influence of target motion or camera shake, source images may suffer from motion blur, resulting in blurred edges and unrecognizable objects. To address this issue, this paper bridges the gap between deblurring and fusion tasks and proposes a joint motion deblurring and fusion network for visible and infrared image (MDbFusion). On the one hand, we innovatively merge motion deblurring task into network design, which effectively ensures the capacity of MDbFusion to process images in the extreme condition. On the other hand, an Adaptive Weight Module (AWM) is designed to calculate contribution between visible and infrared features, which solves the channel contrast between two tasks, greatly reducing the complexity of network. Extensive experiments demonstrate that the MDb-Fusion outperforms state-of-the-art (SOTA) fusion algorithms in terms of preserving texture details and quantitative metrics. Furthermore, we also compare with a two-step fusion strategy that first deblurring then fusion, both with SOTA methods. The results reveal superiority of our framework in coupling and reciprocity between two tasks.
Parallel Manufacturing is a new manufacturing paradigm in industry, deeply integrating informalization, automation, and artificial intelligence. In this paper we propose a new mechanical design paradigm in Parallel Ma...
详细信息
X-ray security check is a prevalent placement measure that plays a vital role in ensuring public safety. However, detecting prohibited items poses a complex challenge due to their variable sizes within X-ray images. I...
详细信息
ISBN:
(数字)9798350376548
ISBN:
(纸本)9798350376555
X-ray security check is a prevalent placement measure that plays a vital role in ensuring public safety. However, detecting prohibited items poses a complex challenge due to their variable sizes within X-ray images. In this study, we tackle this issue by curating a novel dataset through the integration of open-source data and introducing a Multiscale Feature Fusion Module. This module facilitates robust detection by amalgamating features across different scales. Extensive experiments verified that the superiority of our method compared to existing methods on the prohibited items test set constructed in this paper demonstrates extremely well the practical effectiveness of our proposed method.
This paper studies the mobile robots with multiple constraints based on path planning of A-star algorithm. A hierarchical adaptive control method is presented to handle multiple constaints. On the upper layer, a Astar...
详细信息
How to realize the high power factor, high efficiency, miniaturization and high power density of AC-DC converter is the key problem of battery charging applications. In this paper, an isolated AC-DC converter is propo...
详细信息
This paper introduces a novel algorithm for recognizing speech emotions, utilizing an enhanced version of the ShuffleNet V2 network. Previous studies typically analyze speech signals solely from the time or frequency ...
详细信息
Intersections are quite important and complex traffic scenarios, where the future motion of surrounding vehicles is an indispensable reference factor for the decision-making or path planning of autonomous vehicles. Co...
详细信息
Intersections are quite important and complex traffic scenarios, where the future motion of surrounding vehicles is an indispensable reference factor for the decision-making or path planning of autonomous vehicles. Considering that the motion trajectory of a vehicle at an intersection partly obeys the statistical law of historical data once its driving intention is determined, this paper proposes a long short-term memory based (LSTM-based) framework that combines intention prediction and trajectory prediction together. First, we build an intersection prior trajectories model (IPTM) by clustering and statistically analyzing a large number of prior traffic flow trajectories. The prior trajectories model with fitted probabilistic density is used to approximate the distribution of the predicted trajectory, and also serves as a reference for credibility evaluation. Second, we conduct the intention prediction through another LSTM model and regard it as a crucial cue for a trajectory forecast at the early stage. Furthermore, the predicted intention is also a key that is associated with the prior trajectories model. The proposed framework is validated on two publically released datasets, next generation simulation (NGSIM) and INTERACTION. Compared with other prediction methods, our framework is able to sample a trajectory from the estimated distribution, with its accuracy improved by about 20%. Finally, the credibility evaluation, which is based on the prior trajectories model, makes the framework more practical in the real-world applications.
This paper investigates the consensus tracking problem of leader-follower multi-agent systems. Different from most existing works, dynamics of all the agents are assumed completely unknown, whereas some input-output d...
This paper investigates the consensus tracking problem of leader-follower multi-agent systems. Different from most existing works, dynamics of all the agents are assumed completely unknown, whereas some input-output data about the agents are available. It is well known from the Willems et al. Fundamental Lemma that when inputs of a linear time-invariant (LTI) system are persistently exciting, all possible trajectories of the system can be represented in terms of a finite set of measured input-output data. Building on this idea, the present paper proposes a purely data-driven distributed consensus control policy which allows all the follower agents to track the leader agent’s trajectory. It is shown that for a linear discrete-time multi-agent system, the corresponding controller can be designed to ensure the global synchronization with local data. Even if the data are corrupted by noises, the proposed approach is still applicable under certain conditions. Numerical examples corroborate the practical merits of the theoretical results.
暂无评论