computer vision methods for depth estimation usually use simple camera models with idealized optics. For modern machine learning approaches, this creates an issue when attempting to train deep networks with simulated ...
详细信息
computer vision methods for depth estimation usually use simple camera models with idealized optics. For modern machine learning approaches, this creates an issue when attempting to train deep networks with simulated data, especially for focus-sensitive tasks like Depth-from-Focus. In this work, we investigate the domain gap caused by off-axis aberrations that will affect the decision of the best-focused frame in a focal stack. We then explore bridging this domain gap through aberration-aware training (AAT). Our approach involves a lightweight network that models lens aberrations at different positions and focus distances, which is then integrated into the conventional network training pipeline. We evaluate the generality of network models on both synthetic and real-world data. The experimental results demonstrate that the proposed AAT scheme can improve depth estimation accuracy without fine-tuning the model for different datasets. The code will be available in ***/vccimaging/Aberration-Aware-Depth-from-Focus. Author
Images captured under severe weather conditions, such as haze and fog, suffer from image quality degradation caused by atmospheric particle diffusion. This degradation manifests as color fading, reduced contrast, and ...
详细信息
Payment channels are auspicious candidates in layer-2 solutions to reduce the number of on-chain transactions on traditional blockchains and increase transaction throughput. To construct payment channels, peers lock f...
详细信息
Apricot detection is a prerequisite for counting and harvesting tasks. Existing algorithms face challenges in adapting to the impacts of complex environmental factors such as lighting variations, shadows, dense foliag...
详细信息
Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse *** exploration,the agent tries to discover unexplored(novel)ar...
详细信息
Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse *** exploration,the agent tries to discover unexplored(novel)areas or high reward(quality)*** existing methods perform exploration by only utilizing the novelty of *** novelty and quality in the neighboring area of the current state have not been well utilized to simultaneously guide the agent’s *** address this problem,this paper proposes a novel RL framework,called clustered reinforcement learning(CRL),for efficient exploration in *** adopts clustering to divide the collected states into several clusters,based on which a bonus reward reflecting both novelty and quality in the neighboring area(cluster)of the current state is given to the *** leverages these bonus rewards to guide the agent to perform efficient ***,CRL can be combined with existing exploration strategies to improve their performance,as the bonus rewards employed by these existing exploration strategies solely capture the novelty of *** on four continuous control tasks and six hard-exploration Atari-2600 games show that our method can outperform other state-of-the-art methods to achieve the best performance.
As one of the essential steps to secure government data sharing,Identity Authentication(IA)plays a vital role in the processing of large ***,the centralized IA scheme based on a trusted third party presents problems o...
详细信息
As one of the essential steps to secure government data sharing,Identity Authentication(IA)plays a vital role in the processing of large ***,the centralized IA scheme based on a trusted third party presents problems of information leakage and single point of failure,and those related to key ***,herein,an effective IA model based on multiattribute centers is ***,a private key of each attribute of a data requester is generated by the attribute authorization *** obtaining the private key of attribute,the data requester generates a personal private ***,a dynamic key generation algorithm is proposed,which combines blockchain and smart contracts to periodically update the key of a data requester to prevent theft by external attackers,ensure the traceability of IA,and reduce the risk of privacy ***,the combination of blockchain and interplanetary file systems is used to store attribute field information of the data requester to further reduce the cost of blockchain information storage and improve the effectiveness of information *** results show that the proposed model ensures the privacy and security of identity information and outperforms similar authentication models in terms of computational and communication costs.
Effective resource allocation can exploit the advantage of intelligent reflective surface(IRS)assisted mobile edge computing(MEC)***,it is challenging to balance the limited energy of MTs and the strict delay requirem...
详细信息
Effective resource allocation can exploit the advantage of intelligent reflective surface(IRS)assisted mobile edge computing(MEC)***,it is challenging to balance the limited energy of MTs and the strict delay requirement of their *** this paper,in order to tackle the challenge,we jointly optimize the offloading delay and energy consumption of mobile terminals(MTs)to realize the delay-energy tradeoff in an IRS-assisted MEC network,in which non-orthogonal multiple access(NOMA)and multiantenna are applied to improve spectral *** achieve the optimal delay-energy tradeoff,an offloading cost minimization model is proposed,in which the edge computing resource allocation,signal detecting vector,uplink transmission power,and IRS phase shift coefficient are needed to be jointly *** optimization of the model is a multi-level fractional problem in complex fields with some coupled high dimension *** solve the intractable problem,we decouple the original problem into a computing subproblem and a wireless transmission subproblem based on the uncoupled relationship between different variable *** computing subproblem is proved convex and the closed-form solution is obtained for the edge computing resource ***,the wireless transmission subproblem is solved iteratively through decoupling the residual *** each iteration,the closed-form solution of residual variables is obtained through different successive convex approximation(SCA)*** verify the proposed algorithm can converge to an optimum with polynomial *** results indicate the proposed method achieves average saved costs of 65.64%,11.24%,and 9.49%over three benchmark methods respectively.
Breast cancer poses a significant global threat, highlighting the urgent need for early detection to reduce mortality rates. Researchers are working to minimize the occurrence of false positives and false negatives, t...
详细信息
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encrypt...
详细信息
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encryption and decryption algorithms are being *** cloud computation,data processing,storage,and transmission can be done through laptops andmobile *** Storing in cloud facilities is expanding each day and data is the most significant asset of *** important concern with the transmission of information to the cloud is security because there is no perceivability of the client’s *** have to be dependent on cloud service providers for assurance of the platform’s *** security and privacy issues reduce the progression of cloud computing and add ***;most of the data that is stored on cloud servers is in the form of images and photographs,which is a very confidential form of data that requires secured *** this research work,a public key cryptosystem is being implemented to store,retrieve and transmit information in cloud computation through a modified Rivest-Shamir-Adleman(RSA)algorithm for the encryption and decryption of *** implementation of a modified RSA algorithm results guaranteed the security of data in the cloud *** enhance the user data security level,a neural network is used for user authentication and ***;the proposed technique develops the performance of detection as a loss function of the bounding *** Faster Region-Based Convolutional Neural Network(Faster R-CNN)gets trained on images to identify authorized users with an accuracy of 99.9%on training.
Vehicular crowdsensing has recently received considerable attention, due to its promising capability of collecting useful information for the Internet of Vehicles. However, existing researches in crowdsensing mainly f...
详细信息
暂无评论