Minimizing Gaussian curvature of meshes is fundamentally important for obtaining smooth and developable surfaces. However, there is a lack of computationally efficient and robust Gaussian curvature optimization method...
详细信息
The encoder-decoder networks are commonly used in medical image segmentation due to their remarkable performance in hierarchical feature fusion. However, the expanding path for feature decoding and spatial recovery do...
详细信息
This paper introduces a multi-parameter distributed measurement control system based on CAN bus network and uses C8051F040 MCU as measurement control node, and corresponding hardware and software design to realize sim...
详细信息
A number of solutions have been proposed to tackle the user privacy-preserving issue. Most of existing schemes, however, focus on methodology and techniques from the perspective of data processing. In this paper, we p...
详细信息
A number of solutions have been proposed to tackle the user privacy-preserving issue. Most of existing schemes, however, focus on methodology and techniques from the perspective of data processing. In this paper, we propose a lightweight privacy-preserving scheme for user identity from the perspective of data user and applied cryptography. The basic idea is to break the association relationships between User identity and his behaviors and ensure that User can access data or services as usual while the real identity will not be revealed. To this end, an interactive zero-knowledge proof protocol of identity is executed between CSP and User. Besides, a trusted third-party is introduced to manage user information, help CSP to validate User identity and establish secure channel between CSP and User via random shared key. After passing identity validation, User can log into cloud platform as usual without changing existing business process using random temporary account and password generated by CSP and sent to User by the secure channel which can further obscure the association relationships between identity and behaviors. Formal security analysis and theoretic and experimental evaluations are conducted, showing that the proposal is efficient and practical.
Loop closure detection is a crucial module in simultaneous localization and mapping (SLAM), which reduces accumulative error in building environment map. Traditional appearance-based methods for loop closure detection...
详细信息
ISBN:
(数字)9781728137261
ISBN:
(纸本)9781728137278
Loop closure detection is a crucial module in simultaneous localization and mapping (SLAM), which reduces accumulative error in building environment map. Traditional appearance-based methods for loop closure detection are vulnerable to environmental variations as they mainly rely on hand-crafted features. The convolutional neural networks (ConvNets) can automatically learn feature representation from original image, and it is more robust to illumination changes. However, the ConvNets methods may fail when the viewpoint changes significantly due to it extract global features. In order to solve the problem mentioned above, in this paper, we design an unsupervised network which combines the advantage of the traditional and ConvNets methods, and propose a new module named spatial pyramid pooling based convolution autoencoder (SPP-CAE). We evaluate the performance of the proposed method on several open datasets using precision-recall metric. The results show that our method is feasible for detecting loops and is more robust than state-of-the-art methods.
In this paper, we examine a data-driven control approach to coordination of multi-vehicle systems based on the distributed neighbor selection. The core of the proposed approach is to utilize a recently developed metri...
详细信息
ISBN:
(纸本)9781538670255
In this paper, we examine a data-driven control approach to coordination of multi-vehicle systems based on the distributed neighbor selection. The core of the proposed approach is to utilize a recently developed metric called relative tempo for distributed coordination which is computable from local measurable data for each vehicle in the network. The relative tempo between each agent and its neighbors is shown to be closely related to the directed spanning tree of the underlying network in a quantitative manner. Based on this fact, a local neighbor selection protocol is subsequently provided to construct the global refined communication structure which can both maintain the connectivity and increase the efficiency of the multi-vehicle coordination. The numerical study is finally provided to demonstrate the effectiveness of our approach.
With the tremendous growth of mobile videos, mobile video communication is becoming increasingly important to influence users browsing and searching *** this paper, we present the approximate average symbol error prob...
详细信息
In this paper, a deep neural network model is proposed to predict industrial air pollution, such as PM2.5 and PM10. The deep neural network model contains 9 hidden layers, each layer contains 45 neurons. The output of...
详细信息
Now many applications of trajectory (location) data have facilitated people's daily life. However, publishing trajectory data may divulge individual sensitive information so as to influence people's normal lif...
详细信息
The structure uncertainty optimization problem is usually treated as double-loop optimization process, which is computation-intensive. In this paper, an efficient interval uncertainty optimization approach based on Qu...
详细信息
暂无评论