Visual informatics is a field of interest not just among the information technology and computerscience community, but also other related fields such as engineering, me- cal and health informatics and education start...
详细信息
ISBN:
(数字)9783642050367
ISBN:
(纸本)9783642050350
Visual informatics is a field of interest not just among the information technology and computerscience community, but also other related fields such as engineering, me- cal and health informatics and education starting in the early 1990s. Recently, the field is gaining more attention from researchers and industry. It has become a mul- disciplinary and trans-disciplinary field related to research areas such as computer vision, visualization, information visualization, real-time image processing, medical image processing, image information retrieval, virtual reality, augmented reality, - pressive visual mathematics, 3D graphics, multimedia-fusion, visual data mining, visual ontology, as well as services and visual culture. Various efforts has been - vested in different research, but operationally, many of these systems are not pro- nent in the mass market and thus knowledge and research on these phenomena within the mentioned areas need to be shared and disseminated. It is for this reason that the Visual Informatics Research Group from Universiti - bangsaan Malaysia (UKM) decided to spearhead this initiative to bring together experts in this very diversified but important research area so that more concerted efforts can be undertaken not just within the visual informatics community in Malaysia but from other parts of the world, namely, Asia, Europe, Oceania, and USA. This first International Visual Informatics Conference (IVIC 2009) was conducted collaboratively, by the visual informatics research community from the various public and private institutions of higher learning in Malaysia, and hosted by UKM.
Mural image inpainting is far less explored compared to its natural image counterpart and remains largely unsolved. Most existing image-inpainting methods tend to take the target image as the only input and directly r...
详细信息
Mural image inpainting is far less explored compared to its natural image counterpart and remains largely unsolved. Most existing image-inpainting methods tend to take the target image as the only input and directly repair the damage to generate a visually plausible result. These methods obtain high performance in restoration or completion of some pre-defined objects, e.g., human face, fabric texture, and printed texts, etc., however, are not suitable for repairing murals with varying subjects and large damaged areas. Moreover, due to discrete colors in paints, mural inpainting may suffer from apparent color bias. To this end, in this paper, we propose a line drawing guided progressive mural inpainting method. It divides the inpainting process into two steps: structure reconstruction and color correction, implemented by a structure reconstruction network (SRN) and a color correction network (CCN), respectively. In structure reconstruction, SRN utilizes the line drawing as an assistant to achieve large-scale content authenticity and structural stability. In color correction, CCN operates a local color adjustment for missing pixels which reduces the negative effects of color bias and edge jumping. The proposed approach is evaluated against the current state-of-the-art image inpainting methods. Qualitative and quantitative results demonstrate the superiority of the proposed method in mural image inpainting. The codes and data are available at https://***/qinnzou/mural-image-inpainting.
These two volumes consIstmg of Foundations and Applications provide the current status of theoretical and empirical developments in "computing with words". In philosophy, the twentieth century is said to be ...
详细信息
ISBN:
(数字)9783790818734
ISBN:
(纸本)9783790812176;9783662113622
These two volumes consIstmg of Foundations and Applications provide the current status of theoretical and empirical developments in "computing with words". In philosophy, the twentieth century is said to be the century of language. This is mainly due to Wittgenstein who said: "The meaning of a word is its use in the language game". "The concept game is a concept with blurred edges". In the first phrase, "the language game" implies the everyday human activity with language, and in the latter, "game" simply implies an ordinary word. Thus, Wittgenstein precisely stated that a word is fuzzy in real life. Unfortunately this idea about a word was not accepted in the conventional science. We had to wait for Zadeh's fuzzy sets theory. Remembering Wittgenstein's statement, we should consider, on the one hand, the concept of "computing with words" from a philosophical point of view. It deeply relates to the everyday use of a word in which the meaning of a word is fuzzy in its nature.
The rapid advancements in big data and the Internet of Things (IoT) have significantly accelerated the digital transformation of medical institutions, leading to the widespread adoption of Digital Twin Healthcare (DTH...
详细信息
The rapid advancements in big data and the Internet of Things (IoT) have significantly accelerated the digital transformation of medical institutions, leading to the widespread adoption of Digital Twin Healthcare (DTH). The Cloud DTH Platform (CDTH) serves as a cloud-based framework that integrates DTH models, healthcare resources, patient data, and medical services. By leveraging real-time data from medical devices, the CDTH platform enables intelligent healthcare services such as disease prediction and medical resource optimization. However, the platform functions as a system of systems (SoS), comprising interconnected yet independent healthcare services. This complexity is further compounded by the integration of both black-box AI models and domain-specific mechanistic models, which pose challenges in ensuring the interpretability and trustworthiness of DTH models. To address these challenges, we propose a Model-Based Systems engineering (MBSE)-driven DTH modeling methodology derived from systematic requirement and functional analyses. To implement this methodology effectively, we introduce a DTH model development approach using the X language, along with a comprehensive toolchain designed to streamline the development process. Together, this methodology and toolchain form a robust framework that enables engineers to efficiently develop interpretable and trustworthy DTH models for the CDTH platform. By integrating domain-specific mechanistic models with AI algorithms, the framework enhances model transparency and reliability. Finally, we validate our approach through a case study involving elderly patient care, demonstrating its effectiveness in supporting the development of DTH models that meet healthcare and interpretability requirements.
As an advanced carrier of on-board sensors, connected autonomous vehicle (CAV) can be viewed as an aggregation of self-adaptive systems with monitor-analyze-plan-execute (MAPE) for vehicle-related services. Meanwhile,...
详细信息
As an advanced carrier of on-board sensors, connected autonomous vehicle (CAV) can be viewed as an aggregation of self-adaptive systems with monitor-analyze-plan-execute (MAPE) for vehicle-related services. Meanwhile, machine learning (ML) has been applied to enhance analysis and plan functions of MAPE so that self-adaptive systems have optimal adaption to changing conditions. However, most of ML-based approaches don’t utilize CAVs’ connectivity to collaboratively generate an optimal learner for MAPE, because of sensor data threatened by gradient leakage attack (GLA). In this article, we first design an intelligent architecture for MAPE-based self-adaptive systems on Web 3.0-based CAVs, in which a collaborative machine learner supports the capabilities of managing systems. Then, we observe by practical experiments that importance sampling of sparse vector technique (SVT) approaches cannot defend GLA well. Next, we propose a fine-grained SVT approach to secure the learner in MAPE-based self-adaptive systems, that uses layer and gradient sampling to select uniform and important gradients. At last, extensive experiments show that our private learner spends a slight utility cost for MAPE (e.g., \(0.77\%\) decrease in accuracy) defending GLA and outperforms the typical SVT approaches in terms of defense (increased by \(10\%\sim 14\%\) attack success rate) and utility (decreased by \(1.29\%\) accuracy loss).
暂无评论