Pervasive Computing has become more personal with the widespread adoption of the Internet of Things(IoT)in our day-to-day *** emerging domain that encompasses devices,sensors,storage,and computing of personal use and ...
详细信息
Pervasive Computing has become more personal with the widespread adoption of the Internet of Things(IoT)in our day-to-day *** emerging domain that encompasses devices,sensors,storage,and computing of personal use and surroundings leads to Personal IoT(PIoT).PIoT offers users high levels of personalization,automation,and *** proliferation of PIoT technology has extended into society,social engagement,and the interconnectivity of PIoT objects,resulting in the emergence of the Social Internet of Things(SIoT).The combination of PIoT and SIoT has spurred the need for autonomous learning,comprehension,and understanding of both the physical and social *** research on PIoT is dedicated to enabling seamless communication among devices,striking a balance between observation,sensing,and perceiving the extended physical and social environment,and facilitating information ***,the virtualization of independent learning from the social environment has given rise to Artificial Social Intelligence(ASI)in PIoT ***,autonomous data communication between different nodes within a social setup presents various resource management challenges that require careful *** paper provides a comprehensive review of the evolving domains of PIoT,SIoT,and ***,the paper offers insightful modeling and a case study exploring the role of PIoT in post-COVID *** study contributes to a deeper understanding of the intricacies of PIoT and its various dimensions,paving the way for further advancements in this transformative field.
We rethink the segment anything model(SAM) and propose a novel multiprompt network called COMPrompter for camouflaged object detection(COD). SAM has zero-shot generalization ability beyond other models and can provide...
详细信息
We rethink the segment anything model(SAM) and propose a novel multiprompt network called COMPrompter for camouflaged object detection(COD). SAM has zero-shot generalization ability beyond other models and can provide an ideal framework for COD. Our network aims to enhance the single prompt strategy in SAM to a multiprompt strategy. To achieve this, we propose an edge gradient extraction module, which generates a mask containing gradient information regarding the boundaries of camouflaged objects. This gradient mask is then used as a novel boundary prompt, enhancing the segmentation process. Thereafter, we design a box-boundary mutual guidance module, which fosters more precise and comprehensive feature extraction via mutual guidance between a boundary prompt and a box prompt. This collaboration enhances the model's ability to accurately detect camouflaged objects. Moreover, we employ the discrete wavelet transform to extract high-frequency features from image embeddings. The high-frequency features serve as a supplementary component to the multiprompt ***, our COMPrompter guides the network to achieve enhanced segmentation results, thereby advancing the development of SAM in terms of COD. Experimental results across COD benchmarks demonstrate that COMPrompter achieves a cutting-edge performance, surpassing the current leading model by an average positive metric of 2.2% in COD10K. In the specific application of COD, the experimental results in polyp segmentation show that our model is superior to top-tier methods as well. The code will be made available at https://***/guobaoxiao/COMPrompter.
In today's digital era, the use of data is becoming more day by day. Data is serving as a main source for all the applications we rely on. As the volume of data rapidly increases, the need for security also increa...
详细信息
A progressive neurodegenerative ailment called Parkinson's disease (PD) is marked by the death of dopamine-producing cells in the substantia nigra area of the brain. The exact etiology of PD remains elusive, but i...
详细信息
By integrating smart grid technology with home energy management systems, households can monitor and optimise their energy consumption. This allows for more efficient use of energy resources, reducing waste and loweri...
详细信息
Identical video sharing across social networks results in redundant video data traffic, consuming additional bandwidth, storage resources, and data usage. A novel method is proposed to optimise redundant video-sharing...
详细信息
Convolutional neural networks (ConvNets) have become increasingly popular for image classification tasks. All contemporary computer vision problems are being dominated by ConvNets. Conventional training methods using ...
详细信息
Multilevel characterization of the recently developed Unknown Protein Sequence (UPS) is significant for the drug-designing, disease-diagnosis, and treatment plans. UPS can demonstrate harmful as well as useful charact...
详细信息
Cloud computing (CC) is a cost-effective platform for users to store their data on the internet rather than investing in additional devices for storage. Data deduplication (DD) defines a process of eliminating redunda...
详细信息
Numerous obstacles endanger the livelihoods of smallholder farmers and global food security. Crop output losses due to plant diseases alone are estimated to be between 15% to 25% every year. However, farmers' capa...
详细信息
暂无评论