The coalescence and missed detection are two key challenges in Multi-Target Tracking(MTT).To balance the tracking accuracy and real-time performance,the existing Random Finite Set(RFS)based filters are generally diffi...
详细信息
The coalescence and missed detection are two key challenges in Multi-Target Tracking(MTT).To balance the tracking accuracy and real-time performance,the existing Random Finite Set(RFS)based filters are generally difficult to handle the above problems simultaneously,such as the Track-Oriented marginal Multi-Bernoulli/Poisson(TOMB/P)and Measurement-Oriented marginal Multi-Bernoulli/Poisson(MOMB/P)*** on the Arithmetic Average(AA)fusion rule,this paper proposes a novel fusion framework for the Poisson Multi-Bernoulli(PMB)filter,which integrates both the advantages of the TOMB/P filter in dealing with missed detection and the advantages of the MOMB/P filter in dealing with *** order to fuse the different PMB distributions,the Bernoulli components in different Multi-Bernoulli(MB)distributions are associated with each other by Kullback-Leibler Divergence(KLD)***,an adaptive AA fusion rule is designed on the basis of the exponential fusion weights,which utilizes the TOMB/P and MOMB/P updates to solve these difficulties in ***,by comparing with the TOMB/P and MOMB/P filters,the performance of the proposed filter in terms of accuracy and efficiency is demonstrated in three challenging scenarios.
The coronavirus disease 2019(COVID-19)has severely disrupted both human life and the health care *** diagnosis and treatment have become increasingly important;however,the distribution and size of lesions vary widely ...
详细信息
The coronavirus disease 2019(COVID-19)has severely disrupted both human life and the health care *** diagnosis and treatment have become increasingly important;however,the distribution and size of lesions vary widely among individuals,making it challenging to accurately diagnose the *** study proposed a deep-learning disease diagnosismodel based onweakly supervised learning and clustering visualization(W_CVNet)that fused classification with ***,the data were *** optimizable weakly supervised segmentation preprocessing method(O-WSSPM)was used to remove redundant data and solve the category imbalance ***,a deep-learning fusion method was used for feature extraction and classification recognition.A dual asymmetric complementary bilinear feature extraction method(D-CBM)was used to fully extract complementary features,which solved the problem of insufficient feature extraction by a single deep learning ***,an unsupervised learning method based on Fuzzy C-Means(FCM)clustering was used to segment and visualize COVID-19 lesions enabling physicians to accurately assess lesion distribution and disease *** this study,5-fold cross-validation methods were used,and the results showed that the network had an average classification accuracy of 85.8%,outperforming six recent advanced classification models.W_CVNet can effectively help physicians with automated aid in diagnosis to determine if the disease is present and,in the case of COVID-19 patients,to further predict the area of the lesion.
Multi-target tracking is facing the difficulties of modeling uncertain motion and observation *** tracking algorithms are limited by specific models and priors that may mismatch a real-world *** this paper,considering...
详细信息
Multi-target tracking is facing the difficulties of modeling uncertain motion and observation *** tracking algorithms are limited by specific models and priors that may mismatch a real-world *** this paper,considering the model-free purpose,we present an online Multi-Target Intelligent Tracking(MTIT)algorithm based on a Deep Long-Short Term Memory(DLSTM)network for complex tracking requirements,named the MTIT-DLSTM ***,to distinguish trajectories and concatenate the tracking task in a time sequence,we define a target tuple set that is the labeled Random Finite Set(RFS).Then,prediction and update blocks based on the DLSTM network are constructed to predict and estimate the state of targets,***,the prediction block can learn the movement trend from the historical state sequence,while the update block can capture the noise characteristic from the historical measurement ***,a data association scheme based on Hungarian algorithm and the heuristic track management strategy are employed to assign measurements to targets and adapt births and *** results manifest that,compared with the existing tracking algorithms,our proposed MTIT-DLSTM algorithm can improve effectively the accuracy and robustness in estimating the state of targets appearing at random positions,and be applied to linear and nonlinear multi-target tracking scenarios.
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information ***,these approaches have some *** example,a cover image lacks self-adaptability,inform...
详细信息
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information ***,these approaches have some *** example,a cover image lacks self-adaptability,information leakage,or weak *** address these issues,this study proposes a universal and adaptable image-hiding ***,a domain attention mechanism is designed by combining the Atrous convolution,which makes better use of the relationship between the secret image domain and the cover image ***,to improve perceived human similarity,perceptual loss is incorporated into the training *** experimental results are promising,with the proposed method achieving an average pixel discrepancy(APD)of 1.83 and a peak signal-to-noise ratio(PSNR)value of 40.72 dB between the cover and stego images,indicative of its high-quality ***,the structural similarity index measure(SSIM)reaches 0.985 while the learned perceptual image patch similarity(LPIPS)remarkably registers at ***,self-testing and cross-experiments demonstrate the model’s adaptability and generalization in unknown hidden spaces,making it suitable for diverse computer vision tasks.
Nowadays, trust management plays a significant role in different applications like commercial applications, Internet of Things (IoT) based applications, social networking applications, cloud computing-based applicatio...
详细信息
Nowadays, multimedia technology is progressing everyday. It is very easy to duplicate, distribute and modify digital images with online editing software. Image security and privacy are critical aspects of the multimed...
详细信息
Nowadays, multimedia technology is progressing everyday. It is very easy to duplicate, distribute and modify digital images with online editing software. Image security and privacy are critical aspects of the multimedia revolution. Therefore, digital image watermarking offers an alternative way out for image authentication. Currently, watermarking methods are crucial for safeguarding digital images. Several traditional watermarking approaches have been developed to protect images using spatial domains and transformations. Watermarking techniques that are more traditional are less resistant to repeated attacks. Deep learning-based watermarking has recently gained traction, greatly improving the safety of visual images in a variety of common applications. This study presents a robust and secure digital watermarking method for multimedia content protection and authentication. The watermark image is first transformed using the hybrid wavelet transform, and then it is encrypted using a chaos encryption algorithm. The cover image is simultaneously subjected to neighborhood-based feature extraction. Leveraging these extracted features, a novel Adaptive Gannet Optimization algorithm (AGOA) is employed to determine the optimal embedding location. Subsequently, the watermarked image is seamlessly integrated and extracted using the hybrid Generative adversarial network-based long short-term memory (GAN-LSTM) approach within the identified optimal region. Decryption and Inverse transformation are then used to get the original watermark image. Several previous methods, such as DNN, Deep-ANN, and Deep-CNN, are used to evaluate the performance of the proposed method. This technique improves multimedia content protection and authentication by guaranteeing strong and secure watermarking. The proposed method for digital image watermarking produced a peak signal-to-noise ratio of 46.412 and a mean square error of 24.512. Therefore, the proposed method performs well in digital image wa
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t...
详细信息
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and targets while ignoring relational types information. Considering the positive or negative effects of DTIs will facilitate the study on comprehensive mechanisms of multiple drugs on a common target, in this work, we model DTIs on signed heterogeneous networks, through categorizing interaction patterns of DTIs and additionally extracting interactions within drug pairs and target protein pairs. We propose signed heterogeneous graph neural networks(SHGNNs), further put forward an end-to-end framework for signed DTIs prediction, called SHGNN-DTI,which not only adapts to signed bipartite networks, but also could naturally incorporate auxiliary information from drug-drug interactions(DDIs) and protein-protein interactions(PPIs). For the framework, we solve the message passing and aggregation problem on signed DTI networks, and consider different training modes on the whole networks consisting of DTIs, DDIs and PPIs. Experiments are conducted on two datasets extracted from Drug Bank and related databases, under different settings of initial inputs, embedding dimensions and training modes. The prediction results show excellent performance in terms of metric indicators, and the feasibility is further verified by the case study with two drugs on breast cancer.
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is *** cyber threats evolve in complexity,traditional cryptographic methods face in...
详细信息
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is *** cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated *** article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic *** propose a novel cryptographic approach underpinned by theoretical frameworks and practical *** to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information *** method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key *** also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and *** gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various ***,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing ***,with integrity metrics at 9.35,the protocol’s resilience is further *** metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security.
To address the problem of inaccurate prediction of slab quality in continuous casting, an algorithm based on particle swarm optimisation and differential evolution is proposed. The algorithm combines BP neural network...
详细信息
A multi-strategy hybrid whale optimization algorithm(MSHWOA)for complex constrained optimization problems is proposed to overcome the drawbacks of easily trapping into local optimum,slow convergence speed and low opti...
详细信息
A multi-strategy hybrid whale optimization algorithm(MSHWOA)for complex constrained optimization problems is proposed to overcome the drawbacks of easily trapping into local optimum,slow convergence speed and low optimization ***,the population is initialized by introducing the theory of good point set,which increases the randomness and diversity of the population and lays the foundation for the global optimization of the ***,a novel linearly update equation of convergence factor is designed to coordinate the abilities of exploration and *** the same time,the global exploration and local exploitation capabilities are improved through the siege mechanism of Harris Hawks optimization ***,the simulation experiments are conducted on the 6 benchmark functions and Wilcoxon rank sum test to evaluate the optimization performance of the improved *** experimental results show that the proposed algorithm has more significant improvement in optimization accuracy,convergence speed and robustness than the comparison algorithm.
暂无评论