作者:
Baowei WangLuyao ShenJunhao ZhangZenghui XuNeng WangSchool of Computer
Nanjing University of Information Science and TechnologyCollaborative Innovation Center of Jiangsu Atmospheric Environment and Equipment TechnologyDigital Forensics Engineering Research Center of Digital Forensics Ministry of EducationNanjing210044China School of Software
Nanjing University of Information Science and TechnologyNanjing210044China
Digital watermarking technology is adequate for copyright protection and content *** needs to be more research on the watermarking algorithm after printing and *** at the problem that existing anti-print scanning text...
详细信息
Digital watermarking technology is adequate for copyright protection and content *** needs to be more research on the watermarking algorithm after printing and *** at the problem that existing anti-print scanning text image watermarking algorithms cannot take into account the invisibility and robustness of the watermark,an anti-print scanning watermarking algorithm suitable for text images is *** algorithm first performs a series of image enhancement preprocessing operations on the printed scanned image to eliminate the interference of incorrect bit information on watermark embedding and then uses a combination of Discrete Wavelet Transform(DWT)-Singular Value Decomposition(SVD)to embed the *** show that the average Normalized Correlation(NC)of the watermark extracted by this algorithm against attacks such as Joint Photographic Experts Group(JPEG)compression,JPEG2000 compression,and print scanning is above ***,the average NC of the watermark extracted after print scanning attacks is greater than 0.964,and the average Bit Error Ratio(BER)is 5.15%.This indicates that this algorithm has strong resistance to various attacks and print scanning attacks and can better take into account the invisibility of the watermark.
Beyond the text detection and recognition tasks in image text spotting, video text spotting presents an augmented challenge with the inclusion of tracking. While advanced end-to-end trainable methods have shown commen...
This research to practice full paper presented a peer review approach to grading projects in computer courses. Educators commonly adopt project-based learning activities in computer courses to achieve the goal. Implem...
详细信息
ISBN:
(纸本)9798350336429
This research to practice full paper presented a peer review approach to grading projects in computer courses. Educators commonly adopt project-based learning activities in computer courses to achieve the goal. Implementations of these projects typically involve hardly quantifiable dimensions, such as novelty, functionality, user-friendly, coding style, and document. Automated tools are not competent for project assessment. However, assessing projects by instructors can be labor intensive and generally involves a high degree of subjectivity. Peer review is widely used in high education as effective active learning in computer courses, especially in the past decade. Despite its many advantages, peer review still faces some challenges. Students need to be more expert in assessment and might make mistakes when grading, and instructors still need to make great efforts to supervise the process and ensure that students give fair scores to their peers. In addition, the social relationship between students could lead to subjective assessments and affect the fairness of grading. We present the peer review approach to grading projects in computer courses. First, we design a grading specification to improve the accuracy of scoring. Second, we propose a score calculation method based on Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) to calculate the assignment's final score, which is a multi-objective decision-making problem. Third, we give an anomaly detection algorithm based on Dixon's Q test to filter peer reviewers' unreasonable scores. Based on the approach, we designed a peer review workflow and developed an online peer review tool called Peer Review Studio (PRS). We carry out the method in the undergraduate computer course of 2022. We collect and analyze the learning data between 2020 and 2022. When measured by Krippendorff's alpha, the inter-rater reliability between instructor and peer grading is in good agreement. When measured by Kruskal-W
In the long history of more than 1 500 years,Dunhuang murals suffered from various deteriorations causing irreversible damage such as falling off,fading,and so ***,the existing Dunhuang mural restoration methods are t...
详细信息
In the long history of more than 1 500 years,Dunhuang murals suffered from various deteriorations causing irreversible damage such as falling off,fading,and so ***,the existing Dunhuang mural restoration methods are time-consuming and not feasible to facilitate cultural dissemination and permanent *** by cultural computing using artificial intelligence,gated-convolution-based dehaze net(GD-Net) was proposed for Dunhuang mural refurbishment and comprehensive ***,a neural network with gated convolution was applied to restore the falling off areas of the mural to ensure the integrity of the mural ***,a dehaze network was applied to enhance image quality to cope with the fading of the ***,a Dunhuang mural dataset was presented to meet the needs of deep learning approach,containing 1 180 images from the Cave 290 and Cave 112 of the Mogao *** experimental results demonstrate the effectiveness and superiority of GD-Net.
We design and present an integral-type Zhang neurodynamics (ITZN) model for handling temporally-varying nonlinear system of equations (TVNSE). To investigate the disturbances inhibition of the model, the general form ...
详细信息
With the rapid development of service computing technology, how to recommend the desirable Web APIs to developers from the large number of APIs is a challenge. The traditional methods based on collaborative filtering ...
详细信息
Social phobia is a prevalent mental health con-dition characterized by overwhelming fear on apprehension of social situations, often leading individuals to avoid such encounters. It is a very common mental disorder am...
详细信息
作者:
Zhou, ZhengyuLiu, WeiweiSchool of Computer Science
National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China
Goodness-of-fit testing, a classical statistical tool, has been extensively explored in the batch setting, where the sample size is ***, practitioners often prefer methods that adapt to the complexity of a problem rat...
Goodness-of-fit testing, a classical statistical tool, has been extensively explored in the batch setting, where the sample size is ***, practitioners often prefer methods that adapt to the complexity of a problem rather than fixing the sample size *** batch tests are generally unsuitable for streaming data, as valid inference after data peeking requires multiple testing corrections, resulting in reduced statistical *** address this issue, we delve into the design of consistent sequential goodness-of-fit *** the principle of testing by betting, we reframe this task as selecting a sequence of payoff functions that maximize the wealth of a fictitious bettor, betting against the null in a repeated *** conduct experiments to demonstrate the adaptability of our sequential test across varying difficulty levels of problems while maintaining control over type-I errors. Copyright 2024 by the author(s)
In the realm of medical image analysis, self-supervised learning (SSL) techniques have emerged to alleviate labeling demands, while still facing the challenge of training data scarcity owing to escalating resource req...
详细信息
Fundus image is vital for the diagnosis and monitoring of various eye diseases, where the accuracy of diagnostic results is largely determined by the quality of the obtained images. However, the performance of existin...
详细信息
暂无评论