Content aware image resizing(CAIR)is an excellent technology used widely for image *** can also be used to tamper with images and bring the trust crisis of image content to the *** an image is processed by CAIR,the co...
详细信息
Content aware image resizing(CAIR)is an excellent technology used widely for image *** can also be used to tamper with images and bring the trust crisis of image content to the *** an image is processed by CAIR,the correlation of local neighborhood pixels will be *** local binary patterns(LBP)can effectively describe the local texture,it however cannot describe the magnitude information of local neighborhood pixels and is also vulnerable to ***,to deal with the detection of CAIR,a novel forensic method based on improved local ternary patterns(ILTP)feature and gradient energy feature(GEF)is proposed in this ***,the adaptive threshold of the original local ternary patterns(LTP)operator is improved,and the ILTP operator is used to describe the change of correlation among local neighborhood pixels caused by ***,the histogram features of ILTP and the gradient energy features are extracted from the candidate image for CAIR forgery ***,the ILTP features and the gradient energy features are concatenated into the combined features,and the combined features are used to train *** support vector machine(SVM)is exploited as a classifier to be trained and tested by the above features in order to distinguish whether an image is subjected to CAIR or *** candidate images are extracted from uncompressed color image database(UCID),then the training and testing sets are *** experimental results with many test images show that the proposed method can detect CAIR tampering effectively,and that its performance is improved compared with other *** can achieve a better performance than the state-of-the-art approaches.
In this paper, we propose a novel representation for grasping using contacts between multi-finger robotic hands and objects to be manipulated. This representation significantly reduces the prediction dimensions and ac...
In this paper, we propose a novel representation for grasping using contacts between multi-finger robotic hands and objects to be manipulated. This representation significantly reduces the prediction dimensions and accelerates the learning process. We present an effective end-to-end network, CMG-Net, for grasping unknown objects in a cluttered environment by efficiently predicting multi-finger grasp poses and hand configurations from a single-shot point cloud. Moreover, we create a synthetic grasp dataset that consists of five thousand cluttered scenes, 80 object categories, and 20 million annotations. We perform a comprehensive empirical study and demonstrate the effectiveness of our grasping representation and CMG-Net. Our work significantly outperforms the state-of-the-art for three-finger robotic hands. We also demonstrate that the model trained using synthetic data perform very well for real robots.
Smart wearables and body implanted IoT devices continuously track and transmit health metrics wirelessly to a central controller, such as a personal server, enabling real-time monitoring, proactive treatment and timel...
详细信息
ISBN:
(数字)9798331534103
ISBN:
(纸本)9798331534110
Smart wearables and body implanted IoT devices continuously track and transmit health metrics wirelessly to a central controller, such as a personal server, enabling real-time monitoring, proactive treatment and timely assistance. However, the security of IoT-enabled healthcare systems remains a concern, particularly regarding the protection of sensitive patient data. To address the aforementioned issue and enhance security in IoT-enabled healthcare services, we propose a robust anonymous authentication scheme in this work. By leveraging lightweight cryptographic primitives including hash functions and XOR operations coupled with physical unclonable functions (PUFs) and fuzzy extractors, the proposed scheme introduces a novel authentication and key agreement mechanism for secure communication in IoT-enabled healthcare systems. The integration of PUF technology ensure the physical security of resource constrained implantable medical devices (IMDs) against various attacks including device physical capture and impersonation attacks that compromise the IoT-enabled healthcare operations. A thorough security analysis demonstrated the robustness and resilience of the proposed scheme against various active and pas-sive security attacks, thus ensure the integrity and confidentiality of sensitive healthcare data. Finally, comparative analysis of the proposed scheme with other state-of-the-art highlighted that our scheme outperformed other approaches in terms of providing security and additional features, positioning it as a comprehensive solution for authentication in IoT-enabled healthcare services.
In this paper, we propose a novel representation for grasping using contacts between multi-finger robotic hands and objects to be manipulated. This representation significantly reduces the prediction dimensions and ac...
详细信息
作者:
Wang, BenzhiLiang, MeiyuLi, AngSchool of Computer Science
National Pilot School of Software Engineering Beijing University of Posts and Telecommunications Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing100876 China
With the advent of the information age, the scale of data on the Internet is getting larger and larger, and it is full of text, images, videos, and other information. Different from social media data and news data, sc...
详细信息
Recently, using machine learning technology to realize abnormal behavior recognition in video surveillance to replace human monitoring has become a hot academic topic. In that case, constructing an efficient and unifi...
详细信息
ISBN:
(纸本)9781665480468
Recently, using machine learning technology to realize abnormal behavior recognition in video surveillance to replace human monitoring has become a hot academic topic. In that case, constructing an efficient and unified framework for multi-type abnormal behavior recognition is a worthy topic in machine learning research. This research aims to design a lightweight recognition framework that can recognize various abnormal behaviors in real-time. We propose a Novel framewOrk for the Multi-type Abnormal BEhavior Recognition (NOMABER), which consists of three parts. Firstly, the improved image pre-processing module annotates the abnormal behaviors of image data sets. Secondly, the improved YOLOv5 module is used to identify the multi-type abnormal behaviors, and then the abnormal behaviors are classified by the output module. Finally, experiments on real data sets show that NOMABER is superior to the current methods of real-time performance, identification accuracy, and types of abnormal behaviors.
Precise stock market prediction is crucial for investors, but the volatility of the stock market is influenced by multiple factors such as public sentiments, business news, and related product volatility. While severa...
详细信息
Finding the mode of a high dimensional probability distribution D is a fundamental algorithmic problem in statistics and data analysis. There has been particular interest in efficient methods for solving the problem w...
详细信息
With the advancement in Artificial Intelligence (AI), especially generative AI, conversational agents are becoming a norm in everyday lives. These agents can become more intelligent if they can collaborate with humans...
详细信息
ISBN:
(数字)9798331535193
ISBN:
(纸本)9798331535209
With the advancement in Artificial Intelligence (AI), especially generative AI, conversational agents are becoming a norm in everyday lives. These agents can become more intelligent if they can collaborate with humans or other agents in analysing the conversation with the user. This work presents the use of AI to connect different sets of users and help them solve their life problems. Currently, sharing the wisdom of the old generation is happening within the close family or the student circle alone. To receive knowledge from a wider community at their fingertips, we designed a chatbot called wisdomBOT which can connect the younger generation users with the older generation users to receive their wisdom through the sharing of life experiences and stories and to learn from them. It also helps to address the loneliness of the older generation and connect them through a new way to make younger friends.
Real-world data often contain incomplete views with varying degrees of missing information. While there are existing methods for learning representations from such data, effectively utilizing all incomplete view data ...
Real-world data often contain incomplete views with varying degrees of missing information. While there are existing methods for learning representations from such data, effectively utilizing all incomplete view data and ensuring robustness to different levels of completeness remains a challenging task. To address this problem, we propose a novel framework named IMRL-AGI. IMRL-AGI combines the anchor graph-based Graph Convolutional Network (GCN) and information bottleneck. Specifically, the framework starts by constructing an anchor graph to effectively captures the nonlinear information between instances. Next, an anchor graph-based GCN is designed to extract feature information from various views. IMRL-AGI maximizes the mutual information between the views obtained by the common representation and the anchor-graph-based GCN, ensuring the accurate extraction of view information. Furthermore, the minimization of mutual information is applied to promote diversity and reduce redundancy in the multi-view representation. Extensive experiments are conducted on several real-world datasets, and the results demonstrate the superiority of IMRL-AGI.
暂无评论