Ophthalmic diagnostics play a critical role in the early detection and management of various ocular diseases. Among the advanced imaging modalities employed in ophthalmology, Optical Coherence Tomography (OCT) has eme...
详细信息
The state of health(SOH)is a critical factor in evaluating the performance of the lithium-ion batteries(LIBs).Due to various end-user behaviors,the LIBs exhibit different degradation modes,which makes it challenging t...
详细信息
The state of health(SOH)is a critical factor in evaluating the performance of the lithium-ion batteries(LIBs).Due to various end-user behaviors,the LIBs exhibit different degradation modes,which makes it challenging to estimate the SOHs in a personalized *** this article,we present a novel particle swarm optimization-assisted deep domain adaptation(PSO-DDA)method to estimate the SOH of LIBs in a personalized manner,where a new domain adaptation strategy is put forward to reduce cross-domain distribution *** standard PSO algorithm is exploited to automatically adjust the chosen hyperparameters of developed DDA-based *** proposed PSODDA method is validated by extensive experiments on two LIB datasets with different battery chemistry materials,ambient temperatures and charge-discharge *** results indicate that the proposed PSO-DDA method surpasses the convolutional neural network-based method and the standard DDA-based *** Py Torch implementation of the proposed PSO-DDA method is available at https://***/mxt0607/PSO-DDA.
Wireless networks such as MANETs present unique challenges due to their dynamic and decentralized nature. Efficient routing protocols are essential for achieving reliable and robust communication in such networks. In ...
详细信息
Human pose estimation is a critical research area in the field of computer vision,playing a significant role in applications such as human-computer interaction,behavior analysis,and action *** this paper,we propose a ...
详细信息
Human pose estimation is a critical research area in the field of computer vision,playing a significant role in applications such as human-computer interaction,behavior analysis,and action *** this paper,we propose a U-shaped keypoint detection network(DAUNet)based on an improved ResNet subsampling structure and spatial grouping *** network addresses key challenges in traditional methods,such as information loss,large network redundancy,and insufficient sensitivity to low-resolution *** is composed of three main ***,we introduce an improved BottleNeck block that employs partial convolution and strip pooling to reduce computational load and mitigate feature ***,after upsampling,the network eliminates redundant features,improving the overall ***,a lightweight spatial grouping attention mechanism is applied to enhance low-resolution semantic features within the feature map,allowing for better restoration of the original image size and higher *** results demonstrate that DAUNet achieves superior accuracy compared to most existing keypoint detection models,with a mean PCKh@0.5 score of 91.6%on the MPII dataset and an AP of 76.1%on the COCO ***,real-world experiments further validate the robustness and generalizability of DAUNet for detecting human bodies in unknown environments,highlighting its potential for broader applications.
This study summarises current advances in sign language recognition systems, emphasising trends, problems, and prospects. Twenty key research publications are analysed, spanning a wide range of sign language recogniti...
详细信息
This paper demonstrates 2 methods, a reduced memory technique, and a reduced memory along with more security techniques in RSA (Rivest-Shamir-Adleman) and ElGamal which are both asymmetric cryptographic algorithms. Re...
详细信息
The computationally intensive tasks generated by AIoTD face challenges due to its limitations in battery power and computing capabilities. These devices typically operate in resource-constrained environments where ene...
详细信息
The broad learning system(BLS) based on the minimum mean square error(MMSE) criterion can achieve outstanding performance without spending too much time in various machine learning ***, when data are polluted by non-G...
详细信息
The broad learning system(BLS) based on the minimum mean square error(MMSE) criterion can achieve outstanding performance without spending too much time in various machine learning ***, when data are polluted by non-Gaussian noise, the stability of BLS may be destroyed because the MMSE criterion is sensitive to outliers. Different from the MMSE criterion, the minimum error entropy(MEE) criterion utilizes the kernel function to capture high-dimensional information and decrease the negative influence of outliers, which will make BLS more discriminative and robust. Nevertheless, the computational complexity of MEE is high due to a double summation of the data size. To solve these issues, this paper proposes a new robust BLS variant based on the quantized minimum error entropy(QMEE) criterion, in which a quantization operation is used to reduce the computational complexity of MEE. The proposed model BLS-QMEE is optimized by the fixed-point iterative method, and a sufficient condition for its convergence is provided. Compared with the standard BLS and other existing robust variants of BLS, BLS-QMEE performs more satisfactorily without consuming too much time. The desirable performance of BLS-QMEE is verified by various experiments on function approximation, several public datasets, and a practical application.
Long-tailed multi-label text classification aims to identify a subset of relevant labels from a large candidate label set, where the training datasets usually follow long-tailed label distributions. Many of the previo...
详细信息
Long-tailed multi-label text classification aims to identify a subset of relevant labels from a large candidate label set, where the training datasets usually follow long-tailed label distributions. Many of the previous studies have treated head and tail labels equally, resulting in unsatisfactory performance for identifying tail labels. To address this issue, this paper proposes a novel learning method that combines arbitrary models with two steps. The first step is the “diverse ensemble” that encourages diverse predictions among multiple shallow classifiers, particularly on tail labels, and can improve the generalization of tail *** second is the “error correction” that takes advantage of accurate predictions on head labels by the base model and approximates its residual errors for tail labels. Thus, it enables the “diverse ensemble” to focus on optimizing the tail label performance. This overall procedure is called residual diverse ensemble(RDE). RDE is implemented via a single-hidden-layer perceptron and can be used for scaling up to hundreds of thousands of labels. We empirically show that RDE consistently improves many existing models with considerable performance gains on benchmark datasets, especially with respect to the propensity-scored evaluation ***, RDE converges in less than 30 training epochs without increasing the computational overhead.
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure ***,the Op...
详细信息
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure ***,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional *** disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network ***,this openness introduces new security challenges compared to traditional *** existing studies overlook these security requirements of the O-RAN *** gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G *** then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities *** providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.
暂无评论