Image deraining is a highly ill-posed *** significant progress has been made due to the use of deep convolutional neural networks,this problem still remains challenging,especially for the details restoration and gener...
详细信息
Image deraining is a highly ill-posed *** significant progress has been made due to the use of deep convolutional neural networks,this problem still remains challenging,especially for the details restoration and generalization to real rain *** this paper,we propose a deep residual channel attention network(DeRCAN)for *** channel attention mechanism is able to capture the inherent properties of the feature space and thus facilitates more accurate estimations of structures and details for image *** addition,we further propose an unsupervised learning approach to better solve real rain images based on the proposed *** qualitative and quantitative evaluation results on both synthetic and real-world images demonstrate that the proposed DeRCAN performs favorably against state-of-the-art methods.
The achievement of cloud environment is determined by the efficiency of its load balancing with proper allocation of resources. The proactive forecasting of future workload, accompanied by the allocation of resources,...
详细信息
In task offloading,the movement of vehicles causes the switching of connected RSUs and servers,which may lead to task offloading failure or high service *** this paper,we analyze the impact of vehicle movements on tas...
详细信息
In task offloading,the movement of vehicles causes the switching of connected RSUs and servers,which may lead to task offloading failure or high service *** this paper,we analyze the impact of vehicle movements on task offloading and reveal that data preparation time for task execution can be minimized via forward-looking ***,a Bi-LSTM-based model is proposed to predict the trajectories of *** service area is divided into several equal-sized *** the actual position of the vehicle and the predicted position by the model belong to the same grid,the prediction is considered correct,thereby reducing the difficulty of vehicle trajectory ***,we propose a scheduling strategy for delay optimization based on the vehicle trajectory *** the inevitable prediction error,we take some edge servers around the predicted area as candidate execution servers and the data required for task execution are backed up to these candidate servers,thereby reducing the impact of prediction deviations on task offloading and converting the modest increase of resource overheads into delay reduction in task *** results show that,compared with other classical schemes,the proposed strategy has lower average task offloading delays.
All the software products developed will need testing to ensure the quality and accuracy of the product. It makes the life of testers much easier when they can optimize on the effort spent and predict defects for the ...
详细信息
This letter proposes a reliable transfer learning(RTL)method for pre-fault dynamic security assessment(DSA)in power systems to improve DSA performance in the presence of potentially related unknown *** takes individua...
详细信息
This letter proposes a reliable transfer learning(RTL)method for pre-fault dynamic security assessment(DSA)in power systems to improve DSA performance in the presence of potentially related unknown *** takes individual discrepancies into consideration and can handle unknown faults with incomplete *** experiment results demonstrate high DSA accuracy and computational efficiency of the proposed RTL *** analysis shows RTL can guarantee system performance.
The article addresses the output-feedback control issue for a class of multi-input multi-output(MIMO)uncertain nonlinear systems with multiple event-triggered mechanisms(ETM).Compared to previous event-triggering stud...
详细信息
The article addresses the output-feedback control issue for a class of multi-input multi-output(MIMO)uncertain nonlinear systems with multiple event-triggered mechanisms(ETM).Compared to previous event-triggering studies,this paper aims to trigger both the output and filtered *** nonlinear dynamics are approximated using fuzzy logic systems(FLSs).Then,a novel kind of state observer has been designed to deal with unmeasurable state problems using the triggered output *** sampled estimated state,the triggered output signal,and the filtered signal are utilized to propose an event-triggering mechanism that consists of sensor-to-observer(SO)and observer-to-controller(OC).An event-triggered output feedback control approach is given inside backstepping control,whereby the filter may be employed to circumvent the issue of the virtual control function not being differentiable at the trigger *** is testified that,according to the Lyapunov stability analysis scheme,all closed-loop signals and the system output are ultimately uniformly constrained by our control ***,the simulation examples are performed to confirm the theoretical findings.
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, f...
详细信息
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, fingerprintsand faces have been widely used for person identification, which has the risk of information leakage as a resultof reproducing fingers or faces by taking a snapshot. Recently, people have focused on creating an identifiablepattern, which will not be reproducible falsely by capturing psychological and behavioral information of a personusing vision and sensor-based techniques. In existing studies, most of the researchers used very complex patternsin this direction, which need special training and attention to remember the patterns and failed to capturethe psychological and behavioral information of a person properly. To overcome these problems, this researchdevised a novel dynamic hand gesture-based person identification system using a Leap Motion sensor. Thisstudy developed two hand gesture-based pattern datasets for performing the experiments, which contained morethan 500 samples, collected from 25 subjects. Various static and dynamic features were extracted from the handgeometry. Randomforest was used to measure feature importance using the Gini Index. Finally, the support vectormachinewas implemented for person identification and evaluate its performance using identification accuracy. Theexperimental results showed that the proposed system produced an identification accuracy of 99.8% for arbitraryhand gesture-based patterns and 99.6% for the same dynamic hand gesture-based patterns. This result indicatedthat the proposed system can be used for person identification in the field of security.
The Quantum Internet of Things (QIoT) in the healthcare industry holds the promise of transforming patient care, diagnostics, and medical research. Quantum-enhanced sensors, communication, and computation offer unprec...
详细信息
The Quantum Internet of Things (QIoT) in the healthcare industry holds the promise of transforming patient care, diagnostics, and medical research. Quantum-enhanced sensors, communication, and computation offer unprecedented capabilities that can revolutionize how healthcare services are delivered and experienced. This paper explores the potential of QIoT in the context of smart healthcare, where interconnected quantum-enabled devices and systems create an ecosystem that enhances data security, enables real-time monitoring, and advances medical knowledge. We delve into the applications of quantum sensors in precise health monitoring, the role of quantum communication in secure telemedicine, and the computational power of quantum computing in drug discovery and personalized medicine. We discuss challenges such as technical feasibility, scalability, and regulatory considerations, along with the emerging trends and opportunities in this transformative field. By examining the intersection of quantum technologies and smart healthcare, this paper aims to shed light on the novel approaches and breakthroughs that could redefine the future of healthcare delivery and patient outcomes. IEEE
Direct volume rendering(DVR)is a technique that emphasizes structures of interest(SOIs)within a volume visually,while simultaneously depicting adjacent regional information,e.g.,the spatial location of a structure con...
详细信息
Direct volume rendering(DVR)is a technique that emphasizes structures of interest(SOIs)within a volume visually,while simultaneously depicting adjacent regional information,e.g.,the spatial location of a structure concerning its *** DVR,transfer function(TF)plays a key role by enabling accurate identification of SOIs interactively as well as ensuring appropriate visibility of *** generation typically involves non-intuitive trial-and-error optimization of rendering parameters,which is time-consuming and *** at mitigating this manual process have led to approaches that make use of a knowledge database consisting of pre-designed TFs by domain *** these approaches,a user navigates the knowledge database to find the most suitable pre-designed TF for their input volume to visualize the *** these approaches potentially reduce the workload to generate the TFs,they,however,require manual TF navigation of the knowledge database,as well as the likely fine tuning of the selected TF to suit the *** this work,we propose a TF design approach,CBR-TF,where we introduce a new content-based retrieval(CBR)method to automatically navigate the knowledge *** of pre-designed TFs,our knowledge database contains volumes with SOI *** an input volume,our CBR-TF approach retrieves relevant volumes(with SOI labels)from the knowledge database;the retrieved labels are then used to generate and optimize TFs of the *** approach largely reduces manual TF navigation and fine *** our CBR-TF approach,we introduce a novel volumetric image feature which includes both a local primitive intensity profile along the SOIs and regional spatial semantics available from the co-planar images to the *** the regional spatial semantics,we adopt a convolutional neural network to obtain high-level image feature *** the intensity profile,we extend the dynamic time warping technique to address subtle alignment
State-of-the-art recommender systems are increasingly focused on optimizing implementation efficiency, such as enabling on-device recommendations under memory constraints. Current methods commonly use lightweight embe...
详细信息
State-of-the-art recommender systems are increasingly focused on optimizing implementation efficiency, such as enabling on-device recommendations under memory constraints. Current methods commonly use lightweight embeddings for users and items or employ compact embeddings to enhance reusability and reduce memory usage. However, these approaches consider only the coarse-grained aspects of embeddings, overlooking subtle semantic nuances. This limitation results in an adversarial degradation of meta-embedding performance, impeding the system's ability to capture intricate relationships between users and items, leading to suboptimal recommendations. To address this, we propose a novel approach to efficiently learn meta-embeddings with varying grained and apply fine-grained meta-embeddings to strengthen the representation of their coarse-grained counterparts. Specifically, we introduce a recommender system based on a graph neural network, where each user and item is represented as a node. These nodes are directly connected to coarse-grained virtual nodes and indirectly linked to fine-grained virtual nodes, facilitating learning of multi-grained semantics. Fine-grained semantics are captured through sparse meta-embeddings, which dynamically balance embedding uniqueness and memory constraints. To ensure their sparseness, we rely on initialization methods such as sparse principal component analysis combined with a soft thresholding activation function. Moreover, we propose a weight-bridging update strategy that aligns coarse-grained meta-embedding with several fine-grained meta-embeddings based on the underlying semantic properties of users and items. Comprehensive experiments demonstrate that our method outperforms existing baselines. The code of our proposal is available at https://***/htyjers/C2F-MetaEmbed.
暂无评论