Visible-Infrared Person Re-identification (VI-ReID) is a challenging cross-modal retrieval task due to significant modality differences, primarily resulting from the absence of color information in the infrared modali...
This paper introduces a new one-dimensional chaotic system and a new image encryption algorithm. Firstly, the new chaotic system is analyzed. The bifurcation diagram and Lyapunov exponent show that the system has stro...
详细信息
Cloud computing eliminates the limitations of local hardware architecture while also enabling rapid data sharing between healthcare institutions. Encryption of electronic medical records (EMRs) before uploading to clo...
详细信息
Human action recognition (HAR) plays a vital role in various fields, including surveillance, healthcare, and human–computer interaction. Recognizing multi-actor actions in crowded scenarios poses a significant challe...
详细信息
Generator tripping scheme(GTS)is the most commonly used scheme to prevent power systems from losing safety and ***,GTS is composed of offline predetermination and real-time scenario ***,it is extremely time-consuming ...
详细信息
Generator tripping scheme(GTS)is the most commonly used scheme to prevent power systems from losing safety and ***,GTS is composed of offline predetermination and real-time scenario ***,it is extremely time-consuming and labor-intensive for manual predetermination for a large-scale modern power *** improve efficiency of predetermination,this paper proposes a framework of knowledge fusion-based deep reinforcement learning(KF-DRL)for intelligent predetermination of ***,the Markov Decision Process(MDP)for GTS problem is formulated based on transient instability ***,linear action space is developed to reduce dimensionality of action space for multiple controllable ***,KF-DRL leverages domain knowledge about GTS to mask invalid actions during the decision-making *** can enhance the efficiency and learning ***,the graph convolutional network(GCN)is introduced to the policy network for enhanced learning *** simulation results obtained on New England power system demonstrate superiority of the proposed KF-DRL framework for GTS over the purely data-driven DRL method.
Data with missing values,or incomplete information,brings some challenges to the development of classification,as the incompleteness may significantly affect the performance of *** this paper,we handle missing values ...
详细信息
Data with missing values,or incomplete information,brings some challenges to the development of classification,as the incompleteness may significantly affect the performance of *** this paper,we handle missing values in both training and test sets with uncertainty and imprecision reasoning by proposing a new belief combination of classifier(BCC)method based on the evidence *** proposed BCC method aims to improve the classification performance of incomplete data by characterizing the uncertainty and imprecision brought by *** BCC,different attributes are regarded as independent sources,and the collection of each attribute is considered as a ***,multiple classifiers are trained with each subset independently and allow each observed attribute to provide a sub-classification result for the query ***,these sub-classification results with different weights(discounting factors)are used to provide supplementary information to jointly determine the final classes of query *** weights consist of two aspects:global and *** global weight calculated by an optimization function is employed to represent the reliability of each classifier,and the local weight obtained by mining attribute distribution characteristics is used to quantify the importance of observed attributes to the pattern *** comparative experiments including seven methods on twelve datasets are executed,demonstrating the out-performance of BCC over all baseline methods in terms of accuracy,precision,recall,F1 measure,with pertinent computational costs.
Robust watermarking requires finding invariant features under multiple attacks to ensure correct *** learning has extremely powerful in extracting features,and watermarking algorithms based on deep learning have attra...
详细信息
Robust watermarking requires finding invariant features under multiple attacks to ensure correct *** learning has extremely powerful in extracting features,and watermarking algorithms based on deep learning have attracted widespread *** existing methods use 3×3 small kernel convolution to extract image features and embed the ***,the effective perception fields for small kernel convolution are extremely confined,so the pixels that each watermarking can affect are restricted,thus limiting the performance of the *** address these problems,we propose a watermarking network based on large kernel convolution and adaptive weight assignment for loss *** uses large-kernel depth-wise convolution to extract features for learning large-scale image information and subsequently projects the watermarking into a highdimensional space by 1×1 convolution to achieve adaptability in the channel ***,the modification of the embedded watermarking on the cover image is extended to more *** the magnitude and convergence rates of each loss function are different,an adaptive loss weight assignment strategy is proposed to make theweights participate in the network training together and adjust theweight ***,a high-frequency wavelet loss is proposed,by which the watermarking is restricted to only the low-frequency wavelet sub-bands,thereby enhancing the robustness of watermarking against image *** experimental results show that the peak signal-to-noise ratio(PSNR)of the encoded image reaches 40.12,the structural similarity(SSIM)reaches 0.9721,and the watermarking has good robustness against various types of noise.
Estimating the 6D object pose from a singular RGB image is a fundamental task in the field of computer vision. Recent studies have demonstrated that keypoint-based methods exhibit remarkable efficacy. Such methodologi...
详细信息
Cooperative coevolution (CC) algorithms, based on the divide-and-conquer strategy, have emerged as the predominant approach to solving large-scale global optimization (LSGO) problems. The efficiency and accuracy of th...
详细信息
In this paper,through experiments and DEM simulations,it is found that there is a ring-shaped region named Quasi-static Region between the particles expanding outward and the particles collapsing inward during the imp...
详细信息
In this paper,through experiments and DEM simulations,it is found that there is a ring-shaped region named Quasi-static Region between the particles expanding outward and the particles collapsing inward during the impact ***-static Region is always generated from the impact point at the same time,and then spreads out at a uniform *** the propagation of Quasi-static Region,the velocity of the particles in the particle extend region varies linearly in space and *** the change rate is only related to the properties of the particle *** simulation results show that the particle flow in Quasi-static Region is elastic-inertial flow,while the particle flow expanding outward and collapsing inward is inertial flow.
暂无评论