Underwater target detection is an important method for detecting marine organisms. However, due to the image occlusion of underwater targets, blurred water quality, poor lighting conditions, small targets, and complex...
详细信息
Cross-speed bearing fault diagnosis based on multiple source domains and their data enables high-performance condition monitoring for variable-speed equipment, such as engines and turbines. Current multi-source method...
详细信息
Recently,with the increasing complexity of multiplex Unmanned Aerial Vehicles(multi-UAVs)collaboration in dynamic task environments,multi-UAVs systems have shown new characteristics of inter-coupling among multiplex g...
详细信息
Recently,with the increasing complexity of multiplex Unmanned Aerial Vehicles(multi-UAVs)collaboration in dynamic task environments,multi-UAVs systems have shown new characteristics of inter-coupling among multiplex groups and intra-correlation within ***,previous studies often overlooked the structural impact of dynamic risks on agents among multiplex UAV groups,which is a critical issue for modern multi-UAVs communication to *** address this problem,we integrate the influence of dynamic risks on agents among multiplex UAV group structures into a multi-UAVs task migration problem and formulate it as a partially observable Markov *** then propose a Hybrid Attention Multi-agent Reinforcement Learning(HAMRL)algorithm,which uses attention structures to learn the dynamic characteristics of the task environment,and it integrates hybrid attention mechanisms to establish efficient intra-and inter-group communication aggregation for information extraction and group *** results show that in this comprehensive and challenging model,our algorithm significantly outperforms state-of-the-art algorithms in terms of convergence speed and algorithm performance due to the rational design of communication mechanisms.
This article presents the equilibrium analysis of a game composed of heterogeneous electric vehicles (EVs) and a power distribution system operator (DSO) as the players, and charging station operators (CSOs) and a tra...
详细信息
1 Introduction On-device deep learning(DL)on mobile and embedded IoT devices drives various applications[1]like robotics image recognition[2]and drone swarm classification[3].Efficient local data processing preserves ...
详细信息
1 Introduction On-device deep learning(DL)on mobile and embedded IoT devices drives various applications[1]like robotics image recognition[2]and drone swarm classification[3].Efficient local data processing preserves privacy,enhances responsiveness,and saves ***,current ondevice DL relies on predefined patterns,leading to accuracy and efficiency *** is difficult to provide feedback on data processing performance during the data acquisition stage,as processing typically occurs after data acquisition.
Estimating lighting from standard images can effectively circumvent the need for resourceintensive high-dynamic-range(HDR)lighting ***,this task is often ill-posed and challenging,particularly for indoor scenes,due to...
详细信息
Estimating lighting from standard images can effectively circumvent the need for resourceintensive high-dynamic-range(HDR)lighting ***,this task is often ill-posed and challenging,particularly for indoor scenes,due to the intricacy and ambiguity inherent in various indoor illumination *** propose an innovative transformer-based method called SGformer for lighting estimation through modeling spherical Gaussian(SG)distributions—a compact yet expressive lighting *** from previous approaches,we explore underlying local and global dependencies in lighting features,which are crucial for reliable lighting ***,we investigate the structural relationships spanning various resolutions of SG distributions,ranging from sparse to dense,aiming to enhance structural consistency and curtail potential stochastic noise stemming from independent SG component *** harnessing the synergy of local–global lighting representation learning and incorporating consistency constraints from various SG resolutions,the proposed method yields more accurate lighting estimates,allowing for more realistic lighting effects in object relighting and *** code and model implementing our work can be found at https://***/junhong-jennifer-zhao/SGformer.
Research on panicle detection is one of the most important aspects of paddy phenotypic analysis.A phenotyping method that uses unmanned aerial vehicles can be an excellent alternative to field-based ***,it entails man...
详细信息
Research on panicle detection is one of the most important aspects of paddy phenotypic analysis.A phenotyping method that uses unmanned aerial vehicles can be an excellent alternative to field-based ***,it entails many other challenges,including different illuminations,panicle sizes,shape distortions,partial occlusions,and complex *** detection algorithms are directly affected by these *** work proposes a model for detecting panicles called Border Sensitive Knowledge Distillation(BSKD).It is designed to prioritize the preservation of knowledge in border areas through the use of feature *** feature-based knowledge distillation method allows us to compress the model without sacrificing its *** imitation mask is used to distinguish panicle-related foreground features from irrelevant background features.A significant improvement in Unmanned Aerial Vehicle(UAV)images is achieved when students imitate the teacher’s *** the UAV rice imagery dataset,the proposed BSKD model shows superior performance with 76.3%mAP,88.3%precision,90.1%recall and 92.6%F1 score.
The development of defect prediction plays a significant role in improving software quality. Such predictions are used to identify defective modules before the testing and to minimize the time and cost. The software w...
详细信息
The development of defect prediction plays a significant role in improving software quality. Such predictions are used to identify defective modules before the testing and to minimize the time and cost. The software with defects negatively impacts operational costs and finally affects customer satisfaction. Numerous approaches exist to predict software defects. However, the timely and accurate software bugs are the major challenging issues. To improve the timely and accurate software defect prediction, a novel technique called Nonparametric Statistical feature scaled QuAdratic regressive convolution Deep nEural Network (SQADEN) is introduced. The proposed SQADEN technique mainly includes two major processes namely metric or feature selection and classification. First, the SQADEN uses the nonparametric statistical Torgerson–Gower scaling technique for identifying the relevant software metrics by measuring the similarity using the dice coefficient. The feature selection process is used to minimize the time complexity of software fault prediction. With the selected metrics, software fault perdition with the help of the Quadratic Censored regressive convolution deep neural network-based classification. The deep learning classifier analyzes the training and testing samples using the contingency correlation coefficient. The softstep activation function is used to provide the final fault prediction results. To minimize the error, the Nelder–Mead method is applied to solve non-linear least-squares problems. Finally, accurate classification results with a minimum error are obtained at the output layer. Experimental evaluation is carried out with different quantitative metrics such as accuracy, precision, recall, F-measure, and time complexity. The analyzed results demonstrate the superior performance of our proposed SQADEN technique with maximum accuracy, sensitivity and specificity by 3%, 3%, 2% and 3% and minimum time and space by 13% and 15% when compared with the two sta
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data *** paper focuses on secure vehicular data communications in the Named Data Networking(NDN).I...
详细信息
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data *** paper focuses on secure vehicular data communications in the Named Data Networking(NDN).In NDN,names,provider IDs and data are transmitted in plaintext,which exposes vehicular data to security threats and leads to considerable data communication costs and failure *** paper proposes a Secure vehicular Data Communication(SDC)approach in NDN to supress data communication costs and failure *** constructs a vehicular backbone to reduce the number of authenticated nodes involved in reverse *** the ciphtertext of the name and data is included in the signed Interest and Data and transmitted along the backbone,so the secure data communications are *** is evaluated,and the data results demonstrate that SCD achieves the above objectives.
Graph neural networks (GNNs) have gained increasing popularity, while usually suffering from unaffordable computations for real-world large-scale applications. Hence, pruning GNNs is of great need but largely unexplor...
详细信息
Graph neural networks (GNNs) have gained increasing popularity, while usually suffering from unaffordable computations for real-world large-scale applications. Hence, pruning GNNs is of great need but largely unexplored. The recent work Unified GNN Sparsification (UGS) studies lottery ticket learning for GNNs, aiming to find a subset of model parameters and graph structures that can best maintain the GNN performance. However, it is tailed for the transductive setting, failing to generalize to unseen graphs, which are common in inductive tasks like graph classification. In this work, we propose a simple and effective learning paradigm, Inductive Co-Pruning of GNNs (ICPG), to endow graph lottery tickets with inductive pruning capacity. To prune the input graphs, we design a predictive model to generate importance scores for each edge based on the input. To prune the model parameters, it views the weight’s magnitude as their importance scores. Then we design an iterative co-pruning strategy to trim the graph edges and GNN weights based on their importance scores. Although it might be strikingly simple, ICPG surpasses the existing pruning method and can be universally applicable in both inductive and transductive learning settings. On 10 graph-classification and two node-classification benchmarks, ICPG achieves the same performance level with 14.26%–43.12% sparsity for graphs and 48.80%–91.41% sparsity for the GNN model.
暂无评论