Due to their biological interpretability,memristors are widely used to simulate synapses between artificial neural *** a type of neural network whose dynamic behavior can be explained,the coupling of resonant tunnelin...
详细信息
Due to their biological interpretability,memristors are widely used to simulate synapses between artificial neural *** a type of neural network whose dynamic behavior can be explained,the coupling of resonant tunneling diode-based cellular neural networks(RTD-CNNs)with memristors has rarely been reported in the ***,this paper designs a coupled RTD-CNN model with memristors(RTD-MCNN),investigating and analyzing the dynamic behavior of the *** on this model,a simple encryption scheme for the protection of digital images in police forensic applications is *** results show that the RTD-MCNN can have two positive Lyapunov exponents,and its output is influenced by the initial values,exhibiting ***,a set of amplitudes in its output sequence is affected by the internal parameters of the memristor,leading to nonlinear ***,the rich dynamic behaviors described above make the RTD-MCNN highly suitable for the design of chaos-based encryption schemes in the field of privacy *** tests and security analyses validate the effectiveness of this scheme.
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received c...
详细信息
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received considerable attention in transmitting data and ensuring data confidentiality among cloud servers and users. Various traditional image retrieval techniques regarding security have developed in recent years but they do not apply to large-scale environments. This paper introduces a new approach called Triple network-based adaptive grey wolf (TN-AGW) to address these challenges. The TN-AGW framework combines the adaptability of the Grey Wolf Optimization (GWO) algorithm with the resilience of Triple Network (TN) to enhance image retrieval in cloud servers while maintaining robust security measures. By using adaptive mechanisms, TN-AGW dynamically adjusts its parameters to improve the efficiency of image retrieval processes, reducing latency and utilization of resources. However, the image retrieval process is efficiently performed by a triple network and the parameters employed in the network are optimized by Adaptive Grey Wolf (AGW) optimization. Imputation of missing values, Min–Max normalization, and Z-score standardization processes are used to preprocess the images. The image extraction process is undertaken by a modified convolutional neural network (MCNN) approach. Moreover, input images are taken from datasets such as the Landsat 8 dataset and the Moderate Resolution Imaging Spectroradiometer (MODIS) dataset is employed for image retrieval. Further, the performance such as accuracy, precision, recall, specificity, F1-score, and false alarm rate (FAR) is evaluated, the value of accuracy reaches 98.1%, the precision of 97.2%, recall of 96.1%, and specificity of 917.2% respectively. Also, the convergence speed is enhanced in this TN-AGW approach. Therefore, the proposed TN-AGW approach achieves greater efficiency in image retrieving than other existing
Instance co-segmentation aims to segment the co-occurrent instances among two *** task heavily relies on instance-related cues provided by co-peaks,which are generally estimated by exhaustively exploiting all paired c...
详细信息
Instance co-segmentation aims to segment the co-occurrent instances among two *** task heavily relies on instance-related cues provided by co-peaks,which are generally estimated by exhaustively exploiting all paired candidates in point-to-point ***,such patterns could yield a high number of false-positive co-peaks,resulting in over-segmentation whenever there are mutual *** tackle with this issue,this paper proposes an instance co-segmentation method via tensor-based salient co-peak search(TSCPS-ICS).The proposed method explores high-order correlations via triple-to-triple matching among feature maps to find reliable co-peaks with the help of co-saliency *** proposed method is shown to capture more accurate intra-peaks and inter-peaks among feature maps,reducing the false-positive rate of co-peak *** having accurate co-peaks,one can efficiently infer responses of the targeted *** on four benchmark datasets validate the superior performance of the proposed method.
The most widely farmed fruit in the world is *** the production and quality of the mangoes are hampered by many *** diseases need to be effectively controlled and ***,a quick and accurate diagnosis of the disorders is...
详细信息
The most widely farmed fruit in the world is *** the production and quality of the mangoes are hampered by many *** diseases need to be effectively controlled and ***,a quick and accurate diagnosis of the disorders is *** convolutional neural networks,renowned for their independence in feature extraction,have established their value in numerous detection and classification ***,it requires large training datasets and several parameters that need careful *** proposed Modified Dense Convolutional Network(MDCN)provides a successful classification scheme for plant diseases affecting mango *** model employs the strength of pre-trained networks and modifies them for the particular context of mango leaf diseases by incorporating transfer learning *** data loader also builds mini-batches for training the models to reduce training ***,optimization approaches help increase the overall model’s efficiency and lower computing *** employed on the MangoLeafBD Dataset consists of a total of 4,000 *** the experimental results,the proposed system is compared with existing techniques and it is clear that the proposed algorithm surpasses the existing algorithms by achieving high performance and overall throughput.
In the past decade, thanks to the powerfulness of deep-learning techniques, we have witnessed a whole new era of automated code generation. To sort out developments, we have conducted a comprehensive review of solutio...
详细信息
In the past decade, thanks to the powerfulness of deep-learning techniques, we have witnessed a whole new era of automated code generation. To sort out developments, we have conducted a comprehensive review of solutions to deep learning-based code generation. In this survey, we generally formalize the pipeline and procedure of code generation and categorize existing solutions according to taxonomy from perspectives of architecture, model-agnostic enhancing strategy, metrics, and tasks. In addition, we outline the challenges faced by current dominant large models and list several plausible directions for future research. We hope that this survey may provide handy guidance to understanding, utilizing, and developing deep learning-based code-generation techniques for researchers and practitioners.
Existing deep clustering approaches often struggle with redundant feature learning, which limits their effectiveness. The primary goal of this study is to address these issues by developing a more robust deep clusteri...
详细信息
Skin cancer is a serious and potentially life-threatening condition caused by DNA damage in the skin cells, leading to genetic mutations and abnormal cell growth. These mutations can cause the cells to divide and grow...
详细信息
Skin cancer is a serious and potentially life-threatening condition caused by DNA damage in the skin cells, leading to genetic mutations and abnormal cell growth. These mutations can cause the cells to divide and grow uncontrollably, forming a tumor on the skin. To prevent skin cancer from spreading and potentially leading to serious complications, it's critical to identify and treat it as early as possible. An innovative two-fold deep learning based skin cancer detection model is presented in this research work. Five main stages make up the proposed model: Preprocessing, segmentation, feature extraction, feature selection, and skin cancer detection. Initially, the Min–max contrast stretching and median filtering used to pre-process the collected raw image. From the pre-processed image, the Region of Intertest (ROI) is identified via optimized mask Region-based Convolutional Neural Network (R-CNN). Then, from the identified ROI areas, the texture features like Illumination-invariant Binary Gabor Pattern (II-BGP), Local Binary Pattern (LBP), Gray-Level Co-occurrence Matrix (GLCM), Color feature such as Color Correlogram and Histogram Intersection, and Shape feature including Moments, Area, Perimeter, Eccentricity, Average bending energy are extracted. To choose the optimal features from the extracted ones, the Golden Eagle Mutated Leader Optimization (GEMLO) is used. The proposed Golden Eagle Mutated Leader Optimization (GEMLO) is the conceptual amalgamation of the standard Mutated Leader Algorithm (MLA) and Golden Eagle Optimizer are used to select best features (GEO). The skin cancer detection is accomplished via two-fold-deep-learning-classifiers, that includes the Fully Convolutional Neural Networks (FCNs) and Multi-Layer Perception (MLP). The final outcome is the combination of the outcomes acquired from Fully Convolutional Neural Networks (FCNs) and Multi-Layer Perception (MLP). The PYTHON platform is being used to implement the suggested model. Using the curre
In the fields of intelligent transportation and multi-task cooperation, many practical problems can be modeled by colored traveling salesman problem(CTSP). When solving large-scale CTSP with a scale of more than 1000d...
详细信息
In the fields of intelligent transportation and multi-task cooperation, many practical problems can be modeled by colored traveling salesman problem(CTSP). When solving large-scale CTSP with a scale of more than 1000dimensions, their convergence speed and the quality of their solutions are limited. This paper proposes a new hybrid IT?(HIT?) algorithm, which integrates two new strategies, crossover operator and mutation strategy, into the standard IT?. In the iteration process of HIT?, the feasible solution of CTSP is represented by the double chromosome coding, and the random drift and wave operators are used to explore and develop new unknown regions. In this process, the drift operator is executed by the improved crossover operator, and the wave operator is performed by the optimized mutation strategy. Experiments show that HIT? is superior to the known comparison algorithms in terms of the quality solution.
1 Introduction In recent years,foundation Vision-Language Models(VLMs),such as CLIP[1],which empower zero-shot transfer to a wide variety of domains without fine-tuning,have led to a significant shift in machine learn...
详细信息
1 Introduction In recent years,foundation Vision-Language Models(VLMs),such as CLIP[1],which empower zero-shot transfer to a wide variety of domains without fine-tuning,have led to a significant shift in machine learning *** the impressive capabilities,it is concerning that the VLMs are prone to inheriting biases from the uncurated datasets scraped from the Internet[2–5].We examine these biases from three perspectives.(1)Label bias,certain classes(words)appear more frequently in the pre-training data.(2)Spurious correlation,non-target features,e.g.,image background,that are correlated with labels,resulting in poor group robustness.(3)Social bias,which is a special form of spurious correlation,focuses on societal *** image-text pairs might contain human prejudice,e.g.,gender,ethnicity,and age,that are correlated with *** biases are subsequently propagated to downstream tasks,leading to biased predictions.
Numerical simulation is employed to investigate the initial state of avalanche in polydisperse particle *** and propagation processes are illustrated for pentadisperse and triadisperse particle systems,*** these proce...
详细信息
Numerical simulation is employed to investigate the initial state of avalanche in polydisperse particle *** and propagation processes are illustrated for pentadisperse and triadisperse particle systems,*** these processes,particles involved in the avalanche grow slowly in the early stage and explosively in the later stage,which is clearly different from the continuous and steady growth trend in the monodisperse *** examining the avalanche propagation,the number growth of particles involved in the avalanche and the slope of the number growth,the initial state can be divided into three stages:T1(nucleation stage),T2(propagation stage),T3(overall avalanche stage).We focus on the characteristics of the avalanche in the T2 stage,and find that propagation distances increase almost linearly in both axial and radial directions in polydisperse *** also consider the distribution characteristics of the average coordination number and average velocity for the moving *** results support that the polydisperse particle systems are more stable in the T2 stage.
暂无评论