Low-light image enhancement (LLIE) in Raw space has posed a challenge in the field of image processing and computational photography. Different from image processing in sRGB space, Raw images store more image informat...
详细信息
Domain generalization (DG) aims to solve the problem of significant performance degradation when target domain data collected from the Out-Of-Distribution (O.O.D). Previous efforts try to exploit invariant features in...
详细信息
Due to the limited computing resources of both mobile devices (MDs) and the mobile edge computing (MEC) server, devising reasonable strategies for MD task offloading, MEC server resource pricing, and resource allocati...
详细信息
In order to further improve the teaching quality of multimedia teaching in school daily teaching, a classroom facial expression emotion recognition model is proposed based on convolutional neural network. VGGNet and C...
详细信息
Industrial process plants use emergency shutdown valves(ESDVs)as safety barriers to protect against hazardous events,bringing the plant to a safe state when potential danger is *** ESDVs are used extensively in offsho...
详细信息
Industrial process plants use emergency shutdown valves(ESDVs)as safety barriers to protect against hazardous events,bringing the plant to a safe state when potential danger is *** ESDVs are used extensively in offshore oil and gas processing plants and have been mandated in the design of such systems from national and international standards and *** paper has used actual ESDV operating data from four mid/late life oil and gas production platforms in the North Sea to research operational relationships that are of interest to those responsible for the technical management and operation of *** first of the two relationships is between the closure time(CT)of the ESDV and the time it remains in the open position,prior to the close *** has been hypothesised that the CT of the ESDV is affected by the length of time that it has been open prior to being closed(Time since the last stroke).In addition to the general analysis of the data series,two sub-categories were created to further investigate this possible relationship for CT and these are“above mean”and“below mean”.The correlations(Pearson's based)resulting from this analysis are in the“weak”and“very weak”*** second relationship investigated was the effect of very frequent closures to assess if this improves the *** operational records for six subjects were analysed to find closures that occurred within a 24 h period of each ***,no discriminating trend was apparent where CT was impacted positively or negatively by the frequent closure *** was concluded that the variance of ESDV closure time cannot be influenced by the technical management of the ESDV in terms of scheduling the operation of the ESDV.
A multi-strategy hybrid whale optimization algorithm(MSHWOA)for complex constrained optimization problems is proposed to overcome the drawbacks of easily trapping into local optimum,slow convergence speed and low opti...
详细信息
A multi-strategy hybrid whale optimization algorithm(MSHWOA)for complex constrained optimization problems is proposed to overcome the drawbacks of easily trapping into local optimum,slow convergence speed and low optimization ***,the population is initialized by introducing the theory of good point set,which increases the randomness and diversity of the population and lays the foundation for the global optimization of the ***,a novel linearly update equation of convergence factor is designed to coordinate the abilities of exploration and *** the same time,the global exploration and local exploitation capabilities are improved through the siege mechanism of Harris Hawks optimization ***,the simulation experiments are conducted on the 6 benchmark functions and Wilcoxon rank sum test to evaluate the optimization performance of the improved *** experimental results show that the proposed algorithm has more significant improvement in optimization accuracy,convergence speed and robustness than the comparison algorithm.
Lightweight video representation techniques have advanced significantly for simple activity recognition, but they still encounter several issues when applied to complex activity recognition: (i) The presence of numero...
详细信息
Due to complex noise environments, it is difficult to extract bearing fault features from vibration signal and it affects the accuracy of fault diagnosis. To solve the problem, this paper proposes a multi-channel para...
详细信息
Blasting in surface mines aims to fragment rock masses to a proper ***,flyrock is an undesirable effect of blasting that can result in human *** this study,support vector regression(SVR)is combined with four algorithm...
详细信息
Blasting in surface mines aims to fragment rock masses to a proper ***,flyrock is an undesirable effect of blasting that can result in human *** this study,support vector regression(SVR)is combined with four algorithms:gravitational search algorithm(GSA),biogeography-based optimization(BBO),ant colony optimization(ACO),and whale optimization algorithm(WOA)for predicting flyrock in two surface mines in ***,three other methods,including artificial neural network(ANN),kernel extreme learning machine(KELM),and general regression neural network(GRNN),are employed,and their performances are compared to those of four hybrid SVR *** modeling,the measured and predicted flyrock values are validated with some performance indices,such as root mean squared error(RMSE).The results revealed that the SVR-WOA model has the most optimal accuracy,with an RMSE of 7.218,while the RMSEs of the KELM,GRNN,SVR-GSA,ANN,SVR-BBO,and SVR-ACO models are 10.668,10.867,15.305,15.661,16.239,and 18.228,***,combining WOA and SVR can be a valuable tool for accurately predicting flyrock distance in surface mines.
A game measurement model considering the attacker’s knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of *...
详细信息
A game measurement model considering the attacker’s knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of *** quantified the sensitive level of information according to the user’s personalized sensitive information protection *** on the probability distribution of sensitive level and attacker’s knowledge background type,the strategy combination of service provider and attacker was analyzed,and a game-based sensitive information protection model was *** the combination of strategies under Bayesian equilibrium,the information entropy was used to measure the leakage of sensitive ***,in the paper the influence of the sensitive level of information and the attacker’s knowledge background on the strategy of both sides of the game was considered *** on,the leakage of the user’s sensitive information was ***,the feasibility of the model was described by experiments.
暂无评论