Recently, single-image SVBRDF capture is formulated as a regression problem, which uses a network to infer four SVBRDF maps from a flash-lit image. However, the accuracy is still not satisfactory since previous approa...
详细信息
Recently, single-image SVBRDF capture is formulated as a regression problem, which uses a network to infer four SVBRDF maps from a flash-lit image. However, the accuracy is still not satisfactory since previous approaches usually adopt endto-end inference strategies. To mitigate the challenge, we propose “auxiliary renderings” as the intermediate regression targets, through which we divide the original end-to-end regression task into several easier sub-tasks, thus achieving better inference accuracy. Our contributions are threefold. First, we design three (or two pairs of) auxiliary renderings and summarize the motivations behind the designs. By our design, the auxiliary images are bumpiness-flattened or highlight-removed, containing disentangled visual cues about the final SVBRDF maps and can be easily transformed to the final maps. Second, to help estimate the auxiliary targets from the input image, we propose two mask images including a bumpiness mask and a highlight mask. Our method thus first infers mask images, then with the help of the mask images infers auxiliary renderings, and finally transforms the auxiliary images to SVBRDF maps. Third, we propose backbone UNets to infer mask images, and gated deformable UNets for estimating auxiliary targets. Thanks to the well designed networks and intermediate images, our method outputs better SVBRDF maps than previous approaches, validated by the extensive comparisonal and ablation experiments. IEEE
Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research *** paper proposes a data forwarding algorithm based on Multidimensional Social Relatio...
详细信息
Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research *** paper proposes a data forwarding algorithm based on Multidimensional Social Relations(MSRR)in SIoT to solve this *** proposed algorithm separates message forwarding into intra-and cross-community forwarding by analyzing interest traits and social connections among *** new metrics are defined:the intensity of node social relationships,node activity,and community *** the community,messages are sent by determining which node is most similar to the sender by weighing the strength of social connections and node *** a node performs cross-community forwarding,the message is forwarded to the most reasonable relay community by measuring the node activity and the connection between *** proposed algorithm was compared to three existing routing algorithms in simulation *** indicate that the proposed algorithmsubstantially improves message delivery efficiency while lessening network overhead and enhancing connectivity and coordination in the SIoT context.
The detection of road defects is crucial for ensuring vehicular safety and facilitating the prompt repair of roadway imperfections. Existing YOLOv8-based models face the following issues: extraction capabilities and i...
详细信息
This paper presents a novel two-stage progressive search approach with unsupervised feature learning and Q-learning (TSLL) to enhance surrogate-assisted evolutionary optimization for medium-scale expensive problems. T...
详细信息
Entity matching is a crucial aspect of data management systems, requiring the identification of real-world entities from diverse expressions. Despite the human ability to recognize equivalences among entities, machine...
详细信息
Malware detection has been a hot spot in cyberspace security and academic research. We investigate the correlation between the opcode features of malicious samples and perform feature extraction, selection and fusion ...
详细信息
Malware detection has been a hot spot in cyberspace security and academic research. We investigate the correlation between the opcode features of malicious samples and perform feature extraction, selection and fusion by filtering redundant features, thus alleviating the dimensional disaster problem and achieving efficient identification of malware families for proper classification. Malware authors use obfuscation technology to generate a large number of malware variants, which imposes a heavy analysis burden on security researchers and consumes a lot of resources in both time and space. To this end, we propose the MalFSM framework. Through the feature selection method, we reduce the 735 opcode features contained in the Kaggle dataset to 16, and then fuse on metadata features(count of file lines and file size)for a total of 18 features, and find that the machine learning classification is efficient and high accuracy. We analyzed the correlation between the opcode features of malicious samples and interpreted the selected features. Our comprehensive experiments show that the highest classification accuracy of MalFSM can reach up to 98.6% and the classification time is only 7.76 s on the Kaggle malware dataset of Microsoft.
Predicting students’academic achievements is an essential issue in education,which can benefit many stakeholders,for instance,students,teachers,managers,*** with online courses such asMOOCs,students’academicrelatedd...
详细信息
Predicting students’academic achievements is an essential issue in education,which can benefit many stakeholders,for instance,students,teachers,managers,*** with online courses such asMOOCs,students’academicrelateddata in the face-to-face physical teaching environment is usually sparsity,and the sample size is *** makes building models to predict students’performance accurately in such an environment even *** paper proposes a Two-WayNeuralNetwork(TWNN)model based on the bidirectional recurrentneural network and graph neural network to predict students’next semester’s course performance using only theirprevious course *** experiments on a real dataset show that our model performs better thanthe baselines in many indicators.
MXenes obtained significant attention in the field of energy storage devices due to their characteristic layered structure,modifiable surface functional groups,large electrochemically active surface,and regulable inte...
详细信息
MXenes obtained significant attention in the field of energy storage devices due to their characteristic layered structure,modifiable surface functional groups,large electrochemically active surface,and regulable interlayer ***,the self-restacking and sluggish ions diffusion kinetics performance of MXenes during the alkali metal ions insertion/extraction process severely impedes their cycle stability and rate *** paper proposes an aniline molecule welding strategy for welding p-phenylenediamine(PPDA) into the interlayers of Ti2C through a dehydration condensation *** welded PPDA molecules can contribute pillar effect to the layered structure of *** pillar effect effectively maintains the structural stability during the sodium ions insertion/extraction process and effectively expands the interlayer spacing of Ti2C from 1.16 to 1.38 nm,thereby enhancing ions diffusion kinetics performance and improving the long-term cycle *** Ti2C-PPDA demonstrates outstanding Na+storage capability,exhibiting a specific capacity of 100.2 mAh·g-1at a current density of 0.1 A·g-1over 960 cycles and delivering a remarkable rate capability 81.2 mAh·g-1at a current density of 5 A·*** study demonstrates that expanding interlayer spacing is a promising strategy to enhance the Na+storage capacity and improve long-term cycling stability,which provides significant guidance for the design of two-dimensional Na+storage materials with high-rate capability and cycle stability.
Container-based virtualization isbecoming increasingly popular in cloud computing due to its efficiency and *** isolation is a fundamental property of *** works have indicated weak resource isolation could cause signi...
详细信息
Container-based virtualization isbecoming increasingly popular in cloud computing due to its efficiency and *** isolation is a fundamental property of *** works have indicated weak resource isolation could cause significant performance degradation for containerized applications and enhanced resource ***,current studies have almost not discussed the isolation problems of page cache which is a key resource for *** leverage memory cgroup to control page cache ***,existing policy introduces two major problems in a container-based ***,containers can utilize more memory than limited by their cgroup,effectively breaking memory ***,the Os kernel has to evict page cache to make space for newly-arrived memory requests,slowing down containerized *** paper performs an empirical study of these problems and demonstrates the performance impacts on containerized *** we propose pCache(precise control of page cache)to address the problems by dividing page cache into private and shared and controlling both kinds of page cache separately and *** do so,pCache leverages two new technologies:fair account(f-account)and evict on demand(EoD).F-account splits the shared page cache charging based on per-container share to prevent containers from using memory for free,enhancing memory *** EoD reduces unnecessary page cache evictions to avoid the performance *** evaluation results demonstrate that our system can effectively enhance memory isolation for containers and achieve substantial performance improvement over the original page cache management policy.
The exponential growth in the scale of power systems has led to a significant increase in the complexity of dispatch problem resolution,particularly within multi-area interconnected power *** complexity necessitates t...
详细信息
The exponential growth in the scale of power systems has led to a significant increase in the complexity of dispatch problem resolution,particularly within multi-area interconnected power *** complexity necessitates the employment of distributed solution methodologies,which are not only essential but also highly *** the realm of computational modelling,the multi-area economic dispatch problem(MAED)can be formulated as a linearly constrained separable convex optimization *** proximal point algorithm(PPA)is particularly adept at addressing such mathematical constructs *** study introduces parallel(PPPA)and serial(SPPA)variants of the PPA as distributed algorithms,specifically designed for the computational modelling of the *** PPA introduces a quadratic term into the objective function,which,while potentially complicating the iterative updates of the algorithm,serves to dampen oscillations near the optimal solution,thereby enhancing the convergence ***,the convergence efficiency of the PPA is significantly influenced by the parameter *** address this parameter sensitivity,this research draws on trend theory from stock market analysis to propose trend theory-driven distributed PPPA and SPPA,thereby enhancing the robustness of the computational *** computational models proposed in this study are anticipated to exhibit superior performance in terms of convergence behaviour,stability,and robustness with respect to parameter selection,potentially outperforming existing methods such as the alternating direction method of multipliers(ADMM)and Auxiliary Problem Principle(APP)in the computational simulation of power system dispatch *** simulation results demonstrate that the trend theory-based PPPA,SPPA,ADMM and APP exhibit significant robustness to the initial value of parameter c,and show superior convergence characteristics compared to the residual balancing ADMM.
暂无评论