Preserving details and avoiding high computational costs are the two main challenges for the High-Resolution Salient Object Detection (HRSOD) task. In this paper, we propose a two-stage HRSOD model from the perspectiv...
详细信息
Preserving details and avoiding high computational costs are the two main challenges for the High-Resolution Salient Object Detection (HRSOD) task. In this paper, we propose a two-stage HRSOD model from the perspective of evolution and succession, including an evolution stage with Low-resolution Location Model (LrLM) and a succession stage with High-resolution Refinement Model (HrRM). The evolution stage achieves detail-preserving salient objects localization on the low-resolution image through the evolution mechanisms on supervision and feature;the succession stage utilizes the shallow high-resolution features to complement and enhance the features inherited from the first stage in a lightweight manner and generate the final high-resolution saliency prediction. Besides, a new metric named Boundary-Detail-aware Mean Absolute Error (MAEBD) is designed to evaluate the ability to detect details in high-resolution scenes. Extensive experiments on five datasets demonstrate that our network achieves superior performance at real-time speed (49 FPS) compared to state-of-the-art methods. Our code is publicly available at: https://***/rmcong/ESNet_ICML24. Copyright 2024 by the author(s)
A $\mathfrak{C^{*}}$ -circuit, which was proposed in Asiacypt 2022 by Huang and Sun (Advances in cryptology – ASIACRYPT 2022, pp. 614–644, 2022), can directly perform calculations with the existing quantum ...
A $\mathfrak{C^{*}}$ -circuit, which was proposed in Asiacypt 2022 by Huang and Sun (Advances in cryptology – ASIACRYPT 2022, pp. 614–644, 2022), can directly perform calculations with the existing quantum states, thereby reducing the use of quantum resources in quantum logic synthesis. We theoretically prove how to convert a $\mathfrak{C^{0}}$ -circuit into the corresponding $\mathfrak{C^{*}}$ -circuit through two lemmas and one theorem. The first lemma proves the interchangeability of CNOT gates and NOT gates by using the equivalence of quantum circuits. The second lemma proves that adding CNOT gates to the front of a quantum circuit whose initial states are all $|0\rangle $ s will not change the output states of the circuit. The theorem is used to describe what kind of $\mathfrak{C^{0}}$ -circuit can be transformed into $\mathfrak{C^{*}}$ -circuit, and the correctness of this transformation is proved. Our work will provide a theoretical basis for converting $\mathfrak{C^{0}}$ -circuit to $\mathfrak{C^{*}}$ -circuit. Then applying the theoretical analysis results to the multiplication over $\text{GF}(2^{8})$ , the constructed quantum circuit needs 27 Toffoli gates and 118 CNOT gates, which is 15 fewer Toffoli gates and 43 CNOT gates than the current best result. This shows that the method of constructing quantum circuits by using the conversion of $\mathfrak{C^{0}}$ -circuit to $\mathfrak{C^{*}}$ -circuit is very efficient.
The multiscale evaluation technique is a low-power facts aggregation method using numerous evaluation scales to mix data from several properties. The method is based on multiscale structures, in which more than one sc...
详细信息
This research addresses the escalating threats to industrial control systems by introducing a novel approach that combines deep learning for feature selection with a robust ensemble-based classification technique to e...
详细信息
In an era when edge computing rapidly evolves, this study addresses the significant difficulty of real-time object identification on resource-constrained edge devices. We provide a unique neural network model for edge...
详细信息
Variational quantum algorithms require many measurements to train parameters in their circuit to solve a given problem. If we need a highly accurate solution, the further number of measurements increases. However, the...
详细信息
Pupil dynamics are the important characteristics of face spoofing *** face recognition system is one of the most used biometrics for authenticating individual *** main threats to the facial recognition system are diff...
详细信息
Pupil dynamics are the important characteristics of face spoofing *** face recognition system is one of the most used biometrics for authenticating individual *** main threats to the facial recognition system are different types of presentation attacks like print attacks,3D mask attacks,replay attacks,*** proposed model uses pupil characteristics for liveness detection during the authentication *** pupillary light reflex is an involuntary reaction controlling the pupil’s diameter at different light *** proposed framework consists of two-phase *** the first phase,the pupil’s diameter is calculated by applying stimulus(light)in one eye of the subject and calculating the constriction of the pupil size on both eyes in different video *** above measurement is converted into feature space using Kohn and Clynes model-defined *** Support Vector Machine is used to classify legitimate subjects when the diameter change is normal(or when the eye is alive)or illegitimate subjects when there is no change or abnormal oscillations of pupil behavior due to the presence of printed photograph,video,or 3D mask of the subject in front of the *** the second phase,we perform the facial recognition ***-invariant feature transform(SIFT)is used to find the features from the facial images,with each feature having a size of a 128-dimensional *** features are scale,rotation,and orientation invariant and are used for recognizing facial *** brute force matching algorithm is used for matching features of two different *** threshold value we considered is 0.08 for good *** analyze the performance of the framework,we tested our model in two Face antispoofing datasets named Replay attack datasets and CASIA-SURF datasets,which were used because they contain the videos of the subjects in each sample having three modalities(RGB,IR,Depth).The CASIA-SURF datasets showed an 89.9%Equal Err
Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial *** UAVs and autopilot systems support it,and it provides bi-directional communication between the UAV and Grou...
详细信息
Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial *** UAVs and autopilot systems support it,and it provides bi-directional communication between the UAV and Ground Control *** communications contain critical information about the UAV status and basic control commands sent from GCS to UAV and UAV to *** order to increase the transfer speed and efficiency,the Mavlink does not encrypt the *** a result,the protocol is vulnerable to various security attacks such as Eavesdropping,GPS Spoofing,and *** this study,we tackle the problem and secure the Mavlink communication *** leveraging the Mavlink packet’s vulnerabilities,this research work introduces an experiment in which,first,the Mavlink packets are compromised in terms of security requirements based on our threat *** results show that the protocol is insecure and the attacks carried out are *** overcomeMavlink security,an additional security layer is added to encrypt and secure the *** encryption technique is proposed that makes the communication between the UAV and GCS *** results show that the Mavlink packets are encrypted using our technique without affecting the performance and *** results are validated in terms of transfer speed,performance,and efficiency compared to the literature solutions such as MAVSec and benchmarked with the original Mavlink *** achieved results have significant improvement over the literature and Mavlink in terms of security.
Alzheimer’s disease(AD)is a neurological disorder that predominantly affects the *** the coming years,it is expected to spread rapidly,with limited progress in diagnostic *** machine learning(ML)and artificial intell...
详细信息
Alzheimer’s disease(AD)is a neurological disorder that predominantly affects the *** the coming years,it is expected to spread rapidly,with limited progress in diagnostic *** machine learning(ML)and artificial intelligence(AI)algorithms have been employed to detect AD using single-modality ***,recent developments in ML have enabled the application of these methods to multiple data sources and input modalities for AD *** this study,we developed a framework that utilizes multimodal data(tabular data,magnetic resonance imaging(MRI)images,and genetic information)to classify *** part of the pre-processing phase,we generated a knowledge graph from the tabular data and MRI *** employed graph neural networks for knowledge graph creation,and region-based convolutional neural network approach for image-to-knowledge graph ***,we integrated various explainable AI(XAI)techniques to interpret and elucidate the prediction outcomes derived from multimodal ***-wise relevance propagation was used to explain the layer-wise outcomes in the MRI *** also incorporated submodular pick local interpretable model-agnostic explanations to interpret the decision-making process based on the tabular data *** expression values play a crucial role in AD *** used a graphical gene tree to identify genes associated with the ***,a dashboard was designed to display XAI outcomes,enabling experts and medical professionals to easily comprehend the predic-tion results.
暂无评论