This paper introduces a lightweight Semantic-guided Mutually Reinforcing network (SMR-Net) for the tasks of cross-modal image fusion and salient object detection (SOD). The core concept of SMR-Net is to leverage seman...
详细信息
Text-to-image synthesis refers to generating visual-realistic and semantically consistent images from given textual descriptions. Previous approaches generate an initial low-resolution image and then refine it to be h...
详细信息
Text-to-image synthesis refers to generating visual-realistic and semantically consistent images from given textual descriptions. Previous approaches generate an initial low-resolution image and then refine it to be high-resolution. Despite the remarkable progress, these methods are limited in fully utilizing the given texts and could generate text-mismatched images, especially when the text description is complex. We propose a novel finegrained text-image fusion based generative adversarial networks(FF-GAN), which consists of two modules: Finegrained text-image fusion block(FF-Block) and global semantic refinement(GSR). The proposed FF-Block integrates an attention block and several convolution layers to effectively fuse the fine-grained word-context features into the corresponding visual features, in which the text information is fully used to refine the initial image with more details. And the GSR is proposed to improve the global semantic consistency between linguistic and visual features during the refinement process. Extensive experiments on CUB-200 and COCO datasets demonstrate the superiority of FF-GAN over other state-of-the-art approaches in generating images with semantic consistency to the given texts.
In this paper, for time-delayed reaction–diffusion neural networks (TDRDNNs) with matched and unmatched disturbances, we propose a backstepping-based mixed boundary control strategy integrating higher-order sliding m...
详细信息
This paper analyzes the influence of power and dimension of artificial noise (AN) on security performance of multiple-input multiple-output (MIMO) system with multiple randomly located eavesdroppers. We derive the clo...
详细信息
Recently, large language models (LLMs) have significantly improved the performance of text-to-SQL systems. Nevertheless, many state-of-the-art (SOTA) approaches have overlooked the critical aspect of system robustness...
详细信息
Credit card fraud has been a noted security issue that requires financial organisations to continuously improve their fraud detection system. In most cases, a credit transaction dataset is expected to have a significa...
详细信息
The development of the Internet of Things (IoT) has made the traditional Consumer Electronics (CE) evolve into a next-generation CE with many intelligent application which generates a large number of computing-intensi...
详细信息
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t...
详细信息
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts to investigate and enhance the security of smart home *** a more secure smart home ecosystem,we present a detailed literature review on the security of smart home ***,we categorize smart home systems’security issues into the platform,device,and communication *** exploring the research and specific issues in each of these security areas,we summarize the root causes of the security flaws in today's smart home systems,which include the heterogeneity of internal components of the systems,vendors'customization,the lack of clear responsibility boundaries and the absence of standard security ***,to better understand the security of smart home systems and potentially provide better protection for smart home systems,we propose research directions,including automated vulnerability mining,vigorous security checking,and data-driven security analysis.
To evaluate and extract information from multimedia material including photos, videos, and audio, a fusion of image processing and computer vision methods known as kernel principal component analysis (KPCA) is used. T...
详细信息
Scrap is one of the main raw materials in converter steelmaking. Due to the wide variety of scrap and the significant differences in its prices, the proportioning of scrap presents a challenge in converter steelmaking...
详细信息
Scrap is one of the main raw materials in converter steelmaking. Due to the wide variety of scrap and the significant differences in its prices, the proportioning of scrap presents a challenge in converter steelmaking. This paper explores the optimal proportioning method of scrap for converters using an optimization mathematical model. Initially, the melting characteristics of scrap after being added to the converter's molten iron were investigated using finite element numerical simulations. The study found that when the weight of the scrap is fixed, both the shape and type of the scrap significantly influence the melting time. Subsequently, employing mathematical optimization methods and considering comprehensive process parameters of the 210t converter smelting, including the composition and unit price of the scrap, as well as the requirements of the converter steelmaking process for scrap, an optimization model for the proportioning of scrap in converters was *** model was solved using computer programming languages. Through this optimization model, it is possible to obtain the lowest cost per ton of molten steel in the converter smelting process by determining the optimal proportions of various types of scrap.
暂无评论