There is a growing need for diverse, high-quality stuttered speech data, particularly in the context of Indian languages. This paper introduces Project Boli, a multi-lingual stuttered speech dataset designed to advanc...
详细信息
Establishing global contextual relationships between objects is crucial for weakly supervised semantic segmentation (WSSS) tasks that lack pixel-level labels. Limited by the efficiency of convolutional operations in c...
详细信息
In-context segmentation has drawn increasing attention with the advent of vision foundation models. Its goal is to segment objects using given reference images. Most existing approaches adopt metric learning or masked...
Wentworth Institute of technology is a baccalaureate degree granting institution and in recent years we have also developed several Master's programs. Our department offers several degrees leading to a Bachelor of...
Wentworth Institute of technology is a baccalaureate degree granting institution and in recent years we have also developed several Master's programs. Our department offers several degrees leading to a Bachelor of science in Computer science, Computer Networking, Information technology, Cybersecurity, and datascience. All our programs are designed to be hands-on and expose students to a wide skill set. All our majors need to take several security-related courses. One of the latest security related courses we developed is in Quantum Computing with a focus on security. Quantum Computing is a groundbreaking technology that exploits the laws and properties of quantum mechanics. It can dramatically speed up computations of certain problems and surpass the computation power of modern supercomputers. One notable quantum algorithm we cover in our newly developed course is Grover's algorithm. It is used to search an unstructured database while providing quadratic speedup, compared to its classical counterpart. While demonstrating Grover's algorithm in the classroom, the students raise many questions and explaining all the details of the algorithm is challenging. In this paper, we explain and illustrate the theoretical and implementational challenges and provide examples and solutions.
When some application scenarios need to use semantic segmentation technology, like automatic driving, the primary concern comes to real-time performance rather than extremely high segmentation accuracy. To achieve a g...
详细信息
When implementing zero-trust edge computing, offloading computational tasks and data access through traditional model training and usage approaches can lead to increased latency. Since the traditional methods often in...
详细信息
Businesses are increasingly concerned about insider threats, which highlights the need for effective mitigation strategies. This paper examines the variety of insider threats and provides a thorough plan for lowering ...
详细信息
Lie algorithm combined with differential form Wu's method is used to complete the symmetry classification of partial differential equations(PDEs)containing arbitrary *** process can be reduced to solve a large sys...
详细信息
Lie algorithm combined with differential form Wu's method is used to complete the symmetry classification of partial differential equations(PDEs)containing arbitrary *** process can be reduced to solve a large system of determining equations,which seems rather difficult to solve,then the differential form Wu's method is used to decompose the determining equations into a series of equations,which are easy to *** illustrate the usefulness of this method,we apply it to some test problems,and the results show the performance of the present work.
In recent years, the digital cryptocurrency market has witnessed rapid development, but its asset allocation function has yet to be verified. In this paper, DCC-GARCH model is used to estimate the dynamic correlation ...
详细信息
When uploading multimedia data such as photos or videos on network, they might be covered with mosaic blocks since some private information is not suitable for exposing. In some situation, mosaic images or video frame...
When uploading multimedia data such as photos or videos on network, they might be covered with mosaic blocks since some private information is not suitable for exposing. In some situation, mosaic images or video frames need to be restored or trimmed from them, it is necessary to detect the mosaic so as to discriminate these data for subsequent processing. Up to now, most mosaic detection methods are based on edge detection. However, mosaic regions with similar colors may cause several similar mosaic blocks to be stacked together, which makes it difficult to extract sufficient edge features, and lead to hardly detecting the subsequent mosaic region. In this paper, a line expansion- based mosaic detection method is proposed. First, find the upper left point of a block, expand downward to obtain a vertical line. Second, expand to the right based on vertical line to get the whole rectangular block. Third, repeat above steps until the entire mosaic region is extracted, ignoring the regions that have been marked during extraction. The proposed method is compared with several representative methods under different sizes and stacked mosaic. The experimental results show that the proposed method outperforms the state-of-the-art methods on stacked mosaic.
暂无评论