Colorectal polyps serve as potential precursors of colorectal cancer and automating polyp segmentation aids physicians in accurately identifying potential polyp regions, thereby reducing misdiagnoses and missed diagno...
详细信息
Warehouse management is an important part of the production process. As a result of the development of technology, more and more companies tend to use automated logistics technologies such as AVS/RS to handle the inte...
详细信息
A person’s privacy has become a growing concern,given the nature of an expansive reliance on real-time video activities with video capture,stream,and *** paper presents an innovative system design based on a privacy-...
详细信息
A person’s privacy has become a growing concern,given the nature of an expansive reliance on real-time video activities with video capture,stream,and *** paper presents an innovative system design based on a privacy-preserving *** proposed system design is implemented by employing an enhanced capability that overcomes today’s single parameterbased access control protection mechanism for digital privacy *** enhanced capability combines multiple access control parameters:facial expression,resource,environment,location,and *** proposed system design demonstrated that a person’s facial expressions combined with a set of access control rules can achieve a person’s privacy-preserving *** findings resulted in different facial expressions successfully triggering a person’s face to be blurred and a person’s privacy when using a real-time video conferencing service captured from a webcam or virtual webcam.A comparison analysis of capabilities between existing designs and the proposed system design shows enhancement of the capabilities of the proposed system.A series of experiments exercising the enhanced,real-time multi-parameterbased system was shown as a viable path forward for preserving a person’s privacy while using a webcam or virtual webcam to capture,stream,and store videos.
Fourier Single-Pixel Imaging (FSPI) can directly obtain the Fourier spectrum of a target scene and reconstruct it. However, the existing FSPI spectrum sampling methods are mostly constrained within a prior range, whic...
详细信息
Most large-scale systems including self-adaptive systems utilize feature models(FMs)to represent their complex architectures and benefit from the reuse of commonalities and variability ***-adaptive systems(SASs)are ca...
详细信息
Most large-scale systems including self-adaptive systems utilize feature models(FMs)to represent their complex architectures and benefit from the reuse of commonalities and variability ***-adaptive systems(SASs)are capable of reconfiguring themselves during the run time to satisfy the scenarios of the requisite ***,reconfiguration of SASs corresponding to each adaptation of the system requires significant computational time and *** process of configuration reuse can be a better alternative to some contexts to reduce computational time,effort and ***,systems’complexity can be reduced while the development process of systems by reusing elements or *** are considered one of the new ways of reuse process that are able to introduce new opportunities for the reuse process beyond the conventional system *** current FM-based modelling techniques represent,manage,and reuse elementary features to model SASs concepts,modeling and reusing configurations have not yet been *** this context,this study presents an extension to FMs by introducing and managing configuration features and their reuse *** results demonstrate that reusing configuration features reduces the effort and time required by a reconfiguration process during the run time to meet the required scenario according to the current context.
The Mandalika Circuit is one of the tourist attractions on the island of Lombok. The circuit is used for MotoGP events which can provide a positive trend for Lombok tourism. Many people provide information and comment...
详细信息
The goal of data-to-text generation is to generate fluent and fidelity natural language based on input data. At present, most models focus on data planning. Generating text according to the planning can effectively im...
详细信息
The Internet of Everything (IoE)-based smart services are becoming more prominent as a result of the growing demands placed on wireless networks. Despite 5G having the ability to serve a wide range of IoE-based applic...
详细信息
Mission critical Machine-type Communication(mcMTC),also referred to as Ultra-reliable Low Latency Communication(URLLC),has become a research *** is primarily characterized by communication that provides ultra-high rel...
详细信息
Mission critical Machine-type Communication(mcMTC),also referred to as Ultra-reliable Low Latency Communication(URLLC),has become a research *** is primarily characterized by communication that provides ultra-high reliability and very low latency to concurrently transmit short commands to a massive number of connected *** the reduction in physical(PHY)layer overhead and improvement in channel coding techniques are pivotal in reducing latency and improving reliability,the current wireless standards dedicated to support mcMTC rely heavily on adopting the bottom layers of general-purpose wireless standards and customizing only the upper *** mcMTC has a significant technical impact on the design of all layers of the communication protocol *** this paper,an innovative bottom-up approach has been proposed for mcMTC applications through PHY layer targeted at improving the transmission reliability by implementing ultra-reliable channel coding scheme in the PHY layer of IEEE 802.11a standard bearing in mind short packet transmission *** achieve this aim,we analyzed and compared the channel coding performance of convolutional codes(CCs),low-density parity-check(LDPC)codes,and polar codes in wireless network on the condition of short data packet *** Viterbi decoding algorithm(VA),logarithmic belief propagation(Log-BP)algorithm,and cyclic redundancy check(CRC)successive cancellation list(SCL)(CRC-SCL)decoding algorithm were adopted to CC,LDPC codes,and polar codes,***,a new PHY layer for mcMTC has been *** reliability of the proposed approach has been validated by simulation in terms of Bit error rate(BER)and packet error rate(PER)***-to-noise ratio(SNR).The simulation results demonstrate that the reliability of IEEE 802.11a standard has been significantly improved to be at PER=10−5 or even better with the implementation of polar *** results also show that the general-purpose wireless net
In order to address the performance bias in modeling on imbalanced datasets of adolescent mental health issues, as well as the issues introduced by existing oversampling methods that do not fully consider sample distr...
详细信息
暂无评论