Fruit and Vegetable Recognition with Calorie Estimation based on Mobilenetv2 is a pioneering research endeavor aimed at leveraging deep learning techniques to enhance dietary monitoring and health management. Building...
详细信息
ISBN:
(数字)9798350383867
ISBN:
(纸本)9798350383874
Fruit and Vegetable Recognition with Calorie Estimation based on Mobilenetv2 is a pioneering research endeavor aimed at leveraging deep learning techniques to enhance dietary monitoring and health management. Building upon the success of neural network models in various domains, this study explores the application of Mobilenetv2 and EfficientNet architecture for accurately identifying fruits and vegetables from images and estimating their respective caloric content. The research dataset comprises meticulously curated images of diverse fruits and vegetables, ensuring comprehensive coverage across different categories. Through rigorous experimentation and evaluation, the proposed model demonstrates remarkable accuracy in fruit and vegetable recognition, achieving an impressive accuracy rate of 97.6%. Moreover, the incorporation of calorie estimation adds a novel dimension to dietary analysis, enabling users to make informed decisions regarding their nutritional intake. The findings of this research not only contribute to the advancement of computer vision techniques but also hold significant implications for personalized nutrition tracking and health- conscious applications.
The previous relation-based knowledge distillation methods tend to construct global similarity relationship matrix in a mini-batch while ignoring the knowledge of neighbourhood relationship. In this paper, we propose ...
The previous relation-based knowledge distillation methods tend to construct global similarity relationship matrix in a mini-batch while ignoring the knowledge of neighbourhood relationship. In this paper, we propose a new similarity-based relational knowledge distillation method that transfers neighbourhood relationship knowledge by selecting K-nearest neighbours for each sample. Our method consists of two components: Neighbourhood Feature Relationship Distillation and Neighbourhood Logits Relationship Distillation. We perform extensive experiments on CIFAR100 and Tiny ImageNet classification datasets and show that our method outperforms the state-of-the-art knowledge distillation methods. Our code is available at: https://***/xinxiaoxiaomeng/***.
Locate-then-Edit Knowledge Editing (LEKE) is a key technique for updating large language models (LLMs) without full retraining. However, existing methods assume a single-user setting and become inefficient in real-wor...
详细信息
We tackle the online 3 D bin packing problem(3 D-BPP), a challenging yet practically useful variant of the classical bin packing problem. In this problem, the items are delivered to the agent without informing the ful...
详细信息
We tackle the online 3 D bin packing problem(3 D-BPP), a challenging yet practically useful variant of the classical bin packing problem. In this problem, the items are delivered to the agent without informing the full sequence information. The agent must directly pack these items into the target bin stably without changing their arrival order, and no further adjustment is permitted. Online 3 D-BPP can be naturally formulated as a Markov decision process(MDP). We adopt deep reinforcement learning, in particular, the on-policy actor-critic framework, to solve this MDP with constrained action space. To learn a practically feasible packing policy, we propose three critical designs. First, we propose an online analysis of packing stability based on a novel stacking tree. It attains a high analysis accuracy while reducing the computational complexity from O(N2) to O(N log N), making it especially suited for reinforcement learning training. Second, we propose a decoupled packing policy learning for different dimensions of placement which enables high-resolution spatial discretization and hence high packing precision. Third, we introduce a reward function that dictates the robot to place items in a far-to-near order and therefore simplifies the collision avoidance in movement planning of the robotic arm. Furthermore, we provide a comprehensive discussion on several key implemental issues. The extensive evaluation demonstrates that our learned policy outperforms the state-of-the-art methods significantly and is practically usable for real-world applications.
The concept of Digital Twin has been widely used by researchers to represent physical entities in computer-generated reality in the metaverse. In this research, a novel concept of 'Mobile Twin' is coined. Mobi...
详细信息
The collaboration between clouds and edges unlocks the full potential of edge-cloud systems. Edge-cloud platform has brought about significant decentralization, heterogeneity, complexity, and instability. These charac...
详细信息
ISBN:
(数字)9798350383508
ISBN:
(纸本)9798350383515
The collaboration between clouds and edges unlocks the full potential of edge-cloud systems. Edge-cloud platform has brought about significant decentralization, heterogeneity, complexity, and instability. These characteristics have posed unprecedented challenges to the optimal scheduling problem in the edge-cloud system, including inaccurate decision-making and slow convergence. In this paper, we propose a curiosity-driven collaborative request scheduling scheme in edge-cloud systems, namely Cur-CoEdge. To tackle the challenge of inaccurate decision-making, we introduce a time-scale and decision-level interaction mechanism. This mechanism employs a small-large-time-scale scheduling learning framework, facilitating mutual learning between different decision levels. To address the challenge of slow convergence, we investigate the underlying reasons, such as the sparse reward-setting in reinforcement learning. In response, we develop a curiosity-driven collaborative exploration approach that fosters intrinsic curiosity in the cloud and simultaneously motivates dispatchers to explore the environment both individually and collectively. The effectiveness of this collaborative exploration is also supported by theoretical proof of convergence. Finally, we implement a prototype system on a network hardware system along with two real-world traces. Evaluations demonstrate significant improvements, with up to a 26% increase in time efficiency, a 40% rise in system throughput, and a 71% enhancement in convergence speed.
Semantic Overlap Summarization (SOS) is a constrained multi-document summarization task, where the constraint is to capture the common/overlapping information between two alternative narratives. While recent advanceme...
详细信息
The integration of Unmanned Aerial Vehicles (UAVs) in smart agriculture has significantly enhanced precision farming practices, enabling real-time monitoring and data collection for improved crop management. However, ...
详细信息
ISBN:
(数字)9798350304053
ISBN:
(纸本)9798350304060
The integration of Unmanned Aerial Vehicles (UAVs) in smart agriculture has significantly enhanced precision farming practices, enabling real-time monitoring and data collection for improved crop management. However, the reliance on wireless communication in UAV networks poses security challenges that can compromise the integrity and confidentiality of sensitive agricultural data. This paper proposes a novel approach to address these concerns through the incorporation of blockchain technology for secure communication in UAV networks deployed for smart agriculture. The proposed system leverages the decentralized and tamper-resistant nature of blockchain to establish a trust-based communication framework. Each UAV node in the network is equipped with a blockchain-enabled communication protocol, ensuring that data exchanges are securely recorded in an immutable ledger. This not only enhances data integrity but also mitigates the risk of unauthorized access and manipulation. To facilitate secure communication, smart contracts are employed to automate and enforce predefined rules governing data transactions within the UAV network. This ensures that only authenticated and authorized entities can access and modify agricultural data, fostering a transparent and accountable ecosystem. Additionally, cryptographic techniques such as public-key encryption enhance the confidentiality of transmitted data, safeguarding sensitive information from eavesdropping and unauthorized interception. The proposed blockchain-enabled secure communication system is further enhanced by incorporating consensus mechanisms that validate and confirm the integrity of data across the network. By doing so, the trustworthiness of the entire UAV network is strengthened, reducing the likelihood of malicious activities and enhancing overall system resilience.
Variational Autoencoder (VAE), as one of the main generative models, has a powerful representation learning capability. However, the hidden space representation learned by VAE is a high-dimensional and complex vector ...
详细信息
暂无评论