Changing a person’s posture and low resolution are the key challenges for person re-identification(ReID)in various deep learning *** this paper,we introduce an innovative architecture using a dual attention network t...
详细信息
Changing a person’s posture and low resolution are the key challenges for person re-identification(ReID)in various deep learning *** this paper,we introduce an innovative architecture using a dual attention network that includes an attentionmodule and a joint measurement module of spatial-temporal *** proposed approach can be classified into two main ***,the spatial attention feature map is formed by aggregating features in the spatial ***,the same operation is carried out on the channel dimension to formchannel attention ***,the receptive field size is adjusted adaptively tomitigate the changing person posture ***,we use a joint measurement method for the spatial-temporal information to fully harness the data,and it can also naturally integrate the information into the visual features of supervised ReID and hence overcome the low resolution *** experimental results indicate that our proposed algorithm markedly improves the accuracy in addressing changing human postures and low-resolution issues compared with contemporary leading *** proposed method shows superior outcomes on widely recognized benchmarks,which are the Market-1501,MSMT17,and DukeMTMC-reID ***,the proposed algorithmattains a Rank-1 accuracy of 97.4% and 94.9% mAP(mean Average Precision)on the Market-1501 ***,it achieves a 94.2% Rank-1 accuracy and 91.8% mAP on the DukeMTMC-reID dataset.
In this study, we introduce a novel auction-based algorithm modeled as a decentralized coalition formation game, designed for the complex requirements of large-scale multi-robot task allocation under uncertain demand....
详细信息
In this study, we introduce a novel auction-based algorithm modeled as a decentralized coalition formation game, designed for the complex requirements of large-scale multi-robot task allocation under uncertain demand. This context is particularly illustrative in scenarios where robots are tasked to charge electric vehicles. The algorithm begins by partitioning a composite task sequence into distinct subsets based on spatial similarity principles. Subsequently, we employ a coalition formation game paradigm to coordinate the assembly of robots into cooperative coalitions focused on these distinct subsets. To mitigate the impact of unpredictable task demands on allocations, our approach utilizes the conditional value-at-risk to assess the risk associated with task execution, along with computing the potential revenue of the coalition with an emphasis on risk-related outcomes. Additionally, integrating consensus auctions into the coalition formation framework allows our approach to accommodate assignments for individual robot-task pairings, thus preserving the stability of individual robotic decision autonomy within the coalition structure and assignment distribution. Simulative analyses on a prototypical parking facility layout confirm that our algorithm achieves Nash equilibrium within the coalition structure in polynomial time and demonstrates significant scalability. Compared to competing algorithms, our proposal exhibits superior performance in resilience, task execution efficiency, and reduced overall task completion times. The results demonstrate that our approach is an effective strategy for solving the scheduling challenges encountered by multi-robot systems operating in complex environments. IEEE
To address the challenges of gesture recognition accuracy within human-computer interaction technologies, and to overcome the limitations of single-modal biometric feature recognition - which often falls short in prac...
详细信息
The Wuling Mountains Area(WMA) is one of the important ecological protection areas in central China, known for its rich biodiversity and unique ecological environment. To effectively protect the species resources in t...
详细信息
In recent years, the number of software vulnerabilities has gradually increased, posing a threat to the security of software, and identifying whether there are vulnerabilities in software is crucial for assuring its q...
详细信息
A distributed fault-tolerant formation control law is designed in this paper for multi-agent systems under external disturbances and actuator faults including time-varying loss of effectiveness faults. The initial pos...
详细信息
In this work, the torque rheology, mechanical properties, migration resistance, thermal deformation, and Vicat softening point temperature of PVC plasticized by four environmentally friendly plasticizers are investiga...
详细信息
作者:
Liu, TengfeiHu, YongliLi, MingjieYi, JunfeiChang, XiaojunGao, JunbinYin, BaocaiBeijing University of Technology
Beijing Key Laboratory of Multimedia and Intelligent Software Technology Beijing Institute of Artificial Intelligence School of Information Science and Technology Beijing100124 China Stanford University
Department of Radiation Oncology StanfordCA94305 United States Hunan University
National Engineering Laboratory of Robot Visual Perception and Control Technology College of Electrical and Information Engineering Hunan Changsha410082 China ReLER Laboratory
Australian Artificial Intelligence Institute Faculty of Engineering and Information Technology University of Technology Sydney UltimoNSW2007 Australia University of Sydney Business School
The University of Sydney Discipline of Business Analytics CamperdownNSW2006 Australia
With the rapid growth of internet content, multimodal long document data has become increasingly prominent, drawing significant attention from researchers. However, most existing methods primarily focus on scenarios w...
详细信息
The complexity and diversity of smart grid systems increase the likelihood of anomalies in communications between devices in the system, and how these anomalies are detected is critical to the security of the grid sys...
详细信息
With the rapid development of Internet technology, network assets have become an indispensable part of modern society. Especially in the face of high-value network assets, the attacker is faced with paying a greater c...
详细信息
暂无评论