Semi-supervised learning has garnered significant attention, particularly in medical image segmentation, owing to its capacity to leverage a large number of unlabeled data and a limited amount of labeled data to impro...
详细信息
The ultrasonic frequency radial vibration of an elastic thin spherical shell composed of isotropic materials is studied, the frequency equation of its vibration is deduced, and the equivalent circuit is obtained. The ...
详细信息
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all...
详细信息
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be *** owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the *** prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file *** also provide security analysis in the context of four typical attacks.
With ScRNAseq, we are able to obtain genome-wide transcriptome data from single cells. However, it is very difficult to identify all cell subpopulations in single cell expression data, especially when these subpopulat...
详细信息
Underwater images, often plagued by complex degradation, pose significant challenges for image enhancement. To address these challenges, the paper redefines underwater image enhancement as an image decomposition probl...
详细信息
The rapid advancement of remote sensing technology has heightened concerns over the security of sensitive information. This paper presents an intelligent encryption scheme for remote sensing images using dimensionalit...
The rapid advancement of remote sensing technology has heightened concerns over the security of sensitive information. This paper presents an intelligent encryption scheme for remote sensing images using dimensionality variation. The scheme employs two high-dimensional chaotic systems to generate keys for simultaneous row-column scrambling and diffusion. By mapping a 2D plain-image to a 3D space, pixels are rearranged within a 3D cube using a chaotic key, followed by auto-correlation cyclic diffusion. Experimental results demonstrate that this approach significantly enhances encryption security, making it suitable for secure remote sensing image communication.
The Area Under the ROC Curve (AUC) is a well-known metric for evaluating instance-level long-tail learning problems. In the past two decades, many AUC optimization methods have been proposed to improve model performan...
Recently,Siamese-based trackers have achieved excellent performance in object ***,the high speed and deformation of objects in the movement process make tracking ***,we have incorporated cascaded region-proposal-netwo...
详细信息
Recently,Siamese-based trackers have achieved excellent performance in object ***,the high speed and deformation of objects in the movement process make tracking ***,we have incorporated cascaded region-proposal-network(RPN)fusion and coordinate attention into Siamese *** proposed network framework consists of three parts:a feature-extraction sub-network,coordinate attention block,and cascaded RPN *** exploit the coordinate attention block,which can embed location information into channel attention,to establish long-term spatial location dependence while maintaining channel ***,the features of different layers are enhanced by the coordinate attention *** then send these features separately into the cascaded RPN for classification and *** to the two classification and regression results,the final position of the target is *** verify the effectiveness of the proposed method,we conducted comprehensive experiments on the OTB100,VOT2016,UAV123,and GOT-10k *** with other state-of-the-art trackers,the proposed tracker achieved good performance and can run at real-time speed.
In the field of simultaneous localization and mapping (SLAM), visual odometry (VO) always has great application prospects. In recent years, with the progress in the field of machine learning, methods based on neural n...
详细信息
To enable remote image acquisition and wireless transmission for field sex lure monitoring of Spodoptera frugiperda, the design consists of a CPU processor module, power supply module, image acquisition module, 4G wir...
详细信息
暂无评论