|
|
|
Yuchen Dong, Heng Zhou, Chengyang Li, Junjie Xie, Yongqiang Xie and Zhongbo Li
Camouflaged object detection (COD) is an arduous challenge due to the striking resemblance of camouflaged objects to their surroundings. The abundance of similar background information can significantly impede the efficiency of camouflaged object detecti...
ver más
|
|
|
|
|
|
Chuanzhe Gao, Shidang Li, Mingsheng Wei, Siyi Duan and Jinsong Xu
With the rapid development of wireless communication networks and Internet of Things technology (IoT), higher requirements have been put forward for spectrum resource utilization and system performance. In order to further improve the utilization of spec...
ver más
|
|
|
|
|
|
Alexander Isaev, Tatiana Dobroserdova, Alexander Danilov and Sergey Simakov
This study introduces an innovative approach leveraging physics-informed neural networks (PINNs) for the efficient computation of blood flows at the boundaries of a four-vessel junction formed by a Fontan procedure. The methodology incorporates a 3D mesh...
ver más
|
|
|
|
|
|
David Naseh, Mahdi Abdollahpour and Daniele Tarchi
This paper explores the practical implementation and performance analysis of distributed learning (DL) frameworks on various client platforms, responding to the dynamic landscape of 6G technology and the pressing need for a fully connected distributed in...
ver más
|
|
|
|
|
|
Abner Perez-Haro and Arturo Diaz-Perez
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ...
ver más
|
|
|