Results 291 to 300 of about 2,268,403 (339)

Tibetan Data Augmentation via GAN‐Based Handwritten Text Generation

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Increased awareness of Tibetan cultural preservation, along with technological advancements, has led to significant efforts in academic research on Tibetan. However, the structural complexity of the Tibetan language and limited labeled handwriting data impede advancements in Optical Character Recognition (OCR) and other applications.
Dorje Tashi   +9 more
wiley   +1 more source

Multi‐Scale Transformer for Image Restoration

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Although Transformer‐based image restoration methods have demonstrated impressive performance, existing Transformers still insufficiently exploit multiscale information. Previous non‐Transformer‐based studies have shown that incorporating multiscale features is crucial for improving restoration results.
Wuzhen Shi   +6 more
wiley   +1 more source

Towards Interpretable Face Morphing via Unsupervised Learning of Layer‐Wise and Local Features

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Discovering meaningful face morphing is critical for applications in image synthesis. Traditional unsupervised methods rely on global or layer‐wise representations, neglecting finer local details and thus limiting the control over specific facial attributes.
Cheng Yu, Chuan Chen, Wenmin Wang
wiley   +1 more source

Dynamic Resource Allocation Optimisation and Security‐Resilient Control for Bandwidth‐Limited Network Control Systems With Data Conflicts

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy