Computers & Electrical Engineering最新文献

筛选
英文 中文
Identity-based authenticated multi-keyword searchable encryption scheme for cloud-assisted telemedicine information system 用于云辅助远程医疗信息系统的基于身份验证的多关键词可搜索加密方案
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-11-05 DOI: 10.1016/j.compeleceng.2024.109816
Huan Liu , Lunzhi Deng , Yiming Mou , Binhan Li , Jian Wen
{"title":"Identity-based authenticated multi-keyword searchable encryption scheme for cloud-assisted telemedicine information system","authors":"Huan Liu ,&nbsp;Lunzhi Deng ,&nbsp;Yiming Mou ,&nbsp;Binhan Li ,&nbsp;Jian Wen","doi":"10.1016/j.compeleceng.2024.109816","DOIUrl":"10.1016/j.compeleceng.2024.109816","url":null,"abstract":"<div><div>In cloud-assisted telemedicine information system (CA-TMIS), patients upload data containing their health metrics to the cloud. Doctors can access the patient’s data through the cloud, thereby alleviating the geographical restrictions in the traditional medical system. To ensure the privacy of the patient, the patient will encrypt the data before uploading the data. How doctors can search through numerous encrypted files to locate specific patients’ relevant data is a topic worthy of research. Searchable encryption technology can fulfill the function of ciphertext retrieval. Some existing searchable encryption schemes use single-keyword for searching, resulting in insufficient search accuracy and increased search costs for doctors. Multi-keyword searchable encryption schemes can address this issue. Therefore, in this paper, we propose an identity-based authenticated multi-keyword searchable encryption scheme, which leverages multiple keywords for combined searching, enhancing search accuracy. The scheme is proven to be resistant to keyword guessing attacks in the standard model. Compared to four other existing schemes, our scheme does not utilize pairing operations and offers higher efficiency advantages. Consequently, our scheme is more suitable for CA-TMIS.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109816"},"PeriodicalIF":4.0,"publicationDate":"2024-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142587424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive simultaneous allocation algorithm of charging stations and vehicle to grid operation in radial networks 径向网络中充电站和车辆同时并网运行的综合分配算法
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-11-05 DOI: 10.1016/j.compeleceng.2024.109836
Ismail A. Soliman , Vladimir Tulsky , Hossam A. Abd el-Ghany , Ahmed E. ElGebaly
{"title":"A comprehensive simultaneous allocation algorithm of charging stations and vehicle to grid operation in radial networks","authors":"Ismail A. Soliman ,&nbsp;Vladimir Tulsky ,&nbsp;Hossam A. Abd el-Ghany ,&nbsp;Ahmed E. ElGebaly","doi":"10.1016/j.compeleceng.2024.109836","DOIUrl":"10.1016/j.compeleceng.2024.109836","url":null,"abstract":"<div><div>The widespread adoption of electric vehicles (EVs) helps improve air quality by minimizing pollutants and promoting sustainable transportation practices. The integration of a substantial fleet of EVs leads to an increase in the installation of charging stations. The unplanned allocation of these loads impacts the distribution systems, such as increasing power loss. This paper introduces an algorithm that proposes an optimal allocation strategy for charging stations (CSs) in a distribution system. The allocation process aims to minimize the total apparent energy losses and ensure that the system voltage profile remains within limits. Load profile, charging and discharging profiles of CSs are considered. Vehicle-to-Grid (V2G) mode is one of the merits of integrating EVs in the grid, so this feature has been used to maintain system voltage stability and minimize energy loss. Power rating and locations of V2G mode are optimally determined to guarantee power quality indices. A hybrid algorithm of genetic algorithm (GA) and Self-Adaptive Multi-Population Elitist JAYA (SAMPE-JAYA) is developed to simultaneously allocate CSs and V2G in the systems. The proposed algorithm is verified on standard systems, IEEE 33, and 69-bus systems. The proposed algorithm is verified on standard IEEE 33-bus and 69-bus systems. V2G integration with CSs results in a reduction of energy losses by 6.33% and 22.25%, respectively, and voltage deviation improvements to 7.61% and 7.88% for the two systems.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109836"},"PeriodicalIF":4.0,"publicationDate":"2024-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142587422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic threshold selection guided by maximizing Pearson correlation 在最大化皮尔逊相关性的指导下自动选择阈值
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-11-05 DOI: 10.1016/j.compeleceng.2024.109815
Yaobin Zou , Qingqing Huang , Huikang Qi
{"title":"Automatic threshold selection guided by maximizing Pearson correlation","authors":"Yaobin Zou ,&nbsp;Qingqing Huang ,&nbsp;Huikang Qi","doi":"10.1016/j.compeleceng.2024.109815","DOIUrl":"10.1016/j.compeleceng.2024.109815","url":null,"abstract":"<div><div>Many images exhibit non-modal, unimodal, bimodal, or multimodal gray level distributions. Current thresholding methods often struggle with images whose gray level distributions do not conform to a bimodal or unimodal pattern. We propose a novel bi-level threshold selection technique guided by maximizing Pearson correlation, addressing these four distribution types within a unified framework. Our method entails a multiscale multiplicative transformation of the image to create a template, extracting contours from binary images at different thresholds, and using Pearson correlation to assess the similarity between these contours and the template. The threshold with the highest similarity is chosen as the final threshold. Tested against seven methods on 20 synthetic images and 50 real-world images with non-modal, unimodal, bimodal or multimodal distribution patterns, our method showed more flexible adaptability of threshold selection and lower misclassification error, although it did not exhibit an advantage in computational efficiency.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109815"},"PeriodicalIF":4.0,"publicationDate":"2024-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142586782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things-based Home Automation with Network Mapper and MQTT Protocol 利用网络映射器和 MQTT 协议实现基于物联网的家庭自动化
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-11-05 DOI: 10.1016/j.compeleceng.2024.109807
Tahsin Alam , Md. Rokonuzzaman , Sohag Sarker , A F M Zainul Abadin , Tarun Debnath , Md. Imran Hossain
{"title":"Internet of Things-based Home Automation with Network Mapper and MQTT Protocol","authors":"Tahsin Alam ,&nbsp;Md. Rokonuzzaman ,&nbsp;Sohag Sarker ,&nbsp;A F M Zainul Abadin ,&nbsp;Tarun Debnath ,&nbsp;Md. Imran Hossain","doi":"10.1016/j.compeleceng.2024.109807","DOIUrl":"10.1016/j.compeleceng.2024.109807","url":null,"abstract":"<div><div>The increasing ability of internet-connected daily life electronic gadgets has propelled smart homes into a global trend. The Internet of Things (IoT) enables ambient devices to communicate and interact seamlessly through various sensors. Emerging technical concepts like Web3 and Industry 5.0 require decentralised and intelligent systems near the network's edge. Petabytes of IoT sensor-generated data cause a shortage of storage on the Cloud servers, adding a delay factor to the IoT system. Standard cloud-based IoT systems can't fully function in areas with unstable internet. This paper addresses these challenges and proposes a solution to integrate edge computing concepts. The proposed system is developed using a Raspberry Pi 3 Home Server (RHS) driven by the Support Vector Machine (SVM) algorithm. The designed prototype includes a fire and smoke detection system with MQ2 gas, dust, temperature, and flame sensors. The SVM and these sensors form a data fusion module integrating with Network Mapper (NMAP), Message Queuing Telemetry Transport (MQTT) broker, MariaDB SQL server, and InfluxDB time series database. The experiments demonstrate a fundamental edge operation with a latency of 2.45 ms (milliseconds), while NMAP integration ensures data security and device verification for sensor data storage. The synthetic simulations show positive outcomes for the data fusion-based monitoring system, where alerts are promptly triggered as sensor values change, with an overall system latency of approximately 24 ms. The developed system manages home automation, real-time monitoring for fire, smoke, gas leaks, network scans, anomaly detection, appliance usage tracking, and cloud data backup. A multi-level alert system ensures early threat mitigation, with alarms, SMS, notifications, and email alerts to maximize awareness.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109807"},"PeriodicalIF":4.0,"publicationDate":"2024-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142586781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-driven approaches for generating probabilistic short-term renewable energy scenarios 生成短期可再生能源概率方案的数据驱动方法
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-11-05 DOI: 10.1016/j.compeleceng.2024.109817
Carlos D. Zuluaga-Ríos , Cristian Guarnizo-Lemus
{"title":"Data-driven approaches for generating probabilistic short-term renewable energy scenarios","authors":"Carlos D. Zuluaga-Ríos ,&nbsp;Cristian Guarnizo-Lemus","doi":"10.1016/j.compeleceng.2024.109817","DOIUrl":"10.1016/j.compeleceng.2024.109817","url":null,"abstract":"<div><div>Renewable energy sources (RES) are becoming increasingly prevalent in power systems, but their intermittent and unpredictable nature challenges deterministic optimal generation scheduling. Stochastic planning or operating methodologies offer superior performance compared to deterministic approaches, making renewable energy generation scenarios increasingly valuable inputs for multistage decision-making problems. In this paper, we introduce and compare three data-driven approaches for generating probabilistic renewable energy scenarios. Numerical results from both simulated and real-world datasets demonstrate the accuracy and computational efficiency of these methods. Our proposed approaches provide a powerful tool for creating precise and efficient probabilistic renewable energy scenarios, which can enhance optimal generation scheduling in power systems with high RES penetration.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109817"},"PeriodicalIF":4.0,"publicationDate":"2024-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142587425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-performance front end PFC controller design for light electric vehicle charger application 面向轻型电动汽车充电器应用的高性能前端 PFC 控制器设计
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-11-04 DOI: 10.1016/j.compeleceng.2024.109822
Majhrul Israr, Paulson Samuel
{"title":"High-performance front end PFC controller design for light electric vehicle charger application","authors":"Majhrul Israr,&nbsp;Paulson Samuel","doi":"10.1016/j.compeleceng.2024.109822","DOIUrl":"10.1016/j.compeleceng.2024.109822","url":null,"abstract":"<div><div>Power factor correction (PFC) boost converters operating in CCM (continuous conduction mode) typically utilize average current mode (ACM) control alongside a LPF (low-pass filter) to reduce the impact of double line frequency ripple on the current loop. However, the LPF limit the voltage loop bandwidth in ACM-regulated converters, resulting in sluggish dynamic response. Additionally, zero-crossing distortion (ZCD) often occurs in the current control loop due to inaccuracies in tracking the reference current at the zero crossing point of the waveform. To address these challenges, this paper proposes a feed-forward control strategy that utilizes supply voltage and output current, effectively eliminating the need for an LPF and enhancing transient response. The voltage loop is tuned using the conventional Z-N method, while the Grey Wolf Optimization (GWO) technique is employed to optimally tune the gain parameters of the current controller (K<sub>Pi</sub> and K<sub>Ii</sub>). This approach effectively reduces reference tracking errors and mitigates ZCD, offering a balance between simplicity and performance. The proposed method is simple, offering fast transient and steady-state response, low THD, near-unity PF, and tight voltage regulation under fluctuating conditions. The effectiveness of this approach is validated through MATLAB/Simulink simulations, and hardware verification is conducted using a 500 W laboratory prototype controlled by a dSPACE 1104 digital controller.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109822"},"PeriodicalIF":4.0,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142578660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Suspicious action recognition in surveillance based on handcrafted and deep learning methods: A survey of the state of the art 基于手工和深度学习方法的监控中可疑动作识别:技术现状调查
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-11-04 DOI: 10.1016/j.compeleceng.2024.109811
Shaista Khanam , Muhammad Sharif , Xiaochun Cheng , Seifedine Kadry
{"title":"Suspicious action recognition in surveillance based on handcrafted and deep learning methods: A survey of the state of the art","authors":"Shaista Khanam ,&nbsp;Muhammad Sharif ,&nbsp;Xiaochun Cheng ,&nbsp;Seifedine Kadry","doi":"10.1016/j.compeleceng.2024.109811","DOIUrl":"10.1016/j.compeleceng.2024.109811","url":null,"abstract":"<div><div>Suspicious action recognition is a captivating and testing task in the realm of surveillance. An anomaly recognition framework recognizes abnormal happenings uniquely in contrast to existing examples because any anomaly is an example that is not the same as a bunch of standard examples. Security is a fundamental need in each space, whether it is public or private. The utilization of feature extraction techniques, both from hand-crafted and deep learning methods, significantly influences the comprehensive methodology discussed in detail within this paper. This survey paper comprehensively covers multiple areas of advancements in surveillance. Starting with the importance and application of anomaly recognition in surveillance which leads to a comparison of different survey papers is also presented for reference which also includes the areas that are covered in this survey paper. Available datasets in the realm of surveillance are also explored in this survey paper leading to feature extraction methods of both handcrafted and deep learning. This paper also summarizes different methods available for suspicious action recognition in surveillance. The paper delves into the challenges faced when addressing this vital issue, presents valuable findings, and outlines limitations associated with the topic. It provides extensive analysis and ends by outlining potential future trends.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109811"},"PeriodicalIF":4.0,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142578659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal configuration for improved system performance of droop-controlled DC microgrid with distributed energy resources and storage 改善带分布式能源资源和储能的降压控制直流微电网系统性能的优化配置
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-11-02 DOI: 10.1016/j.compeleceng.2024.109809
Dinto Mathew, Prajof Prabhakaran
{"title":"Optimal configuration for improved system performance of droop-controlled DC microgrid with distributed energy resources and storage","authors":"Dinto Mathew,&nbsp;Prajof Prabhakaran","doi":"10.1016/j.compeleceng.2024.109809","DOIUrl":"10.1016/j.compeleceng.2024.109809","url":null,"abstract":"<div><div>The placement of sources and loads in DC microgrids (DCMGs) influences the system’s voltage regulation, span, and losses. In order to minimize losses and enhance voltage regulation, a unique algorithm for configuring a radial DCMG under droop control in an optimal way is presented in this paper. The suggested approach solves the optimal design problem by applying the power flow analysis technique. The genetic algorithm (GA), a heuristic method, is used to determine the ideal configuration because of the complexity of the optimization problem. An improved particle swarm optimization (IPSO)-based technique is also proposed for resolving the optimization issue to improve the convergence rate and computing efficiency. Appropriate modifications are proposed to yield an optimal configuration that results in the maximum achievable span for the radial, droop-controlled DCMG. To limit the bus voltage variations within the bounds, the objective functions of the optimization problem are appropriately formulated. In addition, the proposed algorithm is used to find the best position and power rating of a new distributed energy resource (DER) or load in the DCMG, in order to reduce system losses. A 5-bus, 500 W, radial, droop-controlled DCMG system’s comprehensive numerical and simulation results are presented to validate the effectiveness of the proposed approaches. The findings are significant and useful for DCMG consumers as well as system designers.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109809"},"PeriodicalIF":4.0,"publicationDate":"2024-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142573401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A ghost-free multi-exposure image fusion using adaptive alignment for static and dynamic images 利用自适应配准实现静态和动态图像的无重影多曝光图像融合
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-11-02 DOI: 10.1016/j.compeleceng.2024.109808
Jishnu C.R., Vishnukumar S.
{"title":"A ghost-free multi-exposure image fusion using adaptive alignment for static and dynamic images","authors":"Jishnu C.R.,&nbsp;Vishnukumar S.","doi":"10.1016/j.compeleceng.2024.109808","DOIUrl":"10.1016/j.compeleceng.2024.109808","url":null,"abstract":"<div><div>Multi-Exposure image Fusion (MEF) blends images with varying exposures to construct a well-exposed outcome that retains all essential details. While many MEF techniques are effective, the dynamic image sets, where movements are present, pose challenges during fusion, leading to severe artifacts. Existing approaches inherently rely on the median image to align image sets before fusion for rectifying this crisis. However, the uncertainty caused by limited datasets and distorted median image during alignment is an ongoing critical issue in the domain. The proposed method presents a novel MEF framework, introducing a newly developed adaptive alignment technique and a unique Singular Value Decomposition (SVD) weight map, specifically designed to handle dynamic image sets. This strategy efficiently aligns the input images using a qualified reference image and performs pyramidal fusion using SVD along with adaptive well-exposedness, and contrast weight maps. This effectively handles both dynamic and static images, outperforming existing MEF techniques in visual analysis and empirical tests. Furthermore, significant performances from the execution time, pixel intensity analysis, and infrared-visible image fusion analysis confirm the practicality of our approach. The proposed methodology reinforces MEF's vital role in image processing applications such as medical imaging, surveillance, and remote sensing.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109808"},"PeriodicalIF":4.0,"publicationDate":"2024-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142573464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adapting visible-light-image diffusion model for infrared image restoration in rainy weather 利用可见光图像扩散模型修复雨天红外图像
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2024-11-01 DOI: 10.1016/j.compeleceng.2024.109814
Zhaofei Xu , Yuanshuo Cheng , Yuanjian Qiao , Yecong Wan , Mingwen Shao , Chong Kang
{"title":"Adapting visible-light-image diffusion model for infrared image restoration in rainy weather","authors":"Zhaofei Xu ,&nbsp;Yuanshuo Cheng ,&nbsp;Yuanjian Qiao ,&nbsp;Yecong Wan ,&nbsp;Mingwen Shao ,&nbsp;Chong Kang","doi":"10.1016/j.compeleceng.2024.109814","DOIUrl":"10.1016/j.compeleceng.2024.109814","url":null,"abstract":"<div><div>Infrared images captured in rainy conditions always suffer from significant quality degradation, limiting the utilization of infrared equipment in rainy weather. However, the problems mentioned above have not been effectively solved yet. On the one hand, no research has been devoted to developing methods for rainy weather infrared image restoration. On the other hand, there is no available paired infrared image restoration dataset for training. To tackle the aforementioned issues, we propose a novel framework, named InfDiff, to restore low-quality infrared images via High-Quality Visible-light image Prior. Meanwhile, we establish a realistic paired infrared rainy weather dataset for model training. Specifically, the proposed InfDiff consists of an Infrared Restoration Transformer and a Prior Generation Module. InfRestormer achieves degradation removal by modeling the inverse process of infrared degradation generating and can efficiently improve image quality using High-Quality Infrared image Prior. Correspondingly, the Prior Generation Module generates High-Quality Visible-light image Prior employing a diffusion model pre-trained on abundant visible-light images, and converts it into High-Quality Infrared image Prior via adapter fine-tuning for exploitation by InfRestormer. The above approach allows employing abundant visible-light data to effectively improve the quality of infrared images with the limited amount and diversity of infrared training data. In addition, to train the InfRestormer and fine-tune the adapter, we propose a realistic degradation simulation scheme and synthesize a paired clean-degraded infrared image dataset for the first time. In summary, we find that information in high-quality visible-light images can help restore corrupted content in low-quality infrared images. Based on the above finding, we propose the first rainy weather infrared image restoration framework, named InfDiff. Additionally, we synthesized the first rainy weather infrared image restoration dataset for model training. Extensive experiments demonstrate that our method significantly outperforms the existing image restoration scheme.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109814"},"PeriodicalIF":4.0,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142573400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信