Affective computing not only includes interactions with machines such as artificial intelligence, robots, and computers that recognize, respond to, and influence human emotions, but also spans a wide range of research...
详细信息
This paper proposes a secure computing architecture based on the dual hard disk and dual system switching ((DS)-S-3), and provide the mechanism of sensitive data copy and transmission processing for the two operating ...
详细信息
ISBN:
(数字)9781665470810
ISBN:
(纸本)9781665470810
This paper proposes a secure computing architecture based on the dual hard disk and dual system switching ((DS)-S-3), and provide the mechanism of sensitive data copy and transmission processing for the two operating environments of the computer. It can not only provide a secure computing environment for all processing links involving sensitive files, but also resist various possible malicious attacks. The experimental simulation results show that the D3S architecture has obvious performance advantages in both the data delivery ratio and the memory computing overhead. When the size of the copied sensitive file is 50MB, the copy time overhead of (DS)-S-3 is 1.12s. The secure transmission rate of sensitive data of (DS)-S-3 architecture is significantly better than that of other existing architectures, which has been maintained at about 8.5 Mbps.
Text extraction is an important part of natural language processing (NLP) tasks. Most NLP tasks like text classification, machine translation, text-to-speech, text-based language identification, text summarization, an...
详细信息
ISBN:
(数字)9781665484220
ISBN:
(纸本)9781665484220
Text extraction is an important part of natural language processing (NLP) tasks. Most NLP tasks like text classification, machine translation, text-to-speech, text-based language identification, text summarization, and named-entity recognition involve the use of textual data. Such data is limited for low-resourced languages making it difficult to experiment advanced NLP techniques on these languages. This paper presents a Python-based toolkit for text analysis and text extraction from different types of images, documents, and audio files. The toolkit is built as a library that has functions that can be imported and utilized for text extraction.
Minimax problems have achieved success in machine learning such as adversarial training, robust optimization, reinforcement learning. For theoretical analysis, current optimal excess risk bounds, which are composed by...
ISBN:
(纸本)9781956792041
Minimax problems have achieved success in machine learning such as adversarial training, robust optimization, reinforcement learning. For theoretical analysis, current optimal excess risk bounds, which are composed by generalization error and optimization error, present 1/n-rates in stronglyconvex-strongly-concave (SC-SC) settings. Existing studies mainly focus on minimax problems with specific algorithms for optimization error, with only a few studies on generalization performance, which limit better excess risk bounds. In this paper, we study the generalization bounds measured by the gradients of primal functions using uniform localized convergence. We obtain a sharper high probability generalization error bound for nonconvex-strongly-concave (NC-SC) stochastic minimax problems. Furthermore, we provide dimension-independent results under PolyakLojasiewicz condition for the outer layer. Based on our generalization error bound, we analyze some popular algorithms such as empirical saddle point (ESP), gradient descent ascent (GDA) and stochastic gradient descent ascent (SGDA). We derive better excess primal risk bounds with further reasonable assumptions, which, to the best of our knowledge, are n times faster than exist results in minimax problems.
With the application of artificial intelligence and bigdata technology in the field of agricultural production, modern information technology means such as the Internet of Things, bigdata and cloud computing are use...
详细信息
With the advent of easy access to a tremendous amount of text data, various studies utilizing text mining have been conducted in the biomedical field. However, most are only concerned with retrieving information solel...
详细信息
ISBN:
(纸本)9781665421973
With the advent of easy access to a tremendous amount of text data, various studies utilizing text mining have been conducted in the biomedical field. However, most are only concerned with retrieving information solely from the perspective of either diseases or drugs. Extending from such boundary, we propose an approach of embedding disease and drugs from biomedical literature, determining direct relationships between them, and identifying possibilities of drug repositioning. To embed both disease and drugs, we utilize the word2vec algorithm and generate embedded word vectors for each disease and drug. Then hierarchical clustering with Ward's method is applied for categorization. Moreover, we suggest an evaluation measure that compares clusters from the text data with results from the molecular biology level. The proposed method was applied to 17,606,652 MEDLINE abstracts and extracted 4,163 diseases and 3,930 drugs. By examining heterogeneous clusters in which both disease and drug exist, nine candidate drugs were deduced for each disease in combination with 79 diseases and 84 drugs. The results are expected to serve as a baseline for the preliminary selection of candidate drugs for drug repositioning.
First, it analyzes the development trend of artificial intelligence in the machine translation industry, and explains the specific application methods; second, based on the national conditions, explore the development...
详细信息
This paper introduces the new discipline of artificial intelligence technology in *** with the development history of weighing instruments, it expounds that the intelligent development of the industrial chain of weigh...
详细信息
At present, as people's awareness of learning increases, more and more learning resources appear on the Internet, and online courses are becoming more and more popular. Recommendation research for online courses c...
详细信息
In the realm of computer vision, pedestrian recognition has gained popularity as a study topic in recent years, and has received widespread attention and research from scholars. How to extract more discriminative pede...
详细信息
暂无评论