Integration is indispensable, not only in mathematics, but also in a wide range of other fields. A deep learning method has recently been developed and shown to be capable of integrating mathematical functions that co...
详细信息
Integration is indispensable, not only in mathematics, but also in a wide range of other fields. A deep learning method has recently been developed and shown to be capable of integrating mathematical functions that could not previously be integrated on a computer. However, that method treats integration as equivalent to natural language translation and does not reflect mathematical information. In this study, we adjusted the learning model to take mathematical information into account and developed a wide range of learning models that learn the order of numerical operations more robustly. In this way, we achieved a 98.80% correct answer rate with symbolic integration, a higher rate than that of any existing method. We judged the correctness of the integration based on whether the derivative of the primitive function was consistent with the integrand. By building an integrated model based on this strategy, we achieved a 99.79% rate of correct answers with symbolic integration. In summary, we have developed a more accurate method of selecting the correct model than the existing method by judging the result of symbolic integration based on whether the output of the model equals the input formula when the output is differentiated.
Vulnerability prediction refers to the problem of identifying system components that are most likely to be vulnerable. Typically, this problem is tackled by training binary classifiers on historical data. Unfortunatel...
详细信息
Vulnerability prediction refers to the problem of identifying system components that are most likely to be vulnerable. Typically, this problem is tackled by training binary classifiers on historical data. Unfortunately, recent research has shown that such approaches underperform due to the following two reasons: a) the imbalanced nature of the problem, and b) the inherently noisy historical data, i.e., most vulnerabilities are discovered much later than they are introduced. This misleads classifiers as they learn to recognize actual vulnerable components as non-vulnerable. To tackle these issues, we propose TROVON, a technique that learns from known vulnerable components rather than from vulnerable and non-vulnerable components, as typically performed. We perform this by contrasting the known vulnerable, and their respective fixed components. This way, TROVON manages to learn from the things we know, i.e., vulnerabilities, hence reducing the effects of noisy and unbalanced data. We evaluate TROVON by comparing it with existing techniques on three security-critical open source systems, i.e., Linux Kernel, OpenSSL, and Wireshark, with historical vulnerabilities that have been reported in the National Vulnerability Database (NVD). Our evaluation demonstrates that the prediction capability of TROVON significantly outperforms existing vulnerability prediction techniques such as Software Metrics, Imports, Function Calls, Text Mining, Devign, LSTM, and LSTM-RF with an improvement of 40.84% in Matthews Correlation Coefficient (MCC) score under Clean Training Data Settings, and an improvement of 35.52% under Realistic Training Data Settings.
Some of the limitations of state-space models are given by the difficulty of modeling certain systems, the filters convergence time, or the impossibility of modeling dependencies in the long term. Having agile and alt...
详细信息
Some of the limitations of state-space models are given by the difficulty of modeling certain systems, the filters convergence time, or the impossibility of modeling dependencies in the long term. Having agile and alternative methodologies that allow the modeling of complex problems but still provide solutions to the classic challenges of estimation or filtering, such as the position estimation of a mobile with noisy measurements and unknown motion models, are of high interest. In this work, we address the problem of position estimation of 1-D dynamic systems from a deep learning paradigm, using Long-Short Term Memory (LSTM) architectures designed to solve problems with long term temporal dependencies, in combination with other recurrent networks. A deep neuronal architecture inspired by the encoderdecoder language systems is implemented, remarking its limits and finding a solution capable of making predictions of high accuracy with models learnt from training data of a moving object. We use a panel data model for training and validation. In the experimentation, we use sliding overlapping time windows in a recursive and standardized way to avoid the saturation problem of the networks in increasing trend estimates. The results are finally compared with the optimal values from the Kalman filter, obtaining comparable results in error terms. These results show the proposed system has great potential for target tracking.(c) 2022 Elsevier B.V. All rights reserved.
Zero-shot learning (ZSL) is an effective method to perform the recognition task without any training samples of specific classes. Most existing ZSL models put emphasis on learning an embedding between visual space and...
详细信息
Zero-shot learning (ZSL) is an effective method to perform the recognition task without any training samples of specific classes. Most existing ZSL models put emphasis on learning an embedding between visual space and semantic space directly. However, few ZSL models research whether the human-designed semantic features are discriminative enough to recognize different classes. Moreover, one-way mapping suffers from the project domain shift problem. In this article, we propose to learn a Discriminative Dual Semantic Auto-encoder (DDSA) based on the encoder-decoder paradigm to solve this problem. DDSA attempts to construct two bidirectional embeddings to connect the visual space and the semantic space with the help of the learned aligned space which includes discriminative information of the visual features and semantic features. Based on the DDSA, we additionally propose a Deep DDSA to capture deep aligned features that are more conducive to zero-shot classification. The key to the proposed framework is that it implicitly exact the principal information from visual space and semantic space to construct aligned features, which is not only semantic-preserving but also discriminative. Extensive experiments on five benchmarks (SUN, CUB, AWA1, AWA2 and aPY) demonstrate the effectiveness of the proposed framework with state-of-the-art performance obtained on both conventional ZSL and generalized ZSL settings.
The basic explanation of the image caption task is that the sentences generated by the model should comprehensively express the content of an image. Existing image caption models face issues such as inadequate utiliza...
详细信息
This paper introduces a novel approach leveraging the U-Net algorithm to generate silhouette images of objects using sparse data generated by computers or obtained from mmWave radar. Through this method, exceptional r...
详细信息
Success of neural networks in natural language processing has paved the way for neural machine translation (NMT), which rapidly became the mainstream approach in machine translation. Significant improvement in transla...
详细信息
Success of neural networks in natural language processing has paved the way for neural machine translation (NMT), which rapidly became the mainstream approach in machine translation. Significant improvement in translation performance has been achieved with breakthroughs such as encoder-decoder networks, attention mechanism, and Transformer architecture. However, the necessity of large amounts of parallel data for training an NMT system and rare words in translation corpora are issues yet to be overcome. In this article, we approach NMT of the low-resource Turkish-English language pair. We employ state-of-the-art NMT architectures and data augmentationmethods that exploit monolingual corpora. We point out the importance of input representation for the morphologically rich Turkish language and make a comprehensive analysis of linguistically and non-linguistically motivated input segmentation approaches. We prove the effectiveness of morphologically motivated input segmentation for the Turkish language. Moreover, we show the superiority of the Transformer architecture over attentional encoder-decoder models for the Turkish-English language pair. Among the employed data augmentation approaches, we observe back-translation to be the most effective and confirm the benefit of increasing the amount of parallel data on translation quality. This research demonstrates a comprehensive analysis on NMT architectures with different hyperparameters, data augmentation methods, and input representation techniques, and proposes ways of tackling the low-resource setting of Turkish-English NMT.
Increasing traffic congestion is a major obstacle to the development of cities. The prediction of traffic flow is very important to city planning and dredging. A good model of flow is able to accurately predict future...
详细信息
Increasing traffic congestion is a major obstacle to the development of cities. The prediction of traffic flow is very important to city planning and dredging. A good model of flow is able to accurately predict future flow by learning historical flow data. Traffic flow is usually affected by macro and micro factors. At the macro level, the whole city can be divided into different subregions according to the similarity in the traffic flow patterns. At the micro-level, there is a temporal and spatial correlation between the traffic flow of different road sections at di fferent times. In this paper, we propose a multi-mode traffic flow prediction method with Clustering based Attention Convolution LSTM (CACLSTM) to model spatial-temporal data of traffic flow. The framework includes three modules: a convolution LSTM encoding-decoding layer which is used to predict the traffic flow of the next time slice by encoding the historical traffic information, a clustering based attention layer which is able to extract different temporal features by clustering based attention, and an additional factors layer which can integrate weather, wind speed, holidays and other factors to improve the prediction accuracy. The experimental results on Beijing taxis data show that the CACLSTM method performs more effective than the six well-known compared methods.
Acknowledgment This research work was supported by joint collaboration of Computer Vision and Pattern Vision (CVPR) Lab, Shri Guru Gobind Singhji Institute of Engineering and Technology, Nanded, India and Center for I...
详细信息
Acknowledgment This research work was supported by joint collaboration of Computer Vision and Pattern Vision (CVPR) Lab, Shri Guru Gobind Singhji Institute of Engineering and Technology, Nanded, India and Center for Intelligent Signal and Imaging Research (CISIR), Universiti Teknologi PETRONAS (UTP), Seri Iskandar, Malaysia under International Grant 015ME0-018.
Gesture segmentation is an essential part of gesture detection. The accuracy of gesture detection can be improved by using gesture segmentation to remove the background part un-hand images. However, the inaccurate fea...
详细信息
Gesture segmentation is an essential part of gesture detection. The accuracy of gesture detection can be improved by using gesture segmentation to remove the background part un-hand images. However, the inaccurate features of current methods can greatly affect the accuracy of results in segmentation and gesture recognition. In order to solve this problem and obtain accurate features, this paper proposes the improved atrous spatial pyramid pooling (IASPP). IASPP is a pooling layer in convolution neural network, which can refine features by connecting cascade model and parallel model in atrous spatial pyramid pooling. Otherwise, in order to improve the segmentation performance by integrating details and spatial location information at different levels, the IASPP is embedded in the encoder-decoder, and we name the method the improved atrous spatial pyramid pooling-ResNet (IASPP-ResNet) for gesture segmentation. In the experiment part of this paper, we test the proposed method by comparing it with the states of art on the two datasets of OUTHANDS and HGR. It can be seen that IASPP-ResNet can achieve 97.75% Pixel Accuracy and 89.60% MIoU on the OUTHANDS dataset. The Pixel Accuracy and MIoU of the presented method on the HGR dataset can reach 99.09% and 97.52%, respectively. These presented that our method is superior to the states of art.
暂无评论