The extraction of relationships between military entities and descriptive entities is a key task for automated construction of military knowledge graphs. This category of text unstructured imposed problems such as unf...
详细信息
It is difficult to extract targets under strong environmental disturbance in *** imaging(GI)is an innovative antiinterference imaging *** this paper,we propose a scheme for target extraction based on characteristicenh...
详细信息
It is difficult to extract targets under strong environmental disturbance in *** imaging(GI)is an innovative antiinterference imaging *** this paper,we propose a scheme for target extraction based on characteristicenhanced pseudo-thermal *** traditional GI which relies on training the detected signals or imaging results,our scheme trains the illuminating light fields using a deep learning network to enhance the target’s characteristic *** simulation and experimental results prove that our imaging scheme is sufficient to perform single-and multiple-target extraction at low *** addition,the effect of a strong scattering environment is discussed,and the results show that the scattering disturbance hardly affects the target extraction *** proposed scheme presents the potential application in target extraction through scattering media.
In multi-label learning, each training instance is associated with multiple labels simultaneously. Traditional multi-label learning studies primarily focus on closed set scenario, i.e. the class label set of test data...
Semi-supervised learning (SSL) is a classical machine learning paradigm dealing with labeled and unlabeled data. However, it often suffers performance degradation in real-world open-set scenarios, where unlabeled data...
详细信息
Semi-supervised learning (SSL) is a classical machine learning paradigm dealing with labeled and unlabeled data. However, it often suffers performance degradation in real-world open-set scenarios, where unlabeled data contains outliers from novel categories that do not appear in labeled data. Existing studies commonly tackle this challenging open-set SSL problem with detect-and-filter strategy, which attempts to purify unlabeled data by detecting and filtering outliers. In this paper, we propose a novel binary decomposition strategy, which refrains from error-prone procedure of outlier detection by directly transforming the original open-set SSL problem into a number of standard binary SSL problems. Accordingly, a concise yet effective approach named BDMatch is presented. BDMatch confronts two attendant issues brought by binary decomposition, i.e. class-imbalance and representation-compromise, with adaptive logit adjustment and label-specific feature learning respectively. Comprehensive experiments on diversified benchmarks clearly validate the superiority of BDMatch as well as the effectiveness of our binary decomposition strategy. Copyright 2024 by the author(s)
Conditional Semantic Textual Similarity (C-STS) introduces specific limiting conditions to the traditional Semantic Textual Similarity (STS) task, posing challenges for STS models. Language models employing cross-enco...
详细信息
With the rapid development of mobile technology and smart devices,crowdsensing has shown its large potential to collect massive *** the limitation of calculation power,edge computing is introduced to release unnecessa...
详细信息
With the rapid development of mobile technology and smart devices,crowdsensing has shown its large potential to collect massive *** the limitation of calculation power,edge computing is introduced to release unnecessary data *** edge-computing-enabled crowdsensing,massive data is required to be preliminary processed by edge computing devices(ECDs).Compared with the traditional central platform,these ECDs are limited by their own capability so they may only obtain part of relative factors and they can’t process data *** involved in one task are required to cooperate to process the task *** privacy of participants is important in crowdsensing,so blockchain is used due to its decentralization and *** crowdsensing tasks,it is usually difficult to obtain the assessment criteria in advance so reinforcement learning is *** mentioned before,ECDs can’t process task data comprehensively and they are required to cooperate quality ***,a blockchain-based framework for data quality in edge-computing-enabled crowdsensing(BFEC)is proposed in this ***(Delegated Proof of Reputation),which is proposed in our previous work,is improved to be suitable in ***,the final result is calculated without revealing the privacy of *** on the open datasets Adult,Blog,and Wine Quality show that our new framework outperforms existing methods in executing sensing tasks.
With the rapid development of the Internet of Things(Io T),the amount of data from intelligent devices is propagating at unprecedented scales. Meanwhile, machine learning(ML),which relies heavily on such data, is revo...
详细信息
With the rapid development of the Internet of Things(Io T),the amount of data from intelligent devices is propagating at unprecedented scales. Meanwhile, machine learning(ML),which relies heavily on such data, is revolutionizing many aspects of our lives [1]. However, conventional centralized ML offers little scalability for efficiently processing this huge amount of data.
Previous works employ the Large Language Model(LLM)like GPT-3 for knowledge-based Visual Question Answering(VQA).We argue that the inferential capacity of LLM can be enhanced through knowledge *** methods that utilize...
详细信息
Previous works employ the Large Language Model(LLM)like GPT-3 for knowledge-based Visual Question Answering(VQA).We argue that the inferential capacity of LLM can be enhanced through knowledge *** methods that utilize knowledge graphs to enhance LLM have been explored in various tasks,they may have some limitations,such as the possibility of not being able to retrieve the required *** this paper,we introduce a novel framework for knowledge-based VQA titled“Prompting Large Language Models with Knowledge-Injection”(PLLMKI).We use vanilla VQA model to inspire the LLM and further enhance the LLM with knowledge *** earlier approaches,we adopt the LLM for knowledge enhancement instead of relying on knowledge ***,we leverage open LLMs,incurring no additional *** comparison to existing baselines,our approach exhibits the accuracy improvement of over 1.3 and 1.7 on two knowledge-based VQA datasets,namely OK-VQA and A-OKVQA,respectively.
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr...
详细信息
In many fields, such as healthcare, finance, and scientific research, data sharing and collaboration are critical to achieving better outcomes. However, the sharing of personal data often involves privacy risks, so pr...
详细信息
暂无评论