Referring 3D Segmentation is a visual-language task that segments all points of the specified object from a 3D point cloud described by a sentence of query. Previous works perform a two-stage paradigm, first conductin...
ISBN:
(纸本)9798331314385
Referring 3D Segmentation is a visual-language task that segments all points of the specified object from a 3D point cloud described by a sentence of query. Previous works perform a two-stage paradigm, first conducting language-agnostic instance segmentation then matching with given text query. However, the semantic concepts from text query and visual cues are separately interacted during the training, and both instance and semantic labels for each object are required, which is time consuming and human-labor intensive. To mitigate these issues, we propose a novel Referring 3D Segmentation pipeline, Label-Efficient and Single-Stage, dubbed LESS, which is only under the supervision of efficient binary mask. Specifically, we design a Point-Word Cross-Modal Alignment module for aligning the fine-grained features of points and textual embedding. Query Mask Predictor module and Query-Sentence Alignment module are introduced for coarse-grained alignment between masks and query. Furthermore, we propose an area regularization loss, which coarsely reduces irrelevant background predictions on a large scale. Besides, a point-to-point contrastive loss is proposed concentrating on distinguishing points with subtly similar features. Through extensive experiments, we achieve state-of-the-art performance on ScanRefer dataset by surpassing the previous methods about 3.7% mIoU using only binary labels. Code is available at https://***/mellody11/LESS.
In this paper, we analyze the secrecy performance of secure multi-hop transmission for the NOMA system. More specifically, the multi-hop transmission can extend the coverage of wireless transmission. However, accordin...
In this paper, we analyze the secrecy performance of secure multi-hop transmission for the NOMA system. More specifically, the multi-hop transmission can extend the coverage of wireless transmission. However, according to the principle of the wireless medium, an eavesdropper can overhear the legitimate users' transmission, which leads to serious security issues. In order to analyze the relationship between network parameters and secrecy outage probability, we derive exact closed-form expressions for the secrecy outage probability (SOP) of cell center and cell edge users, respectively. The numerical results show that the simulation and analysis results are tightly matched. Additionally, we investigate the impact of the number of hops and the distance on the secrecy performance.
The current research work addresses the problem of automating the delivery of machine learning models from MLflow to Kubernetes infrastructure. To solve the mentioned problem, a Kubernetes operator has been developed ...
详细信息
ISBN:
(数字)9798331511241
ISBN:
(纸本)9798331511258
The current research work addresses the problem of automating the delivery of machine learning models from MLflow to Kubernetes infrastructure. To solve the mentioned problem, a Kubernetes operator has been developed to automate the delivery of machine learning models to production by integrating MLflow for model tracking and Seldon Core for model serving. The developed operator allows data scientists to deploy models while maintaining the familiar MLflow environment. The operator's automatic deployment triggers upon tagging models in MLflow, greatly simplifying engineers' tasks and minimizing the need for manual infrastructure configuration. By automating configuration tasks and optimizing deployment workflows, the solution achieves a 40-50% reduction in model time to deployment (TTD) metric compared to manual processes and decreases error rates from 15% to around 3%. The practical relevance of the work is that it simplifies collaboration between data and infrastructure teams by providing a unified deployment framework, resulting in faster, more reliable, and automated integration of machine learning models into an organisation's business processes.
Information, networking, and digitization have gradually been integrated into all walks of life. New technologies of big data have been born in the era of massive digital information explosion. Big data is used in man...
详细信息
Capture the Flag (CTF) competitions have become increasingly popular over the previous decade. This research aims to systematically approach organizing CTF competitions by developing two frameworks. The first framewor...
详细信息
ISBN:
(数字)9798331508180
ISBN:
(纸本)9798331508197
Capture the Flag (CTF) competitions have become increasingly popular over the previous decade. This research aims to systematically approach organizing CTF competitions by developing two frameworks. The first framework utilizes design science research with a stakeholder approach to generate a definition of success. By defining success, an actionable set of design principles was derived to guide competition organizers. These design principles are structured to provide actionable insight to organizers to help solve the multi-objective problem of stakeholder requirements. The second framework identifies the challenge development life cycle through a temporal approach while describing the current best practices in challenge development. These models were then evaluated through a CTF competition case study hosted for an intra-collegiate audience. This competition utilized both frameworks to assess them in a critical light. To our knowledge, this paper is the first to provide a design science approach for hosting a successful CTF. Based on the findings, a brief discussion on refining the frameworks and potential areas for improvement is provided.
Cardiotocography (CTG) is a primary tool for real-time monitoring fetal heart rate (FHR) and uterine contraction (UC) signals during labor. Nowadays CTG signal classification models based on deep learning have facilit...
详细信息
The utilization of Artificial Intelligence (AI)-enabled software and hardware is expected to enhance the effectiveness of monetary exchanges, which is the main objective of this research. Since transaction costs are b...
The utilization of Artificial Intelligence (AI)-enabled software and hardware is expected to enhance the effectiveness of monetary exchanges, which is the main objective of this research. Since transaction costs are based on the actual amount being transferred, customers feel more at ease making purchases using this approach. This work aims to investigate the role of financial systems in effective corporate administration, with a particular emphasis on gateways as key components of these systems. This study investigates the factors (price, procedures, risk assessments, etc.) that influence the connecting of merchant identities across several channels in a digital payment system. When multiple endpoints are connected to a central hub, they are referred to as a ‘‘terminal.’’ The study shows that utilizing AI-enabled software and hardware can reduce transaction costs and increase consumer confidence in purchasing decisions. This research can potentially improve financial systems for businesses and consumers by identifying the most effective applications of AI in this sector.
The highly variable nature of cellular networks challenges end-to-end network transmissions in achieving low-latency and high-throughput performance. In high-speed rail (HSR) networks, the intermittent connectivity an...
详细信息
The highly variable nature of cellular networks challenges end-to-end network transmissions in achieving low-latency and high-throughput performance. In high-speed rail (HSR) networks, the intermittent connectivity and capacity dynamics imposed by high client mobility further add complexity and difficulty in providing seamless service. While congestion control algorithms (CCAs) play an essential role in ensuring optimal network performance, prior works on congestion control have predominantly concentrated on enhancing network performance within stationary or low-mobility mobile networks without considering frequent disconnections and highly dynamic network capacities imposed by HSR networks, resulting in severe RTT inflation and slow loss recovery. In this paper, we argue that a dedicated transport layer protocol is necessary for high-mobility scenarios. We propose an end-to-end low-latency congestion control algorithm HiMo for HSR networks that reacts to abrupt bandwidth changes quickly, handles frequent handovers, and is immediately deployable. Our trace-driven emulation on real-world datasets demonstrates that HiMo can reduce 51.3% 95th-percentile latency with comparable throughput on high-speed rail networks, compared to state-of-the-art CCAs.
Irregularly sampled time series are ubiquitous, presenting significant challenges for analysis due to missing values. Despite existing methods address imputation, they predominantly focus on leveraging intra-series in...
详细信息
Spatial transcriptomics (ST) has emerged as an advanced technology that provides spatial context to gene expression. Recently, deep learning-based methods have shown the capability to predict gene expression from WSI ...
详细信息
暂无评论