Image segmentation is a prerequisite to almost all computer vision applications. It enables the extraction of meaningful information from visual inputs by partitioning images into segments with shared features. This r...
详细信息
Heart disease is also called a common one of global health concerns. A lot of research has been done before to predict someone whether has a heart disease or not by machine learning. In this study, we use five machine...
详细信息
Topic models that can take advantage of labels are broadly used in identifying interpretable topics from textual data. However, existing topic models tend to merely view labels as names of topic clusters or as categor...
详细信息
Extracting structured event knowledge, including event triggers and corresponding arguments, from military texts is fundamental to many applications, such as intelligence analysis and decision assistance. However, eve...
详细信息
Crowdsourcing has become a popular paradigm for collecting large-scale labeled datasets by leveraging numerous annotators. However, these annotators often provide noisy labels due to varying expertise. Truth inference...
详细信息
With the emergence of the Metaverse concept, the rendering and transmission of 3D virtual scenes demand high-bandwidth, high-quality real-time rendering technology, as well as ultra-reliable low-latency communication ...
详细信息
Point-of-interest(POI)recommendations in location-based social networks(LBSNs)have developed rapidly by incorporating feature information and deep learning ***,most studies have failed to accurately reflect different ...
详细信息
Point-of-interest(POI)recommendations in location-based social networks(LBSNs)have developed rapidly by incorporating feature information and deep learning ***,most studies have failed to accurately reflect different users’preferences,in particular,the short-term preferences of inactive *** better learn user preferences,in this study,we propose a long-short-term-preference-based adaptive successive POI recommendation(LSTP-ASR)method by combining trajectory sequence processing,long short-term preference learning,and spatiotemporal ***,the check-in trajectory sequences are adaptively divided into recent and historical sequences according to a dynamic time ***,an adaptive filling strategy is used to expand the recent check-in sequences of users with inactive check-in behavior using those of similar active *** further propose an adaptive learning model to accurately extract long short-term preferences of users to establish an efficient successive POI recommendation system.A spatiotemporal-context-based recurrent neural network and temporal-context-based long short-term memory network are used to model the users’recent and historical checkin trajectory sequences,*** experiments on the Foursquare and Gowalla datasets reveal that the proposed method outperforms several other baseline methods in terms of three evaluation *** specifically,LSTP-ASR outperforms the previously best baseline method(RTPM)with a 17.15%and 20.62%average improvement on the Foursquare and Gowalla datasets in terms of the Fβmetric,respectively.
In the realm of artificial intelligence (AI), a notable challenge has surfaced: adversarial attacks, these attacks involve altering input data to mislead AI models. Developing defensive measures against adversarial at...
详细信息
ISBN:
(数字)9798350363104
ISBN:
(纸本)9798350363111
In the realm of artificial intelligence (AI), a notable challenge has surfaced: adversarial attacks, these attacks involve altering input data to mislead AI models. Developing defensive measures against adversarial attacks is necessary for a more reliable AI system to protect its users from potential harm. In response to the risk of adversarial attacks, this study aims to mitigate the risk of such attacks, especially in image classification tasks, by proposing Adversarial Detection Guided Input Transformation (ADGIT) as an architecture designed to handle such attacks. In this study, the author will experiment with creating such architecture and measure the quality of the proposed technique. ADGIT works by utilizing SafetyNet as an adversarial detector to detect and cleanse adversarial attacks. The author concludes that the proposed technique could improve robustness against adversarial attacks increasing consistent prediction accuracy from 43% to 60% and reconstructing adversarial input images to be more similar to their unperturbed version, with reconstructed images' PSNR score on 0.007 perturbation increased from 43.1182 to 89.0999. The technique proposed could be used as a new defensive measure and improving robustness against adversarial attacks. Although ADGIT is capable of handling adversarial samples, ADGIT has a drawback in performance speed due to the extra preprocessing step.
In the rapidly evolving beauty industry, consumers are often bombarded with an overwhelming array of skincare brands and products, making the quest for the perfect skincare regimen a daunting task. This saturation of ...
详细信息
ISBN:
(数字)9798350365351
ISBN:
(纸本)9798350365368
In the rapidly evolving beauty industry, consumers are often bombarded with an overwhelming array of skincare brands and products, making the quest for the perfect skincare regimen a daunting task. This saturation of the market not only confuses consumers but also poses the risk of resource wastage and potential skin damage due to incompatible ingredient combinations. To mitigate these challenges, our research presents an innovative recommendation system designed to streamline the product selection process. Utilizing the principle of cosine similarity, our methodology involves a detailed analysis of the ingredients contained in various skincare products. A quantitative foundation for evaluating ingredient lists of various skincare products is provided by cosine similarity, a mathematical metric that evaluates the similarity between two non-zero vectors by computing the cosine of the angle between them. Our algorithm generates customized product recommendations by thoroughly comprehending the intricate interactions among different constituents. This bespoke approach simplifies the decision-making process for consumers, enabling them to make well-informed choices that cater to their unique skin health needs. The effectiveness of our recommendation system is validated through comprehensive user feedback, demonstrating its potential to redefine the paradigm of personalized skincare recommendations within the beauty industry. Through providing customers with critical information and encouraging a culture of knowledgeable choice, we see a time when customized skincare products will not only increase customer satisfaction but also brand loyalty, which will be a big step toward the democratization of customized skincare.
Thinking space came into being with the emergence of human civilization. With the emergence and development of cyberspace, the interaction between those two spaces began to take place. In the collision of thinking and...
详细信息
Thinking space came into being with the emergence of human civilization. With the emergence and development of cyberspace, the interaction between those two spaces began to take place. In the collision of thinking and technology, new changes have taken place in both thinking space and cyberspace. To this end, this paper divides the current integration and development of thinking space and cyberspace into three stages, namely Internet of brain(IoB), Internet of thought(IoTh), and Internet of thinking(IoTk). At each stage, the contents and technologies to achieve convergence and connection of spaces are discussed. Besides, the Internet of creation(IoC) is proposed to represent the future development of thinking space and cyberspace. Finally, a series of open issues are raised, and they will become thorny factors in the development of the Io C stage.
暂无评论