Diffusion Transformers (DiTs) have proven effective in generating high-quality videos but are hindered by high computational costs. Existing video DiT sampling acceleration methods often rely on costly fine-tuning or ...
详细信息
In today's era, deep learning neural networks with multiple hidden layers have been widely used in many fields. The deep learning method has more powerful features that enhance the method's performance by a le...
In today's era, deep learning neural networks with multiple hidden layers have been widely used in many fields. The deep learning method has more powerful features that enhance the method's performance by a learning process. With the development of the logistics industry and the prevalence of autonomous driving, traffic sign recognition has gained rising attention. This study uses a YOLO CNN to classify traffic signs. To improve model performance, we used MSRCR image augmentation during preprocessing. In the improvement phase, we used YOLOv5 to automate traffic sign categorization and improved training methods and network architecture. GTSRB and CCTSDB were used to assess the proposed technique. The experimental results show that the YOLOv5 model outperforms other methods. It has a 99.8% accuracy rate in the GTSRB dataset and 98.4% precision in the CCTSDB.
A first-hand, low-profile, two-port planar inverted-F antenna is proposed for current 4G/5G sub-3 GHz hand-portable multiple-input and multiple-output (MIMO) applications. The design features a profile of about 5 mm a...
详细信息
Automation and autonomous systems are among the few powerhouses of innovation that drive entire domains towards advancing further in leaps and bounds. Great technological innovations can be attributed to tasks that ar...
详细信息
Phishing is a prevalent type of cyberattack that involves posing as a trustworthy source in an email message to fraudulently attempt to get personal information such as usernames, passwords, and bank account informati...
详细信息
With the expansion of generative Artificial Intelligence (AI) and the penetration of AI chatbots into every aspect of people's daily lives, discussions and issues related to AI ethics and responsibility began to a...
详细信息
ISBN:
(数字)9798331520038
ISBN:
(纸本)9798331520045
With the expansion of generative Artificial Intelligence (AI) and the penetration of AI chatbots into every aspect of people's daily lives, discussions and issues related to AI ethics and responsibility began to arise simultaneously. A large portion of AI users remain ignorant of such ethical discussions, while a significant percentage of developers lack precautionary measures to prevent irresponsible AI behaviors. An increasing number of companies and organizations are taking action to address the problems. Despite the efforts, prominent issues still prevail. Most existing solutions are too general and theoretical; few are narrowed down to examine the specific application scenario of AI chatbots in education. In response, this study aims to address the arising concerns and the lack of a satisfying solution. After conducting an extensive literature review and performing a detailed analysis of survey data, this study develops a comprehensive guideline about AI ethics and responsible AI, which specifically targets undergraduate developers and guides them during their development of AI chatbots used in education. This guideline successfully bridges the knowledge gap, raises awareness about AI ethics, and acts as the first guideline for undergraduate students, influencing future development practices.
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph which is amenable to be adopted in tra...
详细信息
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph which is amenable to be adopted in traditional machine learning algorithms in favor of vector *** embedding methods build an important bridge between social network analysis and data analytics as social networks naturally generate an unprecedented volume of graph data *** social network data not only bring benefit for public health,disaster response,commercial promotion,and many other applications,but also give birth to threats that jeopardize each individual’s privacy and ***,most existing works in publishing social graph embedding data only focus on preserving social graph structure with less attention paid to the privacy issues inherited from social *** be specific,attackers can infer the presence of a sensitive relationship between two individuals by training a predictive model with the exposed social network *** this paper,we propose a novel link-privacy preserved graph embedding framework using adversarial learning,which can reduce adversary’s prediction accuracy on sensitive links while persevering sufficient non-sensitive information such as graph topology and node attributes in graph *** experiments are conducted to evaluate the proposed framework using ground truth social network datasets.
The problem of low credibility of students in teaching evaluation is caused by ignoring non-teaching factors such as students' emotions, class culture, and course nature in the existing data of university students...
详细信息
Learning expressive stochastic policies instead of deterministic ones has been proposed to achieve better stability, sample complexity, and robustness. Notably, in Maximum Entropy Reinforcement Learning (MaxEnt RL), t...
详细信息
Venous thromboembolism (VTE) is a critical cardio-vascular condition, encompassing deep vein thrombosis (DVT) and pulmonary embolism (PE). Accurate and timely identification of VTE is essential for effective medical c...
详细信息
暂无评论