With the advent of the fourth industrial revolution, data ushered in explosive growth. Federated learning can protect users’ privacy and raw data from being known by third parties. Its client data is only trained loc...
详细信息
Transformers have been widely studied in many natural language processing (NLP) tasks, which can capture the dependency from the whole sentence with a high parallelizability thanks to the multi-head attention and the ...
详细信息
Transformers have been widely studied in many natural language processing (NLP) tasks, which can capture the dependency from the whole sentence with a high parallelizability thanks to the multi-head attention and the position-wise feed-forward network. However, the above two components of transformers are position-independent, which causes transformers to be weak in modeling sentence structures. Existing studies commonly utilized positional encoding or mask strategies for capturing the structural information of sentences. In this paper, we aim at strengthening the ability of transformers on modeling the linear structure of sentences from three aspects, containing the absolute position of tokens, the relative distance, and the direction between tokens. We propose a novel bidirectional Transformer with absolute-position aware relative position encoding (BiAR-Transformer) that combines the positional encoding and the mask strategy together. We model the relative distance between tokens along with the absolute position of tokens by a novel absolute-position aware relative position encoding. Meanwhile, we apply a bidirectional mask strategy for modeling the direction between tokens. Experimental results on the natural language inference, paraphrase identification, sentiment classification and machine translation tasks show that BiAR-Transformer achieves superior performance than other strong baselines.
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val...
详细信息
Artificial Intelligence, including machine learning and deep convolutional neural networks (DCNNs), relies on complex algorithms and neural networks to process and analyze data. DCNNs for visual recognition often requ...
详细信息
Wireless Body Area Networks (WBANs) have emerged as a transformative technology for health monitoring, leveraging sensor nodes placed on or within the human body. This paradigm offers real-time insights into physiolog...
详细信息
Crowd management becomes a global concern due to increased population in urban *** management of pedestrians leads to improved use of public *** of pedestrian’s is a major factor of crowd management in public *** are...
详细信息
Crowd management becomes a global concern due to increased population in urban *** management of pedestrians leads to improved use of public *** of pedestrian’s is a major factor of crowd management in public *** are multiple applications available in this area but the challenge is open due to complexity of crowd and depends on the *** this paper,we have proposed a new method for pedestrian’s behavior *** filter has been used to detect pedestrian’s usingmovement based ***,we have performed occlusion detection and removal using region shrinking method to isolate occluded *** verification is performed on each human silhouette and wavelet analysis and particle gradient motion are extracted for each *** Wolf Optimizer(GWO)has been utilized to optimize feature set and then behavior classification has been performed using the Extreme Gradient(XG)Boost *** has been evaluated using pedestrian’s data from avenue and UBI-Fight datasets,where both have different *** mean achieved accuracies are 91.3%and 85.14%over the Avenue and UBI-Fight datasets,*** results are more accurate as compared to other existing methods.
System logs record the system’s status and application behavior, providing support for various system management and diagnostic tasks. However, existing methods for log anomaly detection face several challenges, incl...
详细信息
technology-enhanced learning has the potential to increase educational quality. In this study, we examine the integration of augmented reality (AR) technology in rural primary schools in India. We listed articles asso...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized *** study provides an approach to color image encryption that could find practical use in various *** proposed method,which combines four chaotic systems,employs singular value decomposition and a chaotic sequence,making it both secure and *** unified average change intensity,the number of pixels’change rate,information entropy analysis,correlation coefficient analysis,compression friendliness,and security against brute force,statistical analysis and differential attacks are all used to evaluate the algorithm’s *** a thorough investigation of the experimental data,it is concluded that the proposed image encryption approach is secure against a wide range of attacks and provides superior compression friendliness when compared to chaos-based alternatives.
The degradation of optical remote sensing images due to atmospheric haze poses a significant obstacle,profoundly impeding their effective utilization across various *** methodologies have emerged as pivotal components...
详细信息
The degradation of optical remote sensing images due to atmospheric haze poses a significant obstacle,profoundly impeding their effective utilization across various *** methodologies have emerged as pivotal components of image preprocessing,fostering an improvement in the quality of remote sensing *** enhancement renders remote sensing data more indispensable,thereby enhancing the accuracy of target *** defogging techniques based on simplistic atmospheric degradation models have proven inadequate for mitigating non-uniform haze within remotely sensed *** response to this challenge,a novel UNet Residual Attention Network(URA-Net)is *** paradigmatic approach materializes as an end-to-end convolutional neural network distinguished by its utilization of multi-scale dense feature fusion clusters and gated jump *** essence of our methodology lies in local feature fusion within dense residual clusters,enabling the extraction of pertinent features from both preceding and current local data,depending on contextual *** intelligently orchestrated gated structures facilitate the propagation of these features to the decoder,resulting in superior outcomes in haze *** validation through a plethora of experiments substantiates the efficacy of URA-Net,demonstrating its superior performance compared to existing methods when applied to established datasets for remote sensing image *** the RICE-1 dataset,URA-Net achieves a Peak Signal-to-Noise Ratio(PSNR)of 29.07 dB,surpassing the Dark Channel Prior(DCP)by 11.17 dB,the All-in-One Network for Dehazing(AOD)by 7.82 dB,the Optimal Transmission Map and Adaptive Atmospheric Light For Dehazing(OTM-AAL)by 5.37 dB,the Unsupervised Single Image Dehazing(USID)by 8.0 dB,and the Superpixel-based Remote Sensing Image Dehazing(SRD)by 8.5 *** noteworthy,on the SateHaze1k dataset,URA-Net attains preeminence in overall performance,yieldi
暂无评论