Graph neural network (GNN) has gained increasing popularity in recent years owing to its capability and flexibility in modeling complex graph structure data. Among all graph learning methods, hypergraph learning is a ...
详细信息
Blockchain and the Internet of Things (IoT), two of the most emerging technologies, are already reconfiguring our digital future, as described by the drastic change in the current network architecture. The incorporati...
详细信息
Facial expression recognition is a challenging task when neural network is applied to pattern recognition. Most of the current recognition research is based on single source facial data, which generally has the disadv...
详细信息
Wheat is the most widely grown crop in the world,and its yield is closely related to global food *** number of ears is important for wheat breeding and yield ***,automated wheat ear counting techniques are essential f...
详细信息
Wheat is the most widely grown crop in the world,and its yield is closely related to global food *** number of ears is important for wheat breeding and yield ***,automated wheat ear counting techniques are essential for breeding high-yield varieties and increasing grain ***,all existing methods require position-level annotation for training,implying that a large amount of labor is required for annotation,limiting the application and development of deep learning technology in the agricultural *** address this problem,we propose a count-supervised multiscale perceptive wheat counting network(CSNet,count-supervised network),which aims to achieve accurate counting of wheat ears using quantity *** particular,in the absence of location information,CSNet adopts MLP-Mixer to construct a multiscale perception module with a global receptive field that implements the learning of small target attention maps between wheat ear *** conduct comparative experiments on a publicly available global wheat head detection dataset,showing that the proposed count-supervised strategy outperforms existing position-supervised methods in terms of mean absolute error(MAE)and root mean square error(RMSE).This superior performance indicates that the proposed approach has a positive impact on improving ear counts and reducing labeling costs,demonstrating its great potential for agricultural counting *** code is available at .
Masked face identification (MFI) aims to identify human faces that are obscured by masks or occluding objects. Today’s common practice of wearing masks imposes significant barriers to facial recognition systems that ...
详细信息
Cancer remains the leading cause of death worldwide, significantly impacting individuals and healthcare systems alike. In recent decades, skin cancer has surged in prevalence compared to other major cancer types. Vari...
详细信息
Open networks and heterogeneous services in the Internet of Vehicles(IoV)can lead to security and privacy *** key requirement for such systems is the preservation of user privacy,ensuring a seamless experience in driv...
详细信息
Open networks and heterogeneous services in the Internet of Vehicles(IoV)can lead to security and privacy *** key requirement for such systems is the preservation of user privacy,ensuring a seamless experience in driving,navigation,and *** privacy needs are influenced by various factors,such as data collected at different intervals,trip durations,and user *** address this,the paper proposes a Support Vector Machine(SVM)model designed to process large amounts of aggregated data and recommend privacy preserving *** model analyzes data based on user demands and interactions with service providers or neighboring *** aims to minimize privacy risks while ensuring service continuity and *** SVMmodel helps validate the system’s reliability by creating a hyperplane that distinguishes between maximum and minimum privacy *** results demonstrate the effectiveness of the proposed SVM model in enhancing both privacy and service performance.
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not ...
详细信息
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not a trivial task and thus is the center of focus for many researchers due to its *** study aims to analyze Twitter data to detect cyber threats using a multiclass classification *** data is passed through different tasks to prepare it for the *** Frequency and Inverse Document Frequency(TFIDF)features are extracted to vectorize the cleaned data and several machine learning algorithms are used to classify the Twitter posts into multiple classes of cyber *** results are evaluated using different metrics including precision,recall,F-score,and *** work contributes to the cyber security research *** experiments revealed the promised results of the analysis using the Random Forest(RF)algorithm with(F-score=81%).This result outperformed the existing studies in the field of cyber threat detection and showed the importance of detecting cyber threats in social media *** is a need for more investigation in the field of multiclass classification to achieve more accurate *** the future,this study suggests applying different data representations for the feature extraction other than TF-IDF such as Word2Vec,and adding a new phase for feature selection to select the optimum features subset to achieve higher accuracy of the detection process.
Since requirement dependency extraction is a cognitively challenging and error-prone task,this paper proposes an automatic requirement dependency extraction method based on integrated active learning *** this paper,th...
详细信息
Since requirement dependency extraction is a cognitively challenging and error-prone task,this paper proposes an automatic requirement dependency extraction method based on integrated active learning *** this paper,the coefficient of variation method was used to determine the corresponding weight of the impact factors from three different angles:uncertainty probability,text similarity difference degree and active learning variant prediction divergence *** combining the three factors with the proposed calculation formula to measure the information value of dependency pairs,the top K dependency pairs with the highest comprehensive evaluation value are selected as the optimal *** the optimal samples are continuously added into the initial training set,the performance of the active learning model using different dependency features for requirement dependency extraction is rapidly ***,compared with other active learning strategies,a higher evaluation measure of requirement dependency extraction can be achieved by using the same number of ***,the proposed method using the PV-DM dependency feature improves the weight-F1 by 2.71%,the weight-recall by 2.45%,and the weight-precision by 2.64%in comparison with other strategies,saving approximately 46%of the labelled data compared with the machine learning approach.
Die-stacked dynamic random access memory(DRAM)caches are increasingly advocated to bridge the performance gap between the on-chip cache and the main *** fully realize their potential,it is essential to improve DRAM ca...
详细信息
Die-stacked dynamic random access memory(DRAM)caches are increasingly advocated to bridge the performance gap between the on-chip cache and the main *** fully realize their potential,it is essential to improve DRAM cache hit rate and lower its cache hit *** order to take advantage of the high hit-rate of set-association and the low hit latency of direct-mapping at the same time,we propose a partial direct-mapped die-stacked DRAM cache called *** design is motivated by a key observation,i.e.,applying a unified mapping policy to different types of blocks cannot achieve a high cache hit rate and low hit latency *** address this problem,P3DC classifies data blocks into leading blocks and following blocks,and places them at static positions and dynamic positions,respectively,in a unified set-associative *** also propose a replacement policy to balance the miss penalty and the temporal locality of different *** addition,P3DC provides a policy to mitigate cache thrashing due to block type *** results demonstrate that P3DC can reduce the cache hit latency by 20.5%while achieving a similar cache hit rate compared with typical set-associative caches.P3DC improves the instructions per cycle(IPC)by up to 66%(12%on average)compared with the state-of-the-art direct-mapped cache—BEAR,and by up to 19%(6%on average)compared with the tag-data decoupled set-associative cache—DEC-A8.
暂无评论