The application of contrastive learning (CL) to collaborative filtering (CF) in recommender systems has achieved remarkable success. CL-based recommendation models mainly focus on creating multiple augmented views by ...
详细信息
The tell tail is usually placed on the triangular sail to display the running state of the air flow on the sail *** is of great significance to make accurate judgement on the drift of the tell tail of the sailboat dur...
详细信息
The tell tail is usually placed on the triangular sail to display the running state of the air flow on the sail *** is of great significance to make accurate judgement on the drift of the tell tail of the sailboat during sailing for the best sailing *** it is difficult for sailors to keep an eye for a long time on the tell sail for accurate judging its changes,affected by strong sunlight and visual *** this case,we adopt computer vision technology in hope of helping the sailors judge the changes of the tell tail in ease with *** paper proposes for the first time a method to classify sailboat tell tails based on deep learning and an expert guidance system,supported by a sailboat tell tail classification data set on the expert guidance system of interpreting the tell tails states in different sea wind conditions,including the feature extraction *** the expression capabilities that vary with the computational features in different visual tasks,the paper focuses on five tell tail computing features,which are recoded by an automatic encoder and classified by a SVM *** experimental samples were randomly divided into five groups,and four groups were selected from each group as the training set to train the *** remaining one group was used as the test set for *** highest resolution value of the ResNet network was 80.26%.To achieve better operational results on the basis of deep computing features obtained through the ResNet network in the *** method can be used to assist the sailors in making better judgement about the tell tail changes during sailing.
This study focuses on BTLC, a peer-to-peer international trade model based on blockchain and smart contracts, which aims to reform the traditional let- ter of credit process, improve international trade efficiency, re...
详细信息
作者:
Deng, ShiyuLi, LiXiong, YichenZhang, JianSchool of Computer Science
Beijing International Science and Technology Cooperation Base of Intelligent Decision and Big Data Application Beijing Information Science and Technology University Laboratory of Big Data Decision Making for Green Development Beijing China School of Economics and Management
Beijing International Science and Technology Cooperation Base of Intelligent Decision and Big Data Application Beijing Information Science and Technology University Laboratory of Big Data Decision Making for Green Development Beijing China
Aiming at solving the problem of high time complexity of association rule mining among item-sets in Apriori algorithm and obtaining the set of goal-association relations of single-to-single point type, this paper impr...
详细信息
Aiming to address the shortcomings of Dung Beetle Optimizer (DBO) in the areas of accuracy and convergence speed in dealing with cloud computing task scheduling issues, this paper suggests an advanced Dung Beetle Opti...
详细信息
To transmit customer power data collected by smart meters(SMs)to utility companies,data must first be transmitted to the corresponding data aggregation point(DAP)of the *** number of DAPs installed and the installatio...
详细信息
To transmit customer power data collected by smart meters(SMs)to utility companies,data must first be transmitted to the corresponding data aggregation point(DAP)of the *** number of DAPs installed and the installation location greatly impact the whole *** the traditional DAP placement algorithm,the number of DAPs must be set in advance,but determining the best number of DAPs is difficult,which undoubtedly reduces the overall performance of the ***,the excessive gap between the loads of different DAPs is also an important factor affecting the quality of the *** address the above problems,this paper proposes a DAP placement algorithm,APSSA,based on the improved affinity propagation(AP)algorithm and sparrow search(SSA)algorithm,which can select the appropriate number of DAPs to be installed and the corresponding installation locations according to the number of SMs and their distribution locations in different *** algorithm adds an allocation mechanism to optimize the subnetwork in the *** is evaluated under three different areas and compared with other DAP placement *** experimental results validated that the method in this paper can reduce the network cost,shorten the average transmission distance,and reduce the load gap.
Edge artificial intelligence (AI) has been a promising solution towards 6G to empower a series of advanced techniques such as digital twins, holographic projection, semantic communications, and auto-driving, for achie...
详细信息
The existence of adversarial example reveals the fragility in neural networks, and the exploration of their theoretical origins increases the interpretability of deep learning, enhances researchers’ understanding of ...
详细信息
ISBN:
(纸本)9789819785391
The existence of adversarial example reveals the fragility in neural networks, and the exploration of their theoretical origins increases the interpretability of deep learning, enhances researchers’ understanding of neural networks, and contributes to the development of next-generation artificial intelligence, which has attracted widespread research in various fields. The targeted adversarial attack problem based on sample features faces two problems: on the one hand, the difference in the model’s attention to different features in the example;On the other hand, the bias that occurs in adversarial attacks can have an impact on targeted attacks. The mechanism of the human eye relies more on the shape information of the image. However, in the past, artificial intelligence models based on convolutional neural networks often relied on the texture features of image examples to make decisions. At present, general optimize adversarial attack algorithms do not distinguish different types of features based on different parts of the image, but only process the entire example in a general manner, making it difficult to effectively utilize the effective features in the example, resulting in poor algorithm performance and interpretability. This article optimizes the adversarial attack algorithm based on optimization iteration, as follows: Firstly, different types of information in adversarial examples are studied, and fourier transform technology is used to process the attacked original image and obtain its low-frequency information. The obtained low-frequency examples are randomly cropped to obtain some feature examples. Then, the clustering effect was studied when the examples were attacked without targets, and an inter-class smoothing loss was designed to improve the success rate of target attacks. This Rebalance Universal Feature Method (RFM) is based on fourier low pass filtering and inter-class smoothing, which effectively improves the ability of optimization iteration bas
In the field of simultaneous localization and mapping (SLAM), visual odometry (VO) always has great application prospects. In recent years, with the progress in the field of machine learning, methods based on neural n...
详细信息
Backdoor attacks involve the injection of a limited quantity of poisoned samples containing triggers into the training dataset. During the inference stage, backdoor attacks can uphold a high level of accuracy for norm...
详细信息
暂无评论