While Transformers have been the main architecture behind deep learning's success in language modeling, state-space models (SSMs) such as Mamba have recently been shown to match or outperform Transformers at small...
详细信息
While Transformers have been the main architecture behind deep learning's success in language modeling, state-space models (SSMs) such as Mamba have recently been shown to match or outperform Transformers at small to medium scale. We show that these families of models are actually quite closely related, and develop a rich framework of theoretical connections between SSMs and variants of attention, connected through various decompositions of a well-studied class of structured semiseparable matrices. Our state space duality (SSD) framework allows us to design a new architecture (Mamba-2) whose core layer is an a refinement of Mamba's selective SSM that is 2-8× faster, while continuing to be competitive with Transformers on language modeling. Copyright 2024 by the author(s)
The standard active learning setting assumes a willing labeler, who provides labels on informative examples to speed up learning. However, if the labeler wishes to be compensated for as many labels as possible before ...
详细信息
In recent years, there has been a significant advance in the use of machinelearning (ML) techniques to extract gene expression data from microarray databases, particularly in cancer-related research. There no unified...
详细信息
We consider the problem of sequential change detection under minimal assumptions on the distribution generating the stream of observations. Formally, our goal is to design a scheme for detecting any changes in a param...
We consider the problem of sequential change detection under minimal assumptions on the distribution generating the stream of observations. Formally, our goal is to design a scheme for detecting any changes in a parameter or functional θ of the data stream distribution that has small detection delay, but guarantees control on the frequency of false alarms in the absence of changes. We describe a simple reduction from sequential change detection to sequential estimation using confidence sequences (CSs): begin a new level-(1 − α) CS at each time step, and proclaim a change as soon as the intersection of all active CSs becomes empty. We prove that the average run length of our scheme is at least 1/α, resulting in a change detection scheme with minimal structural assumptions (thus allowing for possibly dependent observations, and nonparametric distribution classes), but strong guarantees. We also describe an interesting parallel with Lorden's reduction from change detection to sequential testing and connections to the recent "e-detector" framework. Copyright 2024 by the author(s)
The use of the ADAM (Adaptive Moment Estimation) and SGD (Stochastic Gradient Descent) algorithms to optimize the YOLOv7(You Only Look Once), YOLOv8, and YOLO-NAS models for weed detection in agricultural landscapes i...
详细信息
With the rapid digitization of Electronic Health Records (EHRs), fast and adaptive data anonymization methods have become increasingly important. While tools from topological data analysis (TDA) have been proposed to ...
详细信息
In response to the increase of biased and misleading opinions on social media regarding climate change, we present the Neural Language Style Transfer Bias (NLST Bias) framework - an AI-driven solution to identify and ...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machinelearning architectures have been presented recently to improve stego image identification performance by using spatial information...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machinelearning architectures have been presented recently to improve stego image identification performance by using spatial information,and these methods have made it feasible to handle a wide range of problems associated with image *** with little information or low payload are used by information embedding methods,but the goal of all contemporary research is to employ high-payload images for *** address the need for both low-and high-payload images,this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to efficiently extract characteristics from both type of *** Vector machine(SVM),a commonplace classification technique,has been employed to determine whether the image is a stego or *** Wavelet Obtained Weights(WOW),Spatial Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Steganography(HUGO),and Minimizing the Power of Optimal Detector(MiPOD)steganography techniques are used in a variety of experimental scenarios to evaluate the performance of the *** WOW at several payloads,the proposed approach proves its classification accuracy of 98.60%.It exhibits its superiority over SOTA methods.
This survey offers the review of Healthcare Monitoring Systems (HMS) and Privacy Preservation (PP) approaches. The main objective is based on the detection of heart disease and maintain the security for patient data. ...
详细信息
作者:
Ghanem, Sahar I.
Computer Science and Artificial Intelligence Faculty Artificial Intelligence and Machine Learning Department Egypt
In an attempt to facilitate the way students, succeed academically, academic advising is an integral part of the educational system. However, it has frequently been dependent on time-consuming manual processes and per...
详细信息
暂无评论