Machine reading comprehension (MRC) is a fundamental natural language understanding task in natural language processing, which aims to comprehend the text of a given passage and answer questions based on it. Understan...
详细信息
Graphconvolutional networks(GCNs)have become prevalent in recommender system(RS)due to their superiority in modeling collaborative *** improving the overall accuracy,GCNs unfortunately amplify popularity bias-tail ite...
详细信息
Graphconvolutional networks(GCNs)have become prevalent in recommender system(RS)due to their superiority in modeling collaborative *** improving the overall accuracy,GCNs unfortunately amplify popularity bias-tail items are less likely to be *** effect prevents the GCN-based RS from making precise and fair recommendations,decreasing the effectiveness of recommender systems in the long *** this paper,we investigate how graph convolutions amplify the popularity bias in *** theoretical analyses,we identify two fundamental factors:(1)with graph convolution(i.e.,neighborhood aggregation),popular items exert larger influence than tail items on neighbor users,making the users move towards popular items in the representation space;(2)after multiple times of graph convolution,popular items would affect more high-order neighbors and become more *** two points make popular items get closer to almost users and thus being recommended more *** rectify this,we propose to estimate the amplified effect of popular nodes on each node's representation,and intervene the effect after each graph ***,we adopt clustering to discover highly-influential nodes and estimate the amplification effect of each node,then remove the effect from the node embeddings at each graph convolution *** method is simple and generic-it can be used in the inference stage to correct existing models rather than training a new model from scratch,and can be applied to various GCN *** demonstrate our method on two representative GCN backbones LightGCN and UltraGCN,verifying its ability in improving the recommendations of tail items without sacrificing the performance of popular *** are open-sourced^(1)).
Breast cancer is a prevalent and highly lethal cancer affecting women globally. While non-invasive techniques like ultrasound and mammogram are used for diagnosis, histological examination after biopsy is considered t...
详细信息
Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles th...
详细信息
Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate *** most applications,a frame-work must ensure that the retrieved data reflects the transmitted *** driv-ing to other nodes,if the frame between the two nodes is deformed in the data-link layer,it must be *** link-layer protocols immediately disregard the frame and enable the high-layer protocols to transmit it *** other words,because of asset information must be secured from threats,information is a valu-able *** MANETs,some applications necessitate the use of a network method for detecting and blocking these *** a secure intrusion detection system in the network,which provides security to the nodes and route paths in the network,is a major difficulty in *** on the network can jeopardize security issues discovered by the intrusion detection system engine,which are then blocked by the network’s intrusion prevention *** bringing the Secure Intrusion Detection System(S-IDS)into the network,a new technique for implementing security goals and preventing attacks will be *** Secure Energy Routing(SER)protocol for MANETs is introduced in this *** protocol addresses the issue of network security by detecting and preventing attacks in the *** data transmission in the MANET is forwarded using Elliptical Curve Cryptography(ECC)with an objective to improve the level of *** Simulator–2 is used to simulate the network and experiments are compared with existing methods.
Graphics Interchange Format (GIF) encoding is the art of reproducing an image with limited colors. Existing GIF encoding schemes often introduce unpleasant visual artifacts such as banding artifact, dotted-pattern noi...
详细信息
DeepFakes and face image manipulation methods have been widely distributed in the last few years and several techniques have been presented to check the authenticity of the face image and detect manipulation if exists...
详细信息
Breast cancer stands as one of the world’s most perilous and formidable diseases,having recently surpassed lung cancer as the most prevalent cancer *** disease arises when cells in the breast undergo unregulated prol...
详细信息
Breast cancer stands as one of the world’s most perilous and formidable diseases,having recently surpassed lung cancer as the most prevalent cancer *** disease arises when cells in the breast undergo unregulated proliferation,resulting in the formation of a tumor that has the capacity to invade surrounding *** is not confined to a specific gender;both men and women can be diagnosed with breast cancer,although it is more frequently observed in *** detection is pivotal in mitigating its mortality *** key to curbing its mortality lies in early ***,it is crucial to explain the black-box machine learning algorithms in this field to gain the trust of medical professionals and *** this study,we experimented with various machine learning models to predict breast cancer using the Wisconsin Breast Cancer Dataset(WBCD)*** applied Random Forest,XGBoost,Support Vector Machine(SVM),Multi-Layer Perceptron(MLP),and Gradient Boost classifiers,with the Random Forest model outperforming the others.A comparison analysis between the two methods was done after performing hyperparameter tuning on each *** analysis showed that the random forest performs better and yields the highest result with 99.46%*** performance evaluation,two Explainable Artificial Intelligence(XAI)methods,SHapley Additive exPlanations(SHAP)and Local Interpretable Model-Agnostic Explanations(LIME),have been utilized to explain the random forest machine learning model.
In recent years, the data-driven electricity theft detection methods integrated with edge cloud computing [1, 2] have not only demonstrated superior detection accuracy but also improved efficiency, making them viable ...
详细信息
In recent years, the data-driven electricity theft detection methods integrated with edge cloud computing [1, 2] have not only demonstrated superior detection accuracy but also improved efficiency, making them viable alternatives to indoor inspections. Energy service providers(ESPs) typically manage regions by dividing them into various transformer districts(TDs). The detection of electricity theft in a particular region is performed by the associated TD,
Spectral compressive imaging has emerged as a powerful technique to collect the 3D spectral information as 2D *** algorithm for restoring the original 3D hyperspectral images(HSIs)from compressive measurements is pivo...
详细信息
Spectral compressive imaging has emerged as a powerful technique to collect the 3D spectral information as 2D *** algorithm for restoring the original 3D hyperspectral images(HSIs)from compressive measurements is pivotal in the imaging *** approaches painstakingly designed networks to directly map compressive measurements to HSIs,resulting in the lack of interpretability without exploiting the imaging *** some recent works have introduced the deep unfolding framework for explainable reconstruction,the performance of these methods is still limited by the weak information transmission between iterative *** this paper,we propose a Memory-Augmented deep Unfolding Network,termed MAUN,for explainable and accurate HSI ***,MAUN implements a novel CNN scheme to facilitate a better extrapolation step of the fast iterative shrinkage-thresholding algorithm,introducing an extra momentum incorporation step for each iteration to alleviate the information ***,to exploit the high correlation of intermediate images from neighboring iterations,we customize a cross-stage transformer(CSFormer)as the deep denoiser to simultaneously capture self-similarity from both in-stage and cross-stage features,which is the first attempt to model the long-distance dependencies between iteration *** experiments demonstrate that the proposed MAUN is superior to other state-of-the-art methods both visually and *** code is publicly available at https://***/HuQ1an/MAUN.
In recent years, numerous CNN-based light field (LF) image super-resolution (SR) methods have been developed. However, due to the downsampling inconsistency between low-resolution (LR) testing LF images and LR trainin...
详细信息
暂无评论