This paper proposes a structure called SPBNet for enhancing binarized convolutional neural networks (BCNNs) using a low-cost 1-D spatial attention structure. Attention blocks can compensate for the performance drop in...
This paper proposes a structure called SPBNet for enhancing binarized convolutional neural networks (BCNNs) using a low-cost 1-D spatial attention structure. Attention blocks can compensate for the performance drop in BCNNs. However, the hardware overhead of complex attention blocks can be a significant burden in BCNNs. The proposed attention block consists of low-cost 1-D height-wise and width-wise 1-D convolutions, It has the attention bias to adjust the effects of attended features in ×0.5−×1.5. In experiments, the proposed block used in ResNet18-based BCNNs improves Top-1 accuracy up to 2.7% over a baseline ReActNet on the CIFAR100 dataset. Notably, without using teacher-student training, the proposed structure can show comparable performance as the baseline ReActNetA using teacher-student training.
The project of E-Simulator is under way at Hyogo Earthquake Engineering Research Center (E-Defense) of National Research Institute of Earth Science and Disaster Prevention (NIED), Japan, which facilitates the world...
详细信息
ISBN:
(纸本)9781617388446
The project of E-Simulator is under way at Hyogo Earthquake Engineering Research Center (E-Defense) of National Research Institute of Earth Science and Disaster Prevention (NIED), Japan, which facilitates the world's largest shaking table. The E-Simulator uses the parallel finite element (FE) analysis software package called ADVENTYRECluster (ADVC) as a platform. In this study, we report the results of high-precision FE-analysis for simulation of collapse behavior of the 4-story steel building frame that is the specimen of the full-scale total collapse shaking-table test conducted in September 2007 at E-Defense. It is shown that elastoplastic dynamic responses can be estimated with good accuracy using a high-precision FE-analysis without resort to macro models such as plastic hinge and composite beam effect.
To accommodate frequent emergencies, interruptions, and delays, hospital staff continually make and coordinate changes to the surgery schedule. The technical and social aspects of coordination in surgical suites have ...
详细信息
The project of E-Simulator is under way at Hyogo Earthquake Engineering Research Center (E-Defense), which belongs to National Research Institute for Earth Science and Disaster Prevention (NIED), Japan. E-Defense faci...
详细信息
The project of E-Simulator is under way at Hyogo Earthquake Engineering Research Center (E-Defense), which belongs to National Research Institute for Earth Science and Disaster Prevention (NIED), Japan. E-Defense facilitates the world's largest shaking table. The E-Simulator uses the parallel EF-analysis software package called ADVENTURECluster (ADVC) as a platform, and we carried out elastoplastic seismic response analysis of high-rise building frame with over 70-million DOFs. In this study, we report the results of high-precision FE-analysis for simulation of dynamic collapse behavior of the 4-story steel building frame. The whole frame is discretized into hexahedral elements with linear interpolation functions. In order to improve the accuracy of collapse simulation, a new piecewise linear combined isotropic and kinematic hardening rule is implemented for steel material, and its parameters are identified from the uniaxial material test result. The stud bolts are precisely modeled using multipoint constraints and nonlinear springs. The wire-meshes in the concrete slab are modeled using hexahedral elements. The damping due to plastic energy dissipation of exterior walls is modeled by shear springs between the floors. The accuracy of the model is verified in comparison to the physical test of steel-concrete composite beam subjected to static deformation. It will be shown that elastoplastic dynamic responses of the 4-story frame can be estimated with good accuracy using a high-precision FE-analysis without resort to macro-models such as plastic hinge and composite beam effect.
A bidirectional transformation consists of a pair of unidirectional transformations: a forward transformation that maps one data structure called source to another called view, and a backward transformation that refle...
详细信息
A bidirectional transformation consists of a pair of unidirectional transformations: a forward transformation that maps one data structure called source to another called view, and a backward transformation that reflects changes in the view to the source. Bidirectional transformation has many useful applications such as replicated data synchronization, presentation-oriented editor development, and software artifact synchronization. In a previous work, we proposed a framework in which a backward transformation is automatically generated from a forward transformation by derivation of a complementary function if the forward transformation is given by a program in a simple functional language. However, the language has a severe restriction that no variable is allowed to be used more than once. In this paper, we show that tupling transformation relaxes this restriction, allowing us to handle a wider class of bidirectional transformations that may contain duplications.
Along with the thorough development and application for Web services, the security of it has taken people¿s attention more and more. While Web services security (WSS) can exchange safe SOAP message and enhance th...
详细信息
Along with the thorough development and application for Web services, the security of it has taken people¿s attention more and more. While Web services security (WSS) can exchange safe SOAP message and enhance the security of Web services, it will also have certain influence to the performance of Web services. In order to satisfy the security of it , to reduce the performance influence of Web services and to solve both the requester and provider side cannot recognize the security token, in this paper, we aim at proposing a SOAP information registration and security token proxy model for Web services (SIRSTPM). We has carried on the formalizing and verifying of this model. The result of theoretical verification shows this model is secure and effective. This model is helpful for solving the problem between security and performance contradiction as well as the token cannot be recognized by both the requester and the provider.
暂无评论