Convex clustering,turning clustering into a convex optimization problem,has drawn wide *** overcomes the shortcomings of traditional clustering methods such as K-means,Density-Based Spatial Clustring of Applications w...
详细信息
Convex clustering,turning clustering into a convex optimization problem,has drawn wide *** overcomes the shortcomings of traditional clustering methods such as K-means,Density-Based Spatial Clustring of Applications with Noise(DBSCAN)and hierarchical clustering that can easily fall into the local optimal ***,convex clustering is vulnerable to the occurrence of outlier features,as it uses the Frobenius norm to measure the distance between data points and their corresponding cluster centers and evaluate *** accurately identify outlier features,this paper decomposes data into a clustering structure component and a normalized component that captures outlier *** from existing convex clustering evaluating features with the exact measurement,the proposed model can overcome the vast difference in the magnitude of different features and the outlier features can be efficiently identified and *** solve the proposed model,we design an efficient algorithm and prove the global convergence of the *** on both synthetic datasets and UCI datasets demonstrate that the proposed method outperforms the compared approaches in convex clustering.
Adversarial attacks in the Artificial Intelligence have received extensive coverage in the latest years. Such attacks have affected deep learning models and neural networks due to the weaknesses that are part of the A...
详细信息
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many *** by the self-nonself discrimination par...
详细信息
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many *** by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network ***,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called ***,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept ***,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social *** evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social *** experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding *** experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components.
Quantum communication is rapidly developing and is gradually being commercialized due to its technological *** dense communication links among multiple users in a scalable and efficient way is of great significance fo...
详细信息
Quantum communication is rapidly developing and is gradually being commercialized due to its technological *** dense communication links among multiple users in a scalable and efficient way is of great significance for realizing a large-scale quantum communication ***,we propose a novel scheme to construct a fully connected polarizationentangled network,utilizing the engineering of spontaneous four-wave mixings(SFWMs)and a path-polarization *** does not require active optical switches which limit the communication speed,or trusted nodes which lead to potential security *** required frequency channels in the network grow linearly with the number of *** experimentally demonstrate a six-user fully connected network with on-chip SFWM processes motivated by four *** user in the network receives a frequency channel,and all fifteen connections between the users are implemented *** work opens up a promising scheme to efficiently construct fully connected large-scale networks.
In the workplace, risk prevention helps detect the risks and prevent accidents. To achieve this, workers' mental and physical parameters related to their health should be focused on and analyzed. It helps improve ...
详细信息
This study focuses on the application of Explainable Artificial Intelligence (XAI) in Stroke, heart attack and cancer prediction, highlighting the importance of XAI. This technology helps users to clearly understand t...
详细信息
The earlier research clearly indicated that the bimodal authentication system has more efficiency than unimodal and multimodal. This is due to the reason for the best intact biometric traits of fingerprint and retina....
详细信息
Chronic diseases in human beings are long-lasting health disorders that will progress slowly over months or a lifetime. The chronic diseases can affect various parts or systems of the body and are non-acute in nature....
详细信息
Creating realistic materials is essential in the construction of immersive virtual *** existing techniques for material capture and conditional generation rely on flash-lit photos,they often produce artifacts when the...
详细信息
Creating realistic materials is essential in the construction of immersive virtual *** existing techniques for material capture and conditional generation rely on flash-lit photos,they often produce artifacts when the illumination mismatches the training *** this study,we introduce DiffMat,a novel diffusion model that integrates the CLIP image encoder and a multi-layer,crossattention denoising backbone to generate latent materials from images under various *** a pre-trained StyleGAN-based material generator,our method converts these latent materials into high-resolution SVBRDF textures,a process that enables a seamless fit into the standard physically based rendering pipeline,reducing the requirements for vast computational resources and expansive *** surpasses existing generative methods in terms of material quality and variety,and shows adaptability to a broader spectrum of lighting conditions in reference images.
作者:
Butola, RajatLi, YimingKola, Sekhar ReddyNational Yang Ming Chiao Tung University
Parallel and Scientific Computing Laboratory Electrical Engineering and Computer Science International Graduate Program Hsinchu300093 Taiwan Institute of Pioneer Semiconductor Innovation
The Institute of Artificial Intelligence Innovation National Yang Ming Chiao Tung University Parallel and Scientific Computing Laboratory Electrical Engineering and Computer Science International Graduate Program The Institute of Communications Engineering the Institute of Biomedical Engineering Department of Electronics and Electrical Engineering Hsinchu300093 Taiwan
In this work, a dynamic weighting-artificial neural network (DW-ANN) methodology is presented for quick and automated compact model (CM) generation. It takes advantage of both TCAD simulations for high accuracy and SP...
详细信息
暂无评论