Attention is one of the important cognitive functions of human beings, but with the prevalence of students' lack of attention, especially in the early childhood, the cultivation of attention becomes particularly c...
详细信息
ISBN:
(纸本)9798400711831
Attention is one of the important cognitive functions of human beings, but with the prevalence of students' lack of attention, especially in the early childhood, the cultivation of attention becomes particularly critical thing. Electroencephalogram (EEG) signals can reflect the cognitive state of the brain, especially different frequency bands such as α, β, θ, δ bands are closely related to attention. Eye tracking data and attention are directly and closely related. Eye tracking data and EEG are complementary, which can reveal the characteristics of human visual attention distribution, attention transfer and distribution. Relevant studies show that the combination of EEG and eye tracking technology can more accurately assess and adjust attention. In this paper, a two-modal feature fusion model based on multi-head self-attention mechanism is proposed to learn the relationship between the two-modal features data. We input the features of multi-head self-attention fusion, the features of single mode and the features of bimodal directly splintered into multiple classifiers, and the features of multi-head self-attention fusion obtain higher classification accuracy.
In our pursuit of quantum supremacy during the NISQ era, this research introduces a novel approach rooted in the Quantum Approximate Optimization Algorithm (QAOA) framework to address the Traveling Salesman Problem (T...
详细信息
Matching a target spectrum with known spectra in a spectral library is a common method for material identification in hyperspectral imaging research. Hyperspectral spectra exhibit precise absorption features across di...
详细信息
ISBN:
(数字)9798350360325
ISBN:
(纸本)9798350360332
Matching a target spectrum with known spectra in a spectral library is a common method for material identification in hyperspectral imaging research. Hyperspectral spectra exhibit precise absorption features across different wavelength segments, and the unique shapes and positions of these absorptions create distinct spectral signatures for each material, aiding in their identification. Therefore, only the specific positions can be considered for material identification. This study introduces the Weighted Sum of Segmented Correlation method, which calculates correlation indices between various segments of a library and a test spectrum, and derives a matching index, favoring positive correlations and penalizing negative correlations using assigned weights. The effectiveness of this approach is evaluated for mineral identification in hyperspectral images from both Earth and Martian surfaces.
With the development of edge devices and cloud computing,the question of how to accomplish machine learning and optimization tasks in a privacy-preserving and secure way has attracted increased attention over the past...
详细信息
With the development of edge devices and cloud computing,the question of how to accomplish machine learning and optimization tasks in a privacy-preserving and secure way has attracted increased attention over the past *** a privacy-preserving distributed machine learning method,federated learning(FL)has become popular in the last few ***,the data privacy issue also occurs when solving optimization problems,which has received little attention so *** survey paper is concerned with privacy-preserving optimization,with a focus on privacy-preserving data-driven evolutionary *** aims to provide a roadmap from secure privacy-preserving learning to secure privacy-preserving optimization by summarizing security mechanisms and privacy-preserving approaches that can be employed in machine learning and *** provide a formal definition of security and privacy in learning,followed by a comprehensive review of FL schemes and cryptographic privacy-preserving ***,we present ideas on the emerging area of privacy-preserving optimization,ranging from privacy-preserving distributed optimization to privacy-preserving evolutionary optimization and privacy-preserving Bayesian optimization(BO).We further provide a thorough security analysis of BO and evolutionary optimization methods from the perspective of inferring attacks and active *** the basis of the above,an in-depth discussion is given to analyze what FL and distributed optimization strategies can be used for the design of federated optimization and what additional requirements are needed for achieving these ***,we conclude the survey by outlining open questions and remaining challenges in federated data-driven *** hope this survey can provide insights into the relationship between FL and federated optimization and will promote research interest in secure federated optimization.
Collaborative Robot (cobot) cells are getting more and more integrative building blocks of Cyber Physical Enterprises. These cells integrate the advantages of human workers with the special capabilities of robots in a...
详细信息
Collaborative Robot (cobot) cells are getting more and more integrative building blocks of Cyber Physical Enterprises. These cells integrate the advantages of human workers with the special capabilities of robots in a safe manner. Cobots need advanced, in many cases artificial intelligence (AI) based control systems to harmonize the collaborative activities. When transferring/transforming experimental setups into industrial application, not only technological and business related, but also ethical aspects have to be taken into consideration. The paper introduces a novel workflow supporting this transformation and presents its application in a case-study of a cobot cell which uses advanced sensing, symbolic AI planning and mixed reality techniques for planning and explaining visually the operation of the cell. The work which takes the responsible artificial intelligence (RAI) approach combines the actual relevant AI standards with the explicit requirements of industrial practitioners.
In traumatic medical emergencies, the patients heavily depend on cranioplasty - the craft of neurocranial repair using cranial implants. Despite the improvements made in recent years, the design of a patient-specific ...
详细信息
We provide a perfect sampling algorithm for the hard-sphere model on subsets of d with expected running time linear in the volume under the assumption of strong spatial mixing. A large number of perfect and approximat...
详细信息
Ahstract-Zero-shot text classification leverages pre-trained transformer models to categorize texts without the need for task-specific training. This paper analyzes a variety of transformer-based pre-trained methods o...
详细信息
ISBN:
(数字)9798350368833
ISBN:
(纸本)9798350368840
Ahstract-Zero-shot text classification leverages pre-trained transformer models to categorize texts without the need for task-specific training. This paper analyzes a variety of transformer-based pre-trained methods on the task of zero-shot text classi-fication. Specifically, we present a deep comparative analysis of various transformer models, such as BART, DeBerta, DistiIBART, RoBERTa, and their variants, and evaluate their performance in various zero-shot text classification schemes. Furthermore, we examine the models' generalization capabilities. The findings highlight key strengths and weaknesses of each model, providing insights into their suitability for different text categorization tasks. Our research contributes to the broader understanding of transformer-based approaches and offers guidance for selecting models for zero-shot text classification.
k-Nearest neighbor machine translation (kNNMT) has attracted increasing attention due to its ability to non-parametrically adapt to new translation domains. By using an upstream NMT model to traverse the downstream tr...
详细信息
Various methods have been proposed for analyzing traffic accident hotspots. One of these methods is to detect traffic accident hotspots on the road network using a hypothesis testing method. However, this method does ...
详细信息
暂无评论