作者:
Liu, XipingDou, WanchunWang, XinNanjing Univ Posts & Telecommun
Jiangsu Key Lab Big Data Security& Intelligent Pr Sch Comp Sci Nanjing 210023 Jiangsu Peoples R China Nanjing Univ
State Key Lab Novel Software Technol Dept Comp Sci & Technol Nanjing 210023 Jiangsu Peoples R China SUNY Stony Brook
Wireless Networking & Syst Lab Dept Elect & Comp Engn Stony Brook NY 11794 USA
Sharing a service among multiple users could bring benefit to users by reducing their service price and also benefit service providers by allowing them to make more profit. Shared services usually have a capacity limi...
详细信息
Sharing a service among multiple users could bring benefit to users by reducing their service price and also benefit service providers by allowing them to make more profit. Shared services usually have a capacity limit. To construct a win-win situation between users and providers through service sharing, it is necessary to reasonably organize users with similar service requests into groups under the limits of group sizes. This paper explores methods to enable user grouping for sharing services with the limit on the group size. Based on user request descriptions and evaluation, a connection relation is built to present which two users could be in a group. Semi-groups can be derived from the connection relation and two grouping schemes satisfying the group size limit are further determined through proposed algorithms to meet different service expectations. Finally, a case study and a simulation are given to demonstrate the effectiveness of the proposed methods in grouping users to provide higher service benefits to both users and providers.
Directed graph is able to model asymmetric relationships between nodes and research on directed graph embedding is of great significance in downstream graph analysis and inference. Learning source and target embedding...
详细信息
Named Entity Recognition (NER) aims to identify named entities mentioned in unstructured text and classify them into predefined named entity classes. Although models using word fusion have achieved relatively high per...
详细信息
This paper proposes a point cloud registration method for substations based on an improved SAC-IA algorithm. This method optimizes the SAC-IA algorithm by filtering the randomly selected point pairs to ensure that the...
This paper proposes a point cloud registration method for substations based on an improved SAC-IA algorithm. This method optimizes the SAC-IA algorithm by filtering the randomly selected point pairs to ensure that the triangles formed by the selected points in the model and scene point clouds have certain similarities. Furthermore, the registration error judgment of the SAC-IA algorithm has been improved. In addition to using the Euclidean distance between the registered model and scene point clouds as the judgment standard, this method also considers the SHOT difference and average curvature difference. Successful registration is only considered when all three standards are satisfied. The experimental research shows that the time performance of this method is twice as high as that of the traditional SAC-IA algorithm on average, and the recognition accuracy is improved in the recognition results.
With the rapid development of document digitization, people have become accustomed to capturing and processing documents using electronic devices such as smartphones. However, the captured document images often suffer...
With the rapid development of document digitization, people have become accustomed to capturing and processing documents using electronic devices such as smartphones. However, the captured document images often suffer from issues like shadows and noise due to environmental factors, which can affect their readability. To improve the quality of captured document images, researchers have proposed a series of models or frameworks and applied them in distinct scenarios such as image enhancement, and document information extraction. In this paper, we primarily focus on shadow removal methods and open-source datasets. We concentrate on recent advancements in this area, first organizing and analyzing nine available datasets. Then, the methods are categorized into conventional methods and neural network-based methods. Conventional methods use manually designed features and include shadow map-based approaches and illumination-based approaches. Neural network-based methods automatically generate features from data and are divided into single-stage approaches and multi-stage approaches. We detail representative algorithms and briefly describe some typical techniques. Finally, we analyze and discuss experimental results, identifying the limitations of datasets and methods. Future research directions are discussed, and nine suggestions for shadow removal from document images are proposed. To our knowledge, this is the first survey of shadow removal methods and related datasets from document images.
As one of the underlying technologies of the blockchain,the consensus algorithm plays a vital role in ensuring security and *** a consensus algorithm for the private blockchain,Raft has better performance than the res...
详细信息
As one of the underlying technologies of the blockchain,the consensus algorithm plays a vital role in ensuring security and *** a consensus algorithm for the private blockchain,Raft has better performance than the rest of the consensus algorithms,and it does not cause problems such as the concentrated hashing power,resource waste and ***,Raft can only be used in a non-byzantine environment with a small network *** order to enable Raft to be used in a large-scale network with a certain number of byzantine nodes,this paper combines Raft and credit model to propose a Raft blockchain consensus algorithm based on credit model *** the node credit evaluation phase,RBF-based support vector machine is used as the anomaly detection method,and the node credit evaluation model is *** the Trust Nodes List(TNL)mechanism is introduced to make the consensus phase in a creditable network ***,the common node is synchronized to the consensus node to update the blockchain of the entire *** show that CRaft has better throughput and lower latency than the commonly used consortium blockchain consensus algorithm PBFT(Practical Byzantine Fault Tolerance).
Cross-domain recommendation methods aim to solve the problems of data sparsity and cold start by leveraging rich information from the source domain to enhance the recommendation accuracy of the target domain. Many met...
详细信息
Sign language generation (SLG) is meaningful in facilitating the communication between deaf and healthy people. Recently, transformer-based diffusion models have been achieved success in human motion generation. Howev...
详细信息
With the continuous development of deep learning, the use of deep learning methods for intelligent violent behavior recognition has become an active research field in computer vision. However, there are relatively few...
详细信息
With the advent of the era of bigdata, how to process massive image, video and other multimedia data timely and accurately has become a new challenge in related fields. Aiming at the computational bottleneck and inef...
详细信息
暂无评论