Spectral clustering and DBSCAN are two famous clustering methods, the former reduces data dimensionality by spectrum of similarity matrix, and then utilizes kmeans to cluster data in low dimensional space. While DBSCA...
详细信息
Spelling check is an important preprocessing task when dealing with user generated texts such as tweets and product comments. Compared with some western languages such as English, Chinese spelling check is more comple...
详细信息
This paper proposes a simple yet effective framework of soft cross-lingual syntax projection to transfer syntactic structures from source language to target language using monolingual treebanks and large-scale bilingu...
详细信息
ISBN:
(纸本)9781941643266
This paper proposes a simple yet effective framework of soft cross-lingual syntax projection to transfer syntactic structures from source language to target language using monolingual treebanks and large-scale bilingual parallel text. Here, soft means that we only project reliable dependencies to compose high-quality target structures. The projected instances are then used as additional training data to improve the performance of supervised parsers. The major issues for this idea are 1) errors from the source-language parser and unsupervised word aligner;2) intrinsic syntactic non-isomorphism between languages;3) incomplete parse trees after projection. To handle the first two issues, we propose to use a probabilistic dependency parser trained on the target-language treebank, and prune out unlikely projected dependencies that have low marginal probabilities. To make use of the incomplete projected syntactic structures, we adopt a new learning technique based on ambiguous labelings. For a word that has no head words after projection, we enrich the projected structure with all other words as its candidate heads as long as the newly-added dependency does not cross any projected dependencies. In this way, the syntactic structure of a sentence becomes a parse forest (ambiguous labels) instead of a single parse tree. During training, the objective is to maximize the mixed likelihood of manually labeled instances and projected instances with ambiguous labelings. Experimental results on benchmark data show that our method significantly outperforms a strong baseline supervised parser and previous syntax projection methods.
Faced with the general trend of centralization of information, the biggest challenge to enterprise is how to ensure that all fixed computers and different mobile devices anywhere can access securely and quickly enterp...
详细信息
The accurate and automatic segmentation of retinal vessels fromfundus images is critical for the early diagnosis and prevention ofmany eye diseases,such as diabetic retinopathy(DR).Existing retinal vessel segmentation...
详细信息
The accurate and automatic segmentation of retinal vessels fromfundus images is critical for the early diagnosis and prevention ofmany eye diseases,such as diabetic retinopathy(DR).Existing retinal vessel segmentation approaches based on convolutional neural networks(CNNs)have achieved remarkable ***,we extend a retinal vessel segmentation model with low complexity and high performance based on U-Net,which is one of the most popular *** view of the excellent work of depth-wise separable convolution,we introduce it to replace the standard convolutional *** complexity of the proposed model is reduced by decreasing the number of parameters and calculations required for *** ensure performance while lowering redundant parameters,we integrate the pre-trained MobileNet V2 into the ***,a feature fusion residual module(FFRM)is designed to facilitate complementary strengths by enhancing the effective fusion between adjacent levels,which alleviates extraneous clutter introduced by direct ***,we provide detailed comparisons between the proposed SepFE and U-Net in three retinal image mainstream datasets(DRIVE,STARE,and CHASEDB1).The results show that the number of SepFE parameters is only 3%of U-Net,the Flops are only 8%of U-Net,and better segmentation performance is *** superiority of SepFE is further demonstrated through comparisons with other advanced methods.
IoT devices have been widely used with the advent of *** devices contain a large amount of private data during *** is primely important for ensuring their ***,we proposed a lightweight block cipher based on dynamic S-...
详细信息
IoT devices have been widely used with the advent of *** devices contain a large amount of private data during *** is primely important for ensuring their ***,we proposed a lightweight block cipher based on dynamic S-box named *** is introduced for devices with limited hardware resources and high throughput *** is a 128-bit block cipher supporting 64-bit key,which is based on a new generalized Feistel variant *** retains the consistency and significantly boosts the diffusion of the traditional Feistel *** SubColumns of round function is implemented by combining bit-slice technology with *** S-box is dynamically associated with the *** has been demonstrated that DBST has a good avalanche effect,low hardware area,and high *** S-box has been proven to have fewer differential features than RECTANGLE *** security analysis of DBST reveals that it can against impossible differential attack,differential attack,linear attack,and other types of attacks.
Hoare logic is a logic used as a way of specifying semantics of programming languages, which has been extended to be a separation logic to reason about mutable heap structure. In a model M of Hoare logic, each program...
详细信息
Hoare logic is a logic used as a way of specifying semantics of programming languages, which has been extended to be a separation logic to reason about mutable heap structure. In a model M of Hoare logic, each program α induces an M-computable function fα M on the universe of M; and the M-recursive functions are defined on M. It will be proved that the class of all the M-computable functions fα M induced by programs is equal to the class of all the M- recursive functions. Moreover, each M-recursive function is ∑ 1 NM -definable in M, where the universal quantifier is a num- ber quantifier ranging over the standard part of a nonstandard model M.
With the rapid development of medical informatization and the popularization of digital imaging equipment,DICOM images contain the personal privacy of patients,and there are security risks in the process of storage an...
详细信息
With the rapid development of medical informatization and the popularization of digital imaging equipment,DICOM images contain the personal privacy of patients,and there are security risks in the process of storage and transmission,so it needs to be *** order to solve the security problem of medical images on mobile devices,a safe and efficient medical image encryption algorithm called ALCencryption is *** algorithm first analyzes the medical image and distinguishes the color image from the gray *** gray images,the improved Arnold map is used to scramble them according to the optimal number of iterations,and then the diffusion is realized by the Logistic and Chebyshev map cross-diffusion *** color image is encrypted by cross-diffusion algorithm of double chaotic *** and efficiency analysis show that the ALCencryption algorithm has the characteristics of small neighboring pixels,large key space,strong key sensitivity,high safety and short encryption *** is suitable for medical image encryption of mobile devices with high real-time requirements.
Mobile edge computing has shown its potential in serving emerging latency-sensitive mobile applications in ultra-dense 5G networks via offloading computation workloads from the remote cloud data center to the nearby n...
详细信息
Mobile edge computing has shown its potential in serving emerging latency-sensitive mobile applications in ultra-dense 5G networks via offloading computation workloads from the remote cloud data center to the nearby network ***,current computation offloading studies in the heterogeneous edge environment face multifaceted challenges:Dependencies among computational tasks,resource competition among multiple users,and diverse long-term *** applications typically consist of several functionalities,and one huge category of the applications can be viewed as a series of sequential *** this study,we first proposed a novel multiuser computation offloading framework for long-term sequential ***,we presented a comprehensive analysis of the task offloading process in the framework and formally defined the multiuser sequential task offloading ***,we decoupled the long-term offloading problem into multiple single time slot offloading problems and proposed a novel adaptive method to solve *** further showed the substantial performance advantage of our proposed method on the basis of extensive experiments.
To improve the measuring accuracy of intrusion detection, a system design of a node for intrusion detection is proposed in this paper. First, the technology that applies the traditional intrusion detection method, suc...
详细信息
暂无评论