With the continuous development of machine vision,intelligent detection of bottom spray glue has gradually become a *** this paper,we proposed an algorithm of detection the glue spray on bottom of vehicle based on mac...
详细信息
ISBN:
(纸本)9781510871076
With the continuous development of machine vision,intelligent detection of bottom spray glue has gradually become a *** this paper,we proposed an algorithm of detection the glue spray on bottom of vehicle based on machine *** sampling and detecting the spray interest area,the algorithm can obtain its features which were used for intelligent identification of the spray interest area,and then carry out the pseudo target and detect whether the detection area is complete or *** can test the vehicles on pipeline in real *** the average,each frame's processing time is less than 150 *** there is an unqualified area,it will alarm and inform the operators of the wrong *** algorithm can improve the quality of the vehicle and save human resources and identify the spray interest area with high *** research directions in the future is to accelerate the speed to meet the practical application requirements,and to solve the intelligent identification of the spray interest area which has the same color with the vehicle body.
As one of the most popular GNN architectures, the graph attention networks (GAT) is considered the most advanced learning architecture for graph representation and has been widely used in various graph mining tasks wi...
详细信息
Nodes performing different functions in a network have different roles, and these roles can be gleaned from the structure of the network. Learning latent representations for the roles of nodes helps to understand the ...
详细信息
Nodes performing different functions in a network have different roles, and these roles can be gleaned from the structure of the network. Learning latent representations for the roles of nodes helps to understand the network and to transfer knowledge across networks. However, most existing structural embedding approaches suffer from high computation and space cost or rely on heuristic feature engineering. Here we propose RiWalk, a flexible paradigm for learning structural node representations as it decouples the structural embedding problem into a role identification procedure and a network embedding procedure. Through role identification, rooted kernels with structural dependencies kept are built to better integrate network embedding methods. To demonstrate the effectiveness of RiWalk, we develop two different role identification methods named RiWalk-SP and RiWalk-WL respectively and employ random walk based network embedding methods. Experiments on within-network classification tasks show that our proposed algorithms achieve comparable performance with other baselines while being an order of magnitude more efficient. Besides, we also conduct across-network role classification tasks. The results show potential of structural embeddings in transfer learning. RiWalk is also scalable, making it capable of capturing structural roles in massive networks.
Most contemporary database systems query optimizers exploit System-R's bottom-up dynamic programming method (DP) to find the optimal query execution plan (QEP) without evaluating redundant subplans. The distinguis...
详细信息
Merkle tree has been widely applied in the field of P2 P *** this paper,an efficient authentication scheme is proposed in the integrity check module for vehicle live video streaming system by optimizing the constructi...
详细信息
ISBN:
(纸本)9781510871076
Merkle tree has been widely applied in the field of P2 P *** this paper,an efficient authentication scheme is proposed in the integrity check module for vehicle live video streaming system by optimizing the construction and verification of the Merkle *** can create and check nodes at the same time in a shorter time without trusted *** the same time,in order to prevent the oversensitivity of hash algorithm,this paper uses the perceptual hash algorithm to generate the hash value of nodes in the Merkle *** performance evaluation and analysis,our algorithm can build a Merkle tree with 2 N-1 nodes only after the N+log2 N times hash *** has better time performance than the traditional tree,whether receiving attacks or *** it is proved that the scheme is secure under the condition that the vehicle live video streaming system is safe.
XML documents cluster analysis is a hot research topic. Researchers proposed a number of methods to cluster XML document collections. Boosting is successful well-known methods for improving the quality of clustering. ...
详细信息
Hidden Naive Bayes (HNB) has demonstrated remarkable progress in classification accuracy, accurate class probability estimation and ranking. Since HNB is based on one-dependence estimators to get the approximate value...
详细信息
We propose an algorithm for learning hierarchical user interest models according to the Web pages users have browsed. In this algorithm, the interests of a user are represented into a tree which is called a user inter...
详细信息
We propose an algorithm for learning hierarchical user interest models according to the Web pages users have browsed. In this algorithm, the interests of a user are represented into a tree which is called a user interest tree, the content and the structure of which can change simultaneously to adapt to the changes in a user's interests. This expression represents a user's specific and general interests as a continuurn. In some sense, specific interests correspond to shortterm interests, while general interests correspond to longterm interests. So this representation more really reflects the users' interests. The algorithm can automatically model a us er's multiple interest domains, dynamically generate the in terest models and prune a user interest tree when the number of the nodes in it exceeds given value. Finally, we show the experiment results in a Chinese Web Site.
Transformer-based models are dominating the field of natural language processing and are becoming increasingly popular in the field of computer vision. However, the black box characteristics of transformers seriously ...
详细信息
The minimum weakly connected dominating set problem is a typical NP-hard problem with a wide range of applications. To solve this problem, we propose a frequency property and two-hop configuration checking strategy-dr...
详细信息
暂无评论