Medical image segmentation plays a crucial role in computer-aided diagnosis. However, existing methods heavily rely on fully supervised training, which requires a large amount of labeled data with time-consuming pixel...
详细信息
Existing work on unsupervised time series anomaly detection relies on clean training datasets (free of anomalies), which is often violated in practice. In this work, we propose an unsupervised time series anomaly dete...
Existing work on unsupervised time series anomaly detection relies on clean training datasets (free of anomalies), which is often violated in practice. In this work, we propose an unsupervised time series anomaly detection method based on adversarial interpolation and pseudo-anomaly calibration for training an anomaly detector under data con-tamination. Specifically, the normality description learned from the model is improved by using the following two proposed calibration methods: (1) by enforcing adversarial interpolation to learn an effective normality description from the typical samples rather than the edge or abnormal samples, and (2) by discriminating the original samples from the simulated pseudo-anomaly samples to learn the exact normality description boundary. These two calibration ways result in the normality description that prevents data contamination. Experimental results compared with baselines on public time series datasets demonstrate the effectiveness of our proposed method.
Mode-locked fiber lasers based on nonlinear polarization evolution can generate femtosecond pulses with different pulse widths and rich spectral distributions for versatile applications through polarization ***,a prec...
详细信息
Mode-locked fiber lasers based on nonlinear polarization evolution can generate femtosecond pulses with different pulse widths and rich spectral distributions for versatile applications through polarization ***,a precise and repeatable location of a specific pulsation regime is extremely ***,by using fast spectral analysis based on a time-stretched dispersion Fourier transform as the spectral discrimination criterion,along with an intelligent polarization search algorithm,for the first time,we achieved real-time control of the spectral width and shape of mode-locked femtosecond pulses;the spectral width can be tuned from 10 to 40 nm with a resolution of ~1.47 nm,and the spectral shape can be programmed to be hyperbolic secant or ***,we reveal the complex,repeatable transition dynamics of the spectrum broadening of femtosecond pulses,including five middle phases,which provides deep insight into ultrashort pulse formation that cannot be observed with traditional mode-locked lasers.
This paper proposes an automatic Chinese text categorization method for solving the emergency event report classification problem. Since bidirectional encoder representations from transformers (BERT) has achieved grea...
详细信息
Prior studies have demonstrated the effectiveness of Deep Learning (DL) in automated software vulnerability detection. Graph Neural Networks (GNNs) have proven effective in learning the graph representations of source...
详细信息
To optimize the term hierarchy in the manual e-government thesaurus, we combine the mainstream knowledge organization technology to form a complete set of ontology automation construction scheme. We build an e-governm...
详细信息
To optimize the term hierarchy in the manual e-government thesaurus, we combine the mainstream knowledge organization technology to form a complete set of ontology automation construction scheme. We build an e-government knowledge base by using subject words in the Comprehensive E-government Thesaurus as the term set and encyclopedia text as the corpus. The specific work includes the extraction of semantic features from the bag-of-words model, determination of the number of clusters by linear and nonlinear dimensionality reduction, division of terms by spectral clustering, social network analysis to determine the class label, and storing knowledge ontology via OWL. The recall rate of term hierarchy in the ontology is excellent, indicating the ontology has good knowledge extensibility, and also proving the efficiency of the scheme proposed in this work. Besides, the application model of a term hierarchy in information retrieval can show a richer semantic relation than the original thesaurus to guide the retrieval extension of government information resources. 83rd Annual Meeting of the Association for Information Science & Technology October 25-29, 2020. Author(s) retain copyright, but ASIS&T receives an exclusive publication license.
Dear editor,With the rapid development of digital currencies and blockchain technologies, an increasing number of countries are planning to launch or have already launched their own central bank-issued digital currenc...
详细信息
Dear editor,With the rapid development of digital currencies and blockchain technologies, an increasing number of countries are planning to launch or have already launched their own central bank-issued digital currency (CBDC). In addition to drawing on advanced technologies such as blockchain, the ideal CBDC should also reconcile the functional con-
Machine learning algorithms are at the forefront of the development of advanced information systems. The rapid progress in machine learning technology has enabled cutting-edge large language models (LLMs), represented...
详细信息
In data management systems, query processing on GPUs or distributed clusters have proven to be an effective method for high efficiency. However, the high PCIe data transfer overhead between CPUs and GPUs, and the comm...
详细信息
In this paper, a new integrated scheme is proposed to accurately predict breast cancer, help doctors make early diagnosis and treatment plans, and improve the prognosis of patients. We selects five mainstream machine ...
详细信息
暂无评论