With the reform of English examination in China in recent years, the automatic evaluation of English essays as subjective questions has always been the focus and difficulty of research. The existing automatic essay ev...
详细信息
Research on software quality has a very important strategic and practical significance to improve software quality, and promote the healthy and orderly development of software industry. This paper study and realize th...
详细信息
Research on software quality has a very important strategic and practical significance to improve software quality, and promote the healthy and orderly development of software industry. This paper study and realize the visualization of software quality, combined the change and complexity of program, based on existing research.
Bessenrodt and Ono initially found the strict log-subadditivity of partition function p(n), that is, p(a + b) 1 and a + b > 9. Many other important statistics of partitions are proved to enjoy similar properties. L...
With broad applications in various public services like aviation management and urban disaster warning, numerical precipitation prediction plays a crucial role in weather forecast. However, constrained by the limitati...
详细信息
Support vector machine (SVM) is good at classifying high dimensional data. Parameter setting in the SVM training procedure, along with the feature selection, significantly influences the classification accuracy. An im...
详细信息
ISBN:
(纸本)9781450353489
Support vector machine (SVM) is good at classifying high dimensional data. Parameter setting in the SVM training procedure, along with the feature selection, significantly influences the classification accuracy. An improved algorithm based on particle swarm optimization (PSO) for feature selection and parameters optimization of SVM (GPSO-SVM) is proposed to improve the classification accuracy and select the number of features as little as possible. This method introduces crossover and mutation operator from genetic algorithm (GA), which allows the particle to carry out crossover and mutation operations after iteration and update to avoid the problem of falling into local optimum and premature maturation in
Singing voice detection (SVD), to recognize vocal parts in the song, is an essential task in music information retrieval (MIR). The task remains challenging since singing voice varies and intertwines with the accompan...
详细信息
Roadmap methods were widely used in route planning fields, both for robots and unmanned aircrafts. Traditional roadmap is constituted by connecting the vertexes of convex obstacle, which is related to the locations of...
详细信息
Roadmap methods were widely used in route planning fields, both for robots and unmanned aircrafts. Traditional roadmap is constituted by connecting the vertexes of convex obstacle, which is related to the locations of start and goal of route, so the roadmap can not be reused when anyone of start and goal changed. Absence of reusability reduces the efficiency of route planning by using roadmap. A new roadmap constitution method was proposed in this paper, which is build on dividing the 2D configuration space into multi-scale grids and setting nodes of roadmap on grid boundary using Level-Set method, same method was used to construct the map cells of roadmap between any two nodes lays on same grid. The roadmap constituted with new method can be reused when the start or goal was changed; it is efficient for replanning problem.
Attention module has achieved great success in numerous vision tasks. However, existing visual attention modules generally consider the features of a single-scale, and cannot make full use of their multi-scale context...
详细信息
ISBN:
(纸本)9781728188089;9781728188096
Attention module has achieved great success in numerous vision tasks. However, existing visual attention modules generally consider the features of a single-scale, and cannot make full use of their multi-scale contextual information. Meanwhile, the multi-scale spatial feature representation has demonstrated its outstanding performance in a wide range of applications. However, the multi-scale features are always represented in a layer-wise manner, i.e. it is impossible to know their contextual information at a granular level. Focusing on the above issue, a context-aware residual module for image classification is proposed in this paper. It consists of a novel multi-scale channel attention module MSCAM to learn refined channel weights by considering the visual features of its own scale and its surrounding fields, and a multi-scale spatial aware module MSSAM to further capture more spatial information. Either or both of the two modules can be plugged into any CNN-based backbone image classification architecture with a short residual connection to obtain the context-aware enhanced features. The experiments on public image recognition datasets including CIFAR10, CIFAR100, Tiny-ImageNet and ImageNet consistently demonstrate that our proposed modules significantly outperforms a wide-used state-of-the-art methods, e.g., ResNet and the lightweight networks of MobileNet and SqueezeeNet.
Research on software quality has a very important strategic and practical significance to improve software quality,and promote the healthy and orderly development of software *** paper study and realize the visualizat...
详细信息
Research on software quality has a very important strategic and practical significance to improve software quality,and promote the healthy and orderly development of software *** paper study and realize the visualization of software quality,combined the change and complexity of program,based on existing research.
Group signature is a cryptography primitive that has been widely researched. It strikes a balance between digital signature and the user's demand for anonymity. A valid member in the group can generate a signature...
详细信息
ISBN:
(数字)9781728175348
ISBN:
(纸本)9781728175355
Group signature is a cryptography primitive that has been widely researched. It strikes a balance between digital signature and the user's demand for anonymity. A valid member in the group can generate a signature on behalf of the whole group. The public can only know that it was provided by a valid group member and learn nothing about the actual identity of the signer when verifying a group signature. Backes et al pointed out that the existing dynamic group signature schemes implicitly assume that the membership of everyone in the group is open to the public. Thus, they put forward a property called membership privacy for dynamic group signature. In this paper, we design a dynamic group signature scheme with membership privacy on top of Signature Proofs of Knowledge (SPK) and BBS+ signature. Further more, dynamic accumulator mechanism is adopted to revoke a group member's authority to sign. Then, a security analysis demonstrates that the proposed group signature scheme satisfies join-leave privacy. Finally, quantitative analysis and experimental results show that the proposed group signature scheme achieves the fewer signature size and less computation overhead compared with Backes's scheme.
暂无评论