It is well known that the inverse design of terahertz (THz) multi-resonant graphene metasurfaces by using traditional deep neural networks (DNNs) has limited generalization ability. In this paper, we propose improved ...
详细信息
The critical node detection for sequential attacks based on cascading failure model is an important way for analyzing network vulnerability, which has attracted the attention of many researchers in the field of comple...
详细信息
Three-way decision is the representative of trisecting-acting-outcome(TAO) model. Considering the temporality, in dynamic information systems, the objects may be inserted or deleted,attributes may be added or removed,...
详细信息
In this paper, we first generalize the polycyclic codes over finite fields to polycyclic codes over the mixed alphabet $$\mathbb {Z}_2\mathbb {Z}_4$$ , and we show that these codes can be identified as $$\mathbb {Z}_4...
In this paper, we first generalize the polycyclic codes over finite fields to polycyclic codes over the mixed alphabet $$\mathbb {Z}_2\mathbb {Z}_4$$ , and we show that these codes can be identified as $$\mathbb {Z}_4[x]$$ -submodules of $$\mathcal {R}_{\alpha ,\beta }$$ with $$\mathcal {R}_{\alpha ,\beta }=\mathbb {Z}_2[x]/\langle t_1(x)\rangle \times \mathbb {Z}_4[x]/\langle t_2(x)\rangle $$ , where $$t_1(x)$$ and $$t_2(x)$$ are monic polynomials over $$\mathbb {Z}_2$$ and $$\mathbb {Z}_4$$ , respectively. Then we provide the generator polynomials and minimal generating sets for this family of codes based on the strong Gröbner basis. In particular, under the proper defined inner product, we study the dual of $$\mathbb {Z}_2\mathbb {Z}_4$$ -additive polycyclic codes. Finally, we focus on the characterization of the $$\mathbb {Z}_2\mathbb {Z}_4$$ -MDSS and MDSR codes, and as examples, we also present some (almost) optimal binary codes derived from the $$\mathbb {Z}_2\mathbb {Z}_4$$ -additive polycyclic codes.
Aiming at the problem that reprojection error (RE) cannot reflect the camera calibration accuracy intuitively, this paper proposes a method to verify the camera calibration results in world coordinate system. Firstly,...
Aiming at the problem that reprojection error (RE) cannot reflect the camera calibration accuracy intuitively, this paper proposes a method to verify the camera calibration results in world coordinate system. Firstly, the checkerboard calibration target is photographed with the camera under test, and the internal parameters and distortion parameters of the camera are calculated by using the pinhole model and the Kannala-Brandt (KB) fisheye model, respectively. Then, the same camera is used to shoot two targets in the field of view (FOV), and the pixel coordinates of the two target points are detected from the image. Thirdly, the inverse projection model is used to calculate the distance between the two objects and the angle between the camera and the two objects, and the real distance and angle are compared. The experimental results show that the average distance errors of the pinhole model and the KB fisheye model are 0.34% and 0.35%, respectively, and the angle errors are 0.40% and 0.12%, respectively, which proves that the verification method can effectively characterize the calibration accuracy of the camera.
Many RGBT tracking researches primarily focus on modal fusion design, while overlooking the effective handling of target appearance changes. While some approaches have introduced historical frames or fuse and replace ...
详细信息
Recently, uniform linear array (ULA) fitting (UF) principle is proposed for sparse array (SA) design using pseudo-polynomial equations. Typically, it is verified that the designed SAs via UF enjoy a lower bound on uni...
详细信息
This paper presents a novel compact rectifier array with both broadband and wide input power range characteristics. The rectifier array consists of two rectifier units operating at low-power and high-power levels, res...
详细信息
Lncosh function has been used for constructing a cost function for devising an adaptive filter algorithm to provide a desired performance under non-Gaussian noise, naming as least Lncosh algorithm (LLA). However, its ...
详细信息
Social media is the platform for most people to share their opinions, emojis are also widely used to express moods, emotions, and feelings on social media. There have been many researched on emojis and sentiment analy...
详细信息
ISBN:
(纸本)9781665456579
Social media is the platform for most people to share their opinions, emojis are also widely used to express moods, emotions, and feelings on social media. There have been many researched on emojis and sentiment analysis. However, existing methods mainly face two limitations. First, since deep learning relies on large amounts of labeled data, the training samples of emoji are not enough to achieve the training effect. Second, they consider the sentiment of emojis and texts separately, not fully exploring the impact of emojis on the sentiment polarity of texts. In this paper, we propose a joint learning sentiment analysis method incorporating emoji-augmentation, and the method has two advantages compared with the existing work. First, We optimize the easy data augmentation method so that the newly generated sentences can also preserve the semantic information of emojis, which relieves the problem of insufficient training data with emojis. Second, it fuses emojis and text features to allow the model to better learn the mutual emotional semantics between text and emojis, jointly training emojis and words to obtain the sentence representations containing more semantic information of both emojis and text. Our experimental results show that the proposed method can significantly improve the performance compared with several baselines on two datasets.
暂无评论