Polarimetric synthetic aperture radar (PolSAR) image classification has important application value and a wide range of application scenarios in many fields. Supervised classification methods, which need to use a larg...
详细信息
The most commonly used PI/PID controller is used in industry. Almost all feedback loops in the industry use a P, PI, or PID controller (later PID will be used to refer to all subset controllers). The investigation is ...
详细信息
With the increasing use of unmanned aerial vehicles (UAVs) in a variety of applications, their safety has become a critical concern. UAVs face numerous emergencies during missions, in these situations, the UAVs need t...
详细信息
Medical image segmentation is a crucial task within the realm of medical image processing. Nevertheless, the intrinsic characteristics of medical images and the limited availability of data constrain the model's g...
详细信息
Timeliness is one of the important indicators of data quality. In industrial production processes, a large amount of dependent data is generated, often resulting in unclear timestamps. Therefore, this article combines...
详细信息
In the process of network evolution, interactions be-tween network nodes often extend beyond simple binary interactions to include group interactions. Examples include social networks like those found on Facebook and ...
详细信息
ISBN:
(数字)9798350377613
ISBN:
(纸本)9798350377620
In the process of network evolution, interactions be-tween network nodes often extend beyond simple binary interactions to include group interactions. Examples include social networks like those found on Facebook and research collaboration networks formed through scientific partnerships. Link prediction in research collaboration networks aims to forecast collaborative relationships among scientists, thereby enhancing our understanding and opti-mizing the structure and dynamics of these networks. However, net-work data are frequently sparse, and prediction based solely on at-tributes or structural features often yields inconsistent results. In complex networks, higher-order structures often contain more comprehensive information. Capturing the cycle structure in the graph enriches the representation of nodes as well as reduces the infor-mation loss during the information transfer process, thus improving the accuracy of link prediction between nodes. Specifically, our approach utilizes the cycle to calculate its significance and reconstructs ‘fat node’ information, which replaces node representations within the original cycle. We introduce a cycle scale module to de-termine the optimal cycle size for the graph. Moreover, by constructing the clustering coefficients of the multivariate cycle, we identify node and cluster aggregations within the graph, thereby reduce the complexity of finding cycle scales. Subsequently, a graph compari-son learning model is employed to establish a mapping between the newly generated ‘fat nodes’ and link relationships. Through experi-mental validation, our method demonstrates strong link prediction performance across various real network datasets.
Narrative visualization transforms data into engaging stories, making complex information accessible to a broad audience. Foundation models, with their advanced capabilities such as natural language processing, conten...
详细信息
Machine reading comprehension has been a research focus in natural language processing and intelligence ***,there is a lack of models and datasets for the MRC tasks in the anti-terrorism ***,current research lacks the...
详细信息
Machine reading comprehension has been a research focus in natural language processing and intelligence ***,there is a lack of models and datasets for the MRC tasks in the anti-terrorism ***,current research lacks the ability to embed accurate background knowledge and provide precise *** address these two problems,this paper first builds a text corpus and testbed that focuses on the anti-terrorism domain in a semi-automatic ***,it proposes a knowledge-based machine reading comprehension model that fuses domain-related triples from a large-scale encyclopedic knowledge base to enhance the semantics of the *** eliminate knowledge noise that could lead to semantic deviation,this paper uses a mixed mutual ttention mechanism among questions,passages,and knowledge triples to select the most relevant triples before embedding their semantics into the *** results indicate that the proposed approach can achieve a 70.70%EM value and an 87.91%F1 score,with a 4.23%and 3.35%improvement over existing methods,respectively.
We study the universal real-time relaxation behaviors of a long-range Kitaev chain following a quench, and the results are compared to a short-range quantum XY chain. Our research includes both noncritical and critica...
详细信息
We study the universal real-time relaxation behaviors of a long-range Kitaev chain following a quench, and the results are compared to a short-range quantum XY chain. Our research includes both noncritical and critical quenches. In the case of noncritical quench, i.e., neither the initial state nor the postquench Hamiltonian is at a critical point of the equilibrium phase transition, a quench to the commensurate phase or incommensurate phase gives a scaling of t−3/2 or t−1/2, respectively, which is the same as the counterpart of the short-range quantum XY model. However, for a quench to the boundary line between the commensurate and incommensurate phases, the scaling law t−μ may be different from the t−3/4 law of the counterpart of the short-range quantum XY model. More interestingly, the decaying exponent μ may depend on the choice of the parameters of the postquench Hamiltonian because of the different asymptotic behaviors of the energy spectrum. Furthermore, in certain cases, the scaling behavior may be outside the range of predictions made by the stationary phase approximation, because an inflection point emerges in the energy spectrum. For the critical quench, i.e., the initial state or the postquench Hamiltonian is at a critical point of equilibrium phase transition, the aforementioned scaling law t−μ may be changed because of the gap-closing property of the energy spectrum of the critical point.
The security threat of backdoor attacks is a central concern for deep neural networks (DNNs). Recently, without poisoned data, unlearning models with clean data and then learning a pruning mask have contributed to bac...
暂无评论