In this paper, we investigate the problem that asks if there exists a net of a polycube that is exactly a rectangle with slits. For this nontrivial question, we show affirmative solutions. First, we show some concrete...
作者:
Liu, Tianyu
State Key Lab on Intelligence Technology and Systems Department of Computer Science and Technology Tsinghua University Beijing China
Image classification has lead to the revolution of artificial intelligence in the past five years. However, image classification algorithms are significantly affected by the inherent variance in sensory input and nois...
详细信息
The voltage island style has been widely accepted as an effective way to design low power high performance chips. This paper proposes an automated voltage island generation flow in standard cell based designs. Two imp...
详细信息
Dear editor,Selective sharing of encrypted documents with other users makes the cloud storage system more flexible and effective [1]. For safety reasons, data owners use different keys to encrypt different documents. ...
详细信息
Dear editor,Selective sharing of encrypted documents with other users makes the cloud storage system more flexible and effective [1]. For safety reasons, data owners use different keys to encrypt different documents. However, data owners need to distribute all keys to the query users for data sharing. Similarly,
In the information retrieval scenario, query augmentation is an essential technique to refine semantically imprecise queries to align more closely with users' actual information needs. Traditional methods typicall...
详细信息
Bag-of-words (BOW) is now the most popular way to model text in machine learning based sentiment classification. However, the performance of such approach sometimes remains rather limited due to some fundamental defic...
详细信息
This paper describes a new approach on optimization of constraint satisfaction problems (CSPs) by means of substituting sub-CSPs with locally consistent regular membership constraints. The purpose of this approach is ...
详细信息
Nowadays,there is tremendous growth in biometric authentication and cybersecurity ***,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private ***,designing a...
详细信息
Nowadays,there is tremendous growth in biometric authentication and cybersecurity ***,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private ***,designing and implementing robust security algorithms for users’biometrics is still a hot research area to be *** work presents a powerful biometric security system(BSS)to protect different biometric modalities such as faces,iris,and *** proposed BSSmodel is based on hybridizing auto-encoder(AE)network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and ensures their *** employed AE network is unsupervised deep learning(DL)structure used in the proposed BSS model to extract main biometric *** obtained features are utilized to generate two random chaos *** first random chaos matrix is used to permute the pixels of biometric *** contrast,the second random matrix is used to further cipher and confuse the resulting permuted biometric pixels using a two-dimensional(2D)chaotic logisticmap(CLM)*** assess the efficiency of the proposed BSS,(1)different standardized color and grayscale images of the examined fingerprint,faces,and iris biometrics were used(2)comprehensive security and recognition evaluation metrics were *** assessment results have proven the authentication and robustness superiority of the proposed BSSmodel compared to other existing *** example,the proposed BSS succeeds in getting a high area under the receiver operating characteristic(AROC)value that reached 99.97%and low rates of 0.00137,0.00148,and 3516 CMC,2023,vol.74,no.20.00157 for equal error rate(EER),false reject rate(FRR),and a false accept rate(FAR),respectively.
Crowdsourcing has been a helpful mechanism to leverage human intelligence to acquire useful ***,when we aggregate the crowd knowledge based on the currently developed voting algorithms,it often results in common knowl...
详细信息
Crowdsourcing has been a helpful mechanism to leverage human intelligence to acquire useful ***,when we aggregate the crowd knowledge based on the currently developed voting algorithms,it often results in common knowledge that may not be *** this paper,we consider the problem of collecting specific knowledge via *** the help of using external knowledge base such as WordNet,we incorporate the semantic relations between the alternative answers into a probabilisticmodel to determine which answer is more *** formulate the probabilistic model considering both worker’s ability and task’s difficulty from the basic assumption,and solve it by the expectation-maximization(EM)*** increase algorithm compatibility,we also refine our method into semi-supervised *** results show that our approach is robust with hyper-parameters and achieves better improvement thanmajority voting and other algorithms when more specific answers are expected,especially for sparse data.
Modelling and understanding dialogues in a conversation depends on identifying the user intent from the given text. Unknown or new intent detection is a critical task, as in a realistic scenario a user intent may freq...
详细信息
暂无评论