The WSN uses wireless communication to realize its information transmission. WSN is a network data system composed of a large number of wireless data collectors with sensing functions. In the WSN-based sensing functio...
详细信息
Semi-supervised graph domain adaptation, as a branch of graph transfer learning, aims to annotate unlabeled target graph nodes by utilizing transferable knowledge learned from a label-scarce source graph. However, mos...
ISBN:
(纸本)9798331314385
Semi-supervised graph domain adaptation, as a branch of graph transfer learning, aims to annotate unlabeled target graph nodes by utilizing transferable knowledge learned from a label-scarce source graph. However, most existing studies primarily concentrate on aligning feature distributions directly to extract domain-invariant features, while ignoring the utilization of the intrinsic structure information in graphs. Inspired by the significance of data structure information in enhancing models' generalization performance, this paper aims to investigate how to leverage the structure information to assist graph transfer learning. To this end, we propose an innovative framework called TFGDA. Specially, TFGDA employs a structure alignment strategy named STSA to encode graphs' topological structure information into the latent space, greatly facilitating the learning of transferable features. To achieve a stable alignment of feature distributions, we also introduce a SDA strategy to mitigate domain discrepancy on the sphere. Moreover, to address the overfitting issue caused by label scarcity, a simple but effective RNC strategy is devised to guide the discriminative clustering of unlabeled nodes. Experiments on various benchmarks demonstrate the superiority of TFGDA over SOTA methods.
Distributed measurement of underground rock and soil deformation is an important part of geological hazard monitoring. Using parallel helical transmission lines as sensors and combining frequency domain reflection (FD...
详细信息
Euphemism identification deciphers the true meaning of euphemisms, such as linking "weed" (euphemism) to "marijuana" (target keyword) in illicit texts, aiding content moderation and combating under...
作者:
Feiyu WangJian-tao ZhouCollege of Computer Science
Inner Mongolia University Hohhot Inner Mongolia China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software
Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Engineering Research Center of Ecological Big Data Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian China
Cloud storage services have been used by most businesses and individual users. However, data loss, service interruptions and cyber attacks often lead to cloud storage services not being provided properly, and these in...
Cloud storage services have been used by most businesses and individual users. However, data loss, service interruptions and cyber attacks often lead to cloud storage services not being provided properly, and these incidents have caused financial losses to users. Second, traditional and single-cloud model disaster recovery services are no longer suitable for the current complex cloud storage systems. Therefore, a scheme to provide disaster recovery for cloud storage services in a multi-cloud storage environment is needed in real production. In this paper, we propose a disaster recovery scheme based on blockchain technology. The proposed scheme outlined in this study aims to address the issue of data availability within the cloud storage landscape. The proposed scheme achieves this goal by dividing data into hot and cold categories, verifying the integrity of copy data via blockchain technology, and utilizing blockchain networks to manage multi-cloud storage systems. Experimental findings demonstrate that the proposed scheme yields superior results in terms of computation and time overheads.
With the use of a large number of digital devices in smart grid, how to protect the security of communication in Advanced Metering Infrastructure (AMI) has become a difficult problem. AMI plays an important role in sm...
详细信息
Generative models have attracted considerable attention for speech separation tasks, and among these, diffusion-based methods are being explored. Despite the notable success of diffusion techniques in generation tasks...
详细信息
In order to provide a better interior visual experience for visitors in ancient buildings, insufficient illumination and non-uniformity need to be solved urgently. DIALux software is used to simulate an ancient buildi...
详细信息
ISBN:
(数字)9781728158556
ISBN:
(纸本)9781728158563
In order to provide a better interior visual experience for visitors in ancient buildings, insufficient illumination and non-uniformity need to be solved urgently. DIALux software is used to simulate an ancient building to find out its problems, like non-uniformity and north-east corner illumination lack. By the use of controlling variable method, six different cases were proposed to optimize the lighting environment. The results show that case 3 and case 4 are chosen as the best cases to solve the defects. It is verified that the overall environment has better illumination and uniformity.
A new transient chaotic neuron model which introduces Legendre function into the self-feedback term is constructed. The dynamic characteristics of the single neuron are analyzed by the time evolution graph and the inv...
详细信息
Federated Graph Learning (FGL) has garnered widespread attention by enabling collaborative training on multiple clients for semi-supervised classification tasks. However, most existing FGL studies do not well consider...
详细信息
暂无评论