This research aims to develop a new approach to increase the safety and reliability of Autonomous Vehicle (AV) through the proposed risk assessment framework, supported by the trust evaluation approach derived from a ...
详细信息
To meet the challenge of camouflaged object detection (COD),which has a high degree of intrinsic similarity between the object and background,this paper proposes a double-branch fusion network(DBFN)with a parallel...
详细信息
To meet the challenge of camouflaged object detection (COD),which has a high degree of intrinsic similarity between the object and background,this paper proposes a double-branch fusion network(DBFN)with a parallel attention selection mechanism (PASM).In detail,a schismatic receptive field block(SRF)combined with an attention mechanism for low-level information is performed to learn texture features in one branch,and an integration of the SRF,a hybrid attention mechanism (HAM),and a depth feature polymerization module (DFPM)is employed for high-level information to extract detection features in the other ***,both texture features and detection features are input into the PASM to acquire selective expression ***,the final result is obtained after further selective matrix optimization with atrous spatial pyramid pooling (ASPP)and a residual channel attention block (RCAB)being applied *** results on three public datasets verify that our method outperforms the state-of-the-art methods in terms of four evaluation metrics,i.e.,mean absolute error (MAE),weighted F βmeasure (Fβω),structural measure (Sα),and E-measure (Eφ)
Modern recommendation systems are widely used in modern data *** random and sparse embedding lookup operations are the main performance bottleneck for processing recommendation systems on traditional platforms as they...
详细信息
Modern recommendation systems are widely used in modern data *** random and sparse embedding lookup operations are the main performance bottleneck for processing recommendation systems on traditional platforms as they induce abundant data movements between computing units and ***-based processing-in-memory(PIM)can resolve this problem by processing embedding vectors where they are ***,the embedding table can easily exceed the capacity limit of a monolithic ReRAM-based PIM chip,which induces off-chip accesses that may offset the PIM ***,we deploy the decomposed model on-chip and leverage the high computing efficiency of ReRAM to compensate for the decompression performance *** this paper,we propose ARCHER,a ReRAM-based PIM architecture that implements fully yon-chip recommendations under resource ***,we make a full analysis of the computation pattern and access pattern on the decomposed *** on the computation pattern,we unify the operations of each layer of the decomposed model in multiply-and-accumulate *** on the access observation,we propose a hierarchical mapping schema and a specialized hardware design to maximize resource *** the unified computation and mapping strategy,we can coordinatethe inter-processing elements *** evaluation shows that ARCHER outperforms the state-of-the-art GPU-based DLRM system,the state-of-the-art near-memory processing recommendation system RecNMP,and the ReRAM-based recommendation accelerator REREC by 15.79×,2.21×,and 1.21× in terms of performance and 56.06×,6.45×,and 1.71× in terms of energy savings,respectively.
The article investigates the issue of fixed-time control with adaptive output feedback for a twin-roll inclined casting system (TRICS) with disturbance. First, by using the mean value theorem, the nonaffine functions ...
详细信息
Encryption of a plaintext involves a secret key. The secret key of classical cryptosystems can be successfully determined by utilizing metaheuristic techniques. Monoalphabetic cryptosystem is one of the famous classic...
详细信息
The optimization of electric vehicle (EV) utilization and efficiency is becoming increasingly essential in the ever-changing landscape of sustainable transportation. Consulting user manuals, online resources, and seek...
详细信息
In the new era of automation, Robotic Process Automation (RPA) has emerged as a powerful suite of tools for automating mundane, repetitive, rule-based, and structured tasks using software bots without disrupting exist...
详细信息
A large amount of data can partly assure good fitting quality for the trained neural *** the quantity of experimental or on-site monitoring data is commonly insufficient and the quality is difficult to control in engi...
详细信息
A large amount of data can partly assure good fitting quality for the trained neural *** the quantity of experimental or on-site monitoring data is commonly insufficient and the quality is difficult to control in engineering practice,numerical simulations can provide a large amount of controlled high quality *** the neural networks are trained by such data,they can be used for predicting the properties/responses of the engineering objects instantly,saving the further computing efforts of simulation ***,a strategy for efficiently transferring the input and output data used and obtained in numerical simulations to neural networks is desirable for engineers and *** this work,we proposed a simple image representation strategy of numerical simulations,where the input and output data are all represented by *** temporal and spatial information is kept and the data are greatly *** addition,the results are readable for not only computers but also human *** examples are given,indicating the effectiveness of the proposed strategy.
Forecasting bankruptcy within corporate finances is an indispensable endeavor crucial for sustaining business growth and fostering stability. The paper presents a methodology to redefine the conventional approach to b...
详细信息
This study explores the adaptability of a segmentation model, originally trained on pre-operative MRI data, in post-operative recurrent brain tumor segmentation. We utilized the Attention U-Net model for this study. I...
详细信息
暂无评论