Despite the great success achieved, existing video moment retrieval (VMR) methods are developed under the assumption that data are centralizedly stored. However, in real-world applications, due to the inherent nature ...
详细信息
Inspired by Naor et al.’s visual secret sharing (VSS) scheme, a novel n out of n quantum visual secret sharing (QVSS) scheme is proposed, which consists of two phases: sharing process and recovering process. In the f...
详细信息
In Re-identification (ReID), recent advancements yield noteworthy progress in both unimodal and cross-modal retrieval tasks. However, the challenge persists in developing a unified framework that could effectively han...
详细信息
Many researchers have studied optimization methods for ridesharing. However, the individual interests of passengers and drivers are not considered enough. So we propose a two-sided stable matching method according to ...
详细信息
ISBN:
(纸本)9781665456579
Many researchers have studied optimization methods for ridesharing. However, the individual interests of passengers and drivers are not considered enough. So we propose a two-sided stable matching method according to the actual preferences of passengers(requesters) and drivers(workers). We also design a pruning algorithm based on Euclidean distance to speed up the matching process. Experiments based on real data show that our method can perform well.
System logs are critical to system health diagnosis, especially for big data distributed systems. To detect anomalies in logs, log analysis has become a popular and practical approach. However, with the increasing com...
System logs are critical to system health diagnosis, especially for big data distributed systems. To detect anomalies in logs, log analysis has become a popular and practical approach. However, with the increasing complexity of system logs in real-world systems, more noisy data are generated. The noise disturbs the regular detection procedure and decreases the detection quality. Hence, it is more difficult to improve detection performance under such uncertain circumstance. To tackle this challenge, we propose SKDLog, a novel and effective log anomaly detection method equipped with self-knowledge distillation. This approach leverages the knowledge from soft labels and refined feature maps through knowledge distillation. Moreover, it helps the detection model better acquire latent information. To better exploit feature maps, an auxiliary self-teacher branch is incorporated into the framework. After the integration, the model achieves performance gain in log anomaly detection. To demonstrate the effectiveness, we compare SKDLog with the state-of-the-art log-based anomaly detection approaches on HDFS and Hadoop Application datasets. Our model outperforms other approaches on both recall and F1-score. Furthermore, we challenge problem solving by performing experiments on an industry dataset and an unstable dataset. The experimental results show that SKDLog more accurately detects abnormal logs from noisy data with high recall and F1-score.
In the field of single object tracking, conventional methods often rely on correlation filters or visual image processing. However, these approaches typically focus solely on extracting target object features and cons...
In the field of single object tracking, conventional methods often rely on correlation filters or visual image processing. However, these approaches typically focus solely on extracting target object features and consider only the position information in the current frame. They lack integration of contextual and spatial-temporal information, which can limit tracking *** method takes inspiration from single object detection and tracking techniques. It combines efficient model-based object detection with the spatial position of the final target in the image. This approach offers significant advantages in reducing tracking drift (deviation from the target object) and improving tracking accuracy (predicting bounding boxes that closely follow the target).To extract spatial information, we utilize a three-layer ResNet and Convolutional Block Attention Module (CBAM) in conjunction with a siamese network. This combination effectively captures the spatial characteristics of the target object. Additionally, we employ an adaptive processing head with an internal structure of Long Short Term Memory (LSTM) to capture temporal information. By integrating spatial and temporal cues, our method achieves more robust and accurate *** comprehensive comparison and ablation experiments across multiple datasets, we have demonstrated notable improvements with our method. It tightly connects the predicted bounding box with the tracking target and effectively combines spatial and temporal information for precise object tracking.
In modern digital environments, users frequently express opinions on contentious topics, providing a wealth of information on prevailing attitudes. The systematic analysis of these opinions offers valuable insights fo...
详细信息
Augmented Internet of vehicle (IoV) network, providing natural infrastructure support for autonomous vehicle road cooperation (VRC), has been deemed as one of key enablers for autonomous VRC while simultaneously facin...
详细信息
With the Internet of Things (IoT) fostering seamless device-to-human and device-to-device interactions, the domain of intelligent lighting systems have evolved beyond simple occupancy and daylight sensing towards auto...
详细信息
With the breakthroughs in Deep Learning, recent years have witnessed a massive surge in Artificial Intelligence applications and services. Meanwhile, the rapid advances in Mobile Computing and Internet of Things has a...
详细信息
暂无评论