It has been recognized that the data generated by the denoising diffusion probabilistic model (DDPM) improves adversarial training. After two years of rapid development in diffusion models, a question naturally arises...
详细信息
With the rapid development of Web3 D technologies, sketch-based model retrieval has become an increasingly important challenge, while the application of Virtual Reality and 3 D technologies has made shape retrieval of...
详细信息
With the rapid development of Web3 D technologies, sketch-based model retrieval has become an increasingly important challenge, while the application of Virtual Reality and 3 D technologies has made shape retrieval of furniture over a web browser feasible. In this paper, we propose a learning framework for shape retrieval based on two Siamese VGG-16 Convolutional Neural Networks(CNNs), and a CNN-based hybrid learning algorithm to select the best view for a shape. In this algorithm, the AlexNet and VGG-16 CNN architectures are used to perform classification tasks and to extract features, respectively. In addition, a feature fusion method is used to measure the similarity relation of the output features from the two Siamese networks. The proposed framework can provide new alternatives for furniture retrieval in the Web3 D environment. The primary innovation is in the employment of deep learning methods to solve the challenge of obtaining the best view of 3 D furniture,and to address cross-domain feature learning problems. We conduct an experiment to verify the feasibility of the framework and the results show our approach to be superior in comparison to many mainstream state-of-the-art approaches.
The broad learning system (BLS) has been attracting more and more attention due to its excellent property in the field of machine learning. A great deal of variants and hybrid structures of BLS have also been designed...
详细信息
Visual Question Answering (VQA) models fail catastrophically on questions related to the reading of text-carrying images. However, TextVQA aims to answer questions by understanding the scene texts in an image-question...
详细信息
Graph contrastive learning (GCL) has emerged as a state-of-the-art strategy for learning representations of diverse graphs including social and biomedical networks. GCL widely uses stochastic graph topology augmentati...
详细信息
While semi-supervised learning (SSL) has yielded promising results, the more realistic SSL scenario remains to be explored, in which the unlabeled data exhibits extremely high recognition difficulty, e.g., fine-graine...
详细信息
In higher education,the initial studying period of each course plays a crucial role for students,and seriously influences the subsequent learning ***,given the large size of a course’s students at universities,it has...
详细信息
In higher education,the initial studying period of each course plays a crucial role for students,and seriously influences the subsequent learning ***,given the large size of a course’s students at universities,it has become impossible for teachers to keep track of the performance of individual *** this circumstance,an academic early warning system is desirable,which automatically detects students with difficulties in learning(i.e.,at-risk students)prior to a course ***,previous studies are not well suited to this purpose for two reasons:1)they have mainly concentrated on e-learning platforms,e.g.,massive open online courses(MOOCs),and relied on the data about students’online activities,which is hardly accessed in traditional teaching scenarios;and 2)they have only made performance prediction when a course is in progress or even close to the *** this paper,for traditional classroom-teaching scenarios,we investigate the task of pre-course student performance prediction,which refers to detecting at-risk students for each course before its *** better represent a student sample and utilize the correlations among courses,we cast the problem as a multi-instance multi-label(MIML)***,given the problem of data scarcity,we propose a novel multi-task learning method,i.e.,MIML-Circle,to predict the performance of students from different specialties in a unified *** experiments are conducted on five real-world datasets,and the results demonstrate the superiority of our approach over the state-of-the-art methods.
In the industrial environment, machines often need to reflect the anomaly detection results to the total control center in time, and the general industrial network can not achieve high real-time. In order to solve suc...
In the industrial environment, machines often need to reflect the anomaly detection results to the total control center in time, and the general industrial network can not achieve high real-time. In order to solve such challenges, a set of protocol standards developed by IEEE802.1 working group, namely Time-sensitive Networking (TSN), has been introduced into industrial networks. TSN can provide high real-time and reliability for data transmission, where the reliability is achieved by Frame duplication and Frame Elimination (FRER). In the realization process of FRER, it is necessary to determine the source node, destination node, and multiple disjoint paths to transmit redundant data. However, the transmission of these redundant traffic may result in the delay of other flows, and then affects the user experience. Therefore, it is very important to choose excellent redundant traffic paths to ensure reliability and reduce the impact on other flows. In the existing research, there are many dynamic scheduling and routing heuristics to determine the path, but they do not consider the influence of the location of the source node on the whole route scheduling. This paper proposes an improved dynamic scheduling and routing heuristic method, which takes the source node into account in the routing selection. In the flow test experiments of different magnitudes, it is found that the total delay of all flows is reduced by 1.4%-4.5% under the same magnitude of schedulability compared with Ant Colony Optimization.
Reconstructing photo-realistic and topology-aware animatable human avatars from monocular videos remains challenging in computer vision and graphics. Recently, methods using 3D Gaussians to represent the human body ha...
详细信息
Deep neural networks are vulnerable to attacks on adversarial samples. These attacks are caused by adding small magnitude perturbations to the input samples, which may lead to misclassification of the deep neural netw...
详细信息
暂无评论