This paper introduces an advanced road damage detection algorithm that effectively addresses the shortcomings of existing models, including limited detection performance and large parameter sizes, by utilizing the YOL...
详细信息
The Traveling Salesman Problem (TSP) seeks the shortest closed tour that visits each city once and returns to the starting city. This problem is NP-hard, so it is not easy to solve using conventional methods. The grey...
详细信息
Diabetes retinopathy (DR) is one of the complications of diabetes. Early diagnosis of retinopathy is helpful to avoid vision loss or blindness. The difficulty of this task lies in the significant differences in the si...
详细信息
In the electronic manufacturing industry, accurate detection of PCB defects is crucial as it directly impacts product quality and reliability. The primary challenges in PCB defect detection include missed detections a...
详细信息
We present a novel attention-based mechanism to learn enhanced point features for point cloud processing tasks, e.g., classification and segmentation. Unlike prior studies, which were trained to optimize the weights o...
详细信息
We present a novel attention-based mechanism to learn enhanced point features for point cloud processing tasks, e.g., classification and segmentation. Unlike prior studies, which were trained to optimize the weights of a pre-selected set of attention points, our approach learns to locate the best attention points to maximize the performance of a specific task, e.g., point cloud classification. Importantly, we advocate the use of single attention point to facilitate semantic understanding in point feature learning. Specifically,we formulate a new and simple convolution, which combines convolutional features from an input point and its corresponding learned attention point(LAP). Our attention mechanism can be easily incorporated into state-of-the-art point cloud classification and segmentation networks. Extensive experiments on common benchmarks, such as Model Net40, Shape Net Part, and S3DIS, all demonstrate that our LAP-enabled networks consistently outperform the respective original networks, as well as other competitive alternatives, which employ multiple attention points, either pre-selected or learned under our LAP framework.
Hypernym detection and discovery are fundamental tasks in natural language *** former task aims to identify all possible hypernyms of a given hyponym term,whereas the latter attempts to determine whether the given two...
详细信息
Hypernym detection and discovery are fundamental tasks in natural language *** former task aims to identify all possible hypernyms of a given hyponym term,whereas the latter attempts to determine whether the given two terms hold a hypernymy relation or *** research on hypernym detection and discovery tasks projects a term into various semantic spaces with single mapping *** their success,these methods may not be adequate in capturing complex semantic relevance between hyponym/hypernymy pairs in two ***,they may fall short in modeling the hierarchical structure in the hypernymy relations,which may help them learn better term ***,the polysemy phenomenon that hypernyms may express distinct senses is *** this paper,we propose a Multi-Projection Recurrent model(MPR)to simultaneously capture the hierarchical relationships between terms and deal with diverse senses caused by the polysemy ***,we build a multi-projection mapping block to deal with the polysemy phenomenon,which learns various word senses by multiple ***,we adopt a hierarchy-aware recurrent block with the recurrent operation followed by a multi-hop aggregation module to capture the hierarchical structure of hypernym *** on 11 benchmark datasets in various task settings illustrate that our multi-projection recurrent model outperforms the *** experimental analysis and case study demonstrate that our multi-projection module and the recurrent structure are effective for hypernym detection and discovery tasks.
With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of *** study presents a new approach to the encryption and compression of color *** is predicat...
详细信息
With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of *** study presents a new approach to the encryption and compression of color *** is predicated on 2D compressed sensing(CS)and the hyperchaotic ***,an optimized Arnold scrambling algorithm is applied to the initial color images to ensure strong ***,the processed images are con-currently encrypted and compressed using 2D *** them,chaotic sequences replace traditional random measurement matrices to increase the system’s ***,the processed images are re-encrypted using a combination of permutation and diffusion *** addition,the 2D projected gradient with an embedding decryption(2DPG-ED)algorithm is used to reconstruct *** with the traditional reconstruction algorithm,the 2DPG-ED algorithm can improve security and reduce computational ***,it has better *** experimental outcome and the performance analysis indicate that this algorithm can withstand malicious attacks and prove the method is effective.
PROBLEM Recent years have witnessed the rapid progress of self-supervised language models (LMs)[1],especially large language models (LLMs)[2].LLMs not only achieved state-of-the-art performance on many natural languag...
PROBLEM Recent years have witnessed the rapid progress of self-supervised language models (LMs)[1],especially large language models (LLMs)[2].LLMs not only achieved state-of-the-art performance on many natural language processing tasks,but also captured widespread attention from the public due to their great potential in a variety of real-world applications (***,search engines,writing assistants,etc.)through providing general-purpose intelligent services.A few of the LLMs are becoming foundation models,an analogy to infrastructure,that empower hundreds of downstream applications.
In order to dynamically create a sequence of textual descriptions for images, image description models often make use of the attention mechanism, which involves an automatic focus on different regions within an image....
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
暂无评论