Interpretable visual recognition is essential for decision-making in high-stakes situations. Recent advancements have automated the construction of interpretable models by leveraging Visual Language Models (VLMs) and ...
详细信息
State-of-the-art recommender systems are increasingly focused on optimizing implementation efficiency, such as enabling on-device recommendations under memory constraints. Current methods commonly use lightweight embe...
详细信息
State-of-the-art recommender systems are increasingly focused on optimizing implementation efficiency, such as enabling on-device recommendations under memory constraints. Current methods commonly use lightweight embeddings for users and items or employ compact embeddings to enhance reusability and reduce memory usage. However, these approaches consider only the coarse-grained aspects of embeddings, overlooking subtle semantic nuances. This limitation results in an adversarial degradation of meta-embedding performance, impeding the system's ability to capture intricate relationships between users and items, leading to suboptimal recommendations. To address this, we propose a novel approach to efficiently learn meta-embeddings with varying grained and apply fine-grained meta-embeddings to strengthen the representation of their coarse-grained counterparts. Specifically, we introduce a recommender system based on a graph neural network, where each user and item is represented as a node. These nodes are directly connected to coarse-grained virtual nodes and indirectly linked to fine-grained virtual nodes, facilitating learning of multi-grained semantics. Fine-grained semantics are captured through sparse meta-embeddings, which dynamically balance embedding uniqueness and memory constraints. To ensure their sparseness, we rely on initialization methods such as sparse principal component analysis combined with a soft thresholding activation function. Moreover, we propose a weight-bridging update strategy that aligns coarse-grained meta-embedding with several fine-grained meta-embeddings based on the underlying semantic properties of users and items. Comprehensive experiments demonstrate that our method outperforms existing baselines. The code of our proposal is available at https://***/htyjers/C2F-MetaEmbed.
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE service...
详细信息
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the *** IoE-based cloud computing services are located at remote locations without the control of the data *** data owners mostly depend on the untrusted Cloud Service Provider(CSP)and do not know the implemented security *** lack of knowledge about security capabilities and control over data raises several security *** Acid(DNA)computing is a biological concept that can improve the security of IoE big *** IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol(StS KAP)and Feistel cipher *** paper proposed a DNA-based cryptographic scheme and access control model(DNACDS)to solve IoE big data security and access *** experimental results illustrated that DNACDS performs better than other DNA-based security *** theoretical security analysis of the DNACDS shows better resistance capabilities.
This paper aimed to propose two algorithms,DA-M and RF-M,of reducing the impact of multipath interference(MPI)on intensity modulation direct detection(IM-DD)systems,particularly for four-level pulse amplitude modulati...
详细信息
This paper aimed to propose two algorithms,DA-M and RF-M,of reducing the impact of multipath interference(MPI)on intensity modulation direct detection(IM-DD)systems,particularly for four-level pulse amplitude modulation(PAM4)***-M reduced the fluctuation by averaging the signal in blocks,RF-M estimated MPI by subtracting the decision value of the corresponding block from the mean value of a signal block,and then generated interference-reduced samples by subtracting the interference signal from the product of the corresponding MPI estimate and then weighting *** paper firstly proposed to separate the signal before decision-making into multiple blocks,which significantly reduced the complexity of DA-M and *** results showed that the MPI noise of 28 GBaud IMDD system under the linewidths of 1e5 Hz,1e6 Hz and 10e6 Hz can be effectively alleviated.
Global illumination(GI)plays a crucial role in rendering realistic results for virtual exhibitions,such as virtual car *** scenarios usually include all-frequency bidirectional reflectance distribution functions(BRDFs...
详细信息
Global illumination(GI)plays a crucial role in rendering realistic results for virtual exhibitions,such as virtual car *** scenarios usually include all-frequency bidirectional reflectance distribution functions(BRDFs),although their geometries and light configurations may be *** allfrequency BRDFs in real time remains challenging due to the complex light *** approaches,including precomputed radiance transfer,light probes,and the most recent path-tracing-based approaches(ReSTIR PT),cannot satisfy both quality and performance requirements ***,we propose a practical hybrid global illumination approach that combines ray tracing and cached GI by caching the incoming radiance with *** approach can produce results close to those of ofline renderers at the cost of only approximately 17 ms at runtime and is robust over all-frequency *** approach is designed for applications involving static lighting and geometries,such as virtual exhibitions.
Because the aerospace-ground Internet no longer relies on deploying infrastructure such as base stations,it has the advantage of all-weather full coverage services that traditional terrestrial networks do not ***,the ...
详细信息
Because the aerospace-ground Internet no longer relies on deploying infrastructure such as base stations,it has the advantage of all-weather full coverage services that traditional terrestrial networks do not ***,the traditional global navigation satellite system does not support communication *** newly developing aerospace network system is still in the construction stage,and there is no applicable solution *** communication technology is an important method to solve the contradiction between the low battery capacity of the Internet of things(IoT)node and the high energy consumption of *** is the development trend of the ***,the current passive technology based on Wi-Fi and other signals cannot achieve arbitrary communication due to the excitation signal acquisition *** solve the above two major problems,this paper proposes a passive system design for aerospace-ground IoT *** system can use the global navigation signal as excitation signal for backscatter *** the global navigation signal has the characteristics of all-weather and full coverage,this design solves the carrier acquisition problem in previous *** addition,this paper also proposes a low-power signal detection technology that can detect navigation signals with high precision on passive *** evaluate system performance through simulation *** experimental results show that the backscatter system based on global navigation satellite signals can realize efficient communication of IoT nodes.
Predicting RNA binding protein(RBP) binding sites on circular RNAs(circ RNAs) is a fundamental step to understand their interaction mechanism. Numerous computational methods are developed to solve this problem, but th...
详细信息
Predicting RNA binding protein(RBP) binding sites on circular RNAs(circ RNAs) is a fundamental step to understand their interaction mechanism. Numerous computational methods are developed to solve this problem, but they cannot fully learn the features. Therefore, we propose circ-CNNED, a convolutional neural network(CNN)-based encoding and decoding framework. We first adopt two encoding methods to obtain two original matrices. We preprocess them using CNN before fusion. To capture the feature dependencies, we utilize temporal convolutional network(TCN) and CNN to construct encoding and decoding blocks, respectively. Then we introduce global expectation pooling to learn latent information and enhance the robustness of circ-CNNED. We perform circ-CNNED across 37 datasets to evaluate its effect. The comparison and ablation experiments demonstrate that our method is superior. In addition, motif enrichment analysis on four datasets helps us to explore the reason for performance improvement of circ-CNNED.
6G Satellite-Terrestrial Integrated Network (STIN) extends connectivity services globally, attracting an increasing number of users to access the Internet with its advantages of wide coverage, high speed, and large ca...
详细信息
6G Satellite-Terrestrial Integrated Network (STIN) extends connectivity services globally, attracting an increasing number of users to access the Internet with its advantages of wide coverage, high speed, and large capacity. However, the complex communication environments, such as link exposure and high dynamics of satellites in the network, pose challenges to designing authentication schemes that are applicable to 6G STIN. Although researchers have proposed many authentication schemes for 6G STIN, most of them have only focused on access authentication, which cannot guarantee the stability of subsequent communications. A few schemes have considered providing seamless services through handover authentication, but they still face issues such as security vulnerabilities and high energy consumption. To tackle these issues, this paper proposes an energy efficient authentication scheme for 6G STIN, capable of achieving mutual authentication between entities and negotiating a secure session key. Additionally, it designs a handover mechanism that is more suitable for 6G STIN and supports handover authentication for multiple users. Through security analysis, our scheme is proven to withstand various attacks, and its security is further verified using the ProVerif tool. Performance analysis shows that our scheme has lower authentication latency and communication overhead, while reducing energy consumption and ensuring security. IEEE
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received c...
详细信息
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received considerable attention in transmitting data and ensuring data confidentiality among cloud servers and users. Various traditional image retrieval techniques regarding security have developed in recent years but they do not apply to large-scale environments. This paper introduces a new approach called Triple network-based adaptive grey wolf (TN-AGW) to address these challenges. The TN-AGW framework combines the adaptability of the Grey Wolf Optimization (GWO) algorithm with the resilience of Triple Network (TN) to enhance image retrieval in cloud servers while maintaining robust security measures. By using adaptive mechanisms, TN-AGW dynamically adjusts its parameters to improve the efficiency of image retrieval processes, reducing latency and utilization of resources. However, the image retrieval process is efficiently performed by a triple network and the parameters employed in the network are optimized by Adaptive Grey Wolf (AGW) optimization. Imputation of missing values, Min–Max normalization, and Z-score standardization processes are used to preprocess the images. The image extraction process is undertaken by a modified convolutional neural network (MCNN) approach. Moreover, input images are taken from datasets such as the Landsat 8 dataset and the Moderate Resolution Imaging Spectroradiometer (MODIS) dataset is employed for image retrieval. Further, the performance such as accuracy, precision, recall, specificity, F1-score, and false alarm rate (FAR) is evaluated, the value of accuracy reaches 98.1%, the precision of 97.2%, recall of 96.1%, and specificity of 917.2% respectively. Also, the convergence speed is enhanced in this TN-AGW approach. Therefore, the proposed TN-AGW approach achieves greater efficiency in image retrieving than other existing
Background With the development of the Internet,the topology optimization of wireless sensor networks has received increasing ***,traditional optimization methods often overlook the energy imbalance caused by node loa...
详细信息
Background With the development of the Internet,the topology optimization of wireless sensor networks has received increasing ***,traditional optimization methods often overlook the energy imbalance caused by node loads,which affects network *** To improve the overall performance and efficiency of wireless sensor networks,a new method for optimizing the wireless sensor network topology based on K-means clustering and firefly algorithms is *** K-means clustering algorithm partitions nodes by minimizing the within-cluster variance,while the firefly algorithm is an optimization algorithm based on swarm intelligence that simulates the flashing interaction between fireflies to guide the search *** proposed method first introduces the K-means clustering algorithm to cluster nodes and then introduces a firefly algorithm to dynamically adjust the *** The results showed that the average clustering accuracies in the Wine and Iris data sets were 86.59%and 94.55%,respectively,demonstrating good clustering *** calculating the node mortality rate and network load balancing standard deviation,the proposed algorithm showed dead nodes at approximately 50 iterations,with an average load balancing standard deviation of 1.7×10^(4),proving its contribution to extending the network *** This demonstrates the superiority of the proposed algorithm in significantly improving the energy efficiency and load balancing of wireless sensor networks to extend the network *** research results indicate that wireless sensor networks have theoretical and practical significance in fields such as monitoring,healthcare,and agriculture.
暂无评论