Weakly-supervised online hashing has garnered significant attention recently, yet several challenges remain unresolved, such as how to effectively denoise tags, and how to efficiently learn hash functions in dynamic o...
详细信息
To address the increased complexity of surface cover, increased heterogeneity within homogeneous regions, and increased similarity between different regions in high-resolution remote sensing images, which lead to incr...
详细信息
Court View Generation (CVG) plays a vital role in the realm of legal artificial intelligence, which aims to support judges in crafting legal judgment documents. The court view consists of three essential judgment part...
详细信息
With no infrastructure, the battlefield environment has characteristics such as device heterogeneity, uneven resource distribution, and dynamic node movement. Additionally, the sensing tasks produced by devices are co...
详细信息
This paper first made a comprehensive dietary nutrition evaluation of the two recipes provided, and conducted a visual analysis of the differences of various nutrient components by querying the "Table of Chinese ...
详细信息
ISBN:
(纸本)9798331519032
This paper first made a comprehensive dietary nutrition evaluation of the two recipes provided, and conducted a visual analysis of the differences of various nutrient components by querying the "Table of Chinese Food Ingredients". The nutrients involved included major daily productivity nutrients such as protein and fat, and non-productivity nutrients such as calcium, iron and zinc, which were used as collaborative evaluation indicators. Secondly, in order to specifically evaluate the daily diet of two male and female students, we pointed out the problems in the diet according to the Basic requirements for Analysis, Evaluation and Optimal Design of Dietary Recipes, and then adjusted and improved them, and made a comprehensive dietary nutrition evaluation again. Finally, the diet after adjustment has been improved to basically meet the nutritional requirements. Then, two models are established. Firstly, a model based on linear programming algorithm is established to solve the problem, and a model based on simulated annealing algorithm is established as a backup scheme and innovative ideas. Then, we used Model 1 to optimize male and female college birthday meal recipes with different goals (most economical, highest AAS, and dual goals). Finally, we also compare these three kinds of daily diet recipes with different objective optimization, and get the conclusion that the daily diet recipes with dual objective optimization have the highest cost performance. Finally, in order to realize the optimal design of weekly balanced diet, the paper extends the optimization model of daily diet based on problem 2. In order to solve the problem that the extended optimization model is difficult to solve due to too many decision variables, we propose a random elimination strategy to solve the weekly recipe scheme step by step according to the time granularity. After the design of daily recipes for each day is completed, the food of the day is eliminated from the daily recipes of the n
To authenticate tags against counterfeiting, RF fin-gerprinting technique is widely exploited. However, the status of tagged item is always changed by movement, rotation and other operations. When the item's locat...
详细信息
Commit classification for maintenance activities is of critical importance for both industry and academia. State-of-the-art approaches either treat code changes as plain text or rely on manually identified features. D...
详细信息
Predicting drug-disease relationships is crucial in the biomedical field, but traditional laboratory experiments are time-consuming and costly, often lacking predictive accuracy and efficiency. This paper presents the...
详细信息
Fog computing utilizes devices in the edge network to transmit data with very low latency and supports high mobility. However, fog computing inherits security and privacy problems from cloud computing. Therefore, vari...
详细信息
Fog computing utilizes devices in the edge network to transmit data with very low latency and supports high mobility. However, fog computing inherits security and privacy problems from cloud computing. Therefore, various privacy schemes for fog computing have been proposed to prevent different types of attacks. Recently, Weng et al proposed a fog computing authentication scheme;after analyzing, we found that Weng et al's scheme cannot resist user tracking attack and user impersonation attack. Then, we propose an improved scheme through adding a password, modifying the calculation method of Ei, and adding timestamps. In addition, we also compare the improved scheme with existing authentication schemes in terms of security and computational efficiency. The results show that the improved scheme is more secure and has less computation.
In recent years,various adversarial defense methods have been proposed to improve the robustness of deep neural *** training is one of the most potent methods to defend against adversarial ***,the difference in the fe...
详细信息
In recent years,various adversarial defense methods have been proposed to improve the robustness of deep neural *** training is one of the most potent methods to defend against adversarial ***,the difference in the feature space between natural and adversarial examples hinders the accuracy and robustness of the model in adversarial *** paper proposes a learnable distribution adversarial training method,aiming to construct the same distribution for training data utilizing the Gaussian mixture *** distribution centroid is built to classify samples and constrain the distribution of the sample *** natural and adversarial examples are pushed to the same distribution centroid to improve the accuracy and robustness of the *** proposed method generates adversarial examples to close the distribution gap between the natural and adversarial examples through an attack algorithm explicitly designed for adversarial *** algorithm gradually increases the accuracy and robustness of the model by scaling ***,the proposed method outputs the predicted labels and the distance between the sample and the distribution *** distribution characteristics of the samples can be utilized to detect adversarial cases that can potentially evade the model *** effectiveness of the proposed method is demonstrated through comprehensive experiments.
暂无评论