State-of-the-art recommender systems are increasingly focused on optimizing implementation efficiency, such as enabling on-device recommendations under memory constraints. Current methods commonly use lightweight embe...
详细信息
State-of-the-art recommender systems are increasingly focused on optimizing implementation efficiency, such as enabling on-device recommendations under memory constraints. Current methods commonly use lightweight embeddings for users and items or employ compact embeddings to enhance reusability and reduce memory usage. However, these approaches consider only the coarse-grained aspects of embeddings, overlooking subtle semantic nuances. This limitation results in an adversarial degradation of meta-embedding performance, impeding the system's ability to capture intricate relationships between users and items, leading to suboptimal recommendations. To address this, we propose a novel approach to efficiently learn meta-embeddings with varying grained and apply fine-grained meta-embeddings to strengthen the representation of their coarse-grained counterparts. Specifically, we introduce a recommender system based on a graph neural network, where each user and item is represented as a node. These nodes are directly connected to coarse-grained virtual nodes and indirectly linked to fine-grained virtual nodes, facilitating learning of multi-grained semantics. Fine-grained semantics are captured through sparse meta-embeddings, which dynamically balance embedding uniqueness and memory constraints. To ensure their sparseness, we rely on initialization methods such as sparse principal component analysis combined with a soft thresholding activation function. Moreover, we propose a weight-bridging update strategy that aligns coarse-grained meta-embedding with several fine-grained meta-embeddings based on the underlying semantic properties of users and items. Comprehensive experiments demonstrate that our method outperforms existing baselines. The code of our proposal is available at https://***/htyjers/C2F-MetaEmbed.
End-to-end text spotting is a vital computer vision task that aims to integrate scene text detection and recognition into a unified *** methods heavily rely on region-of-interest(Rol)operations to extract local featur...
详细信息
End-to-end text spotting is a vital computer vision task that aims to integrate scene text detection and recognition into a unified *** methods heavily rely on region-of-interest(Rol)operations to extract local features and complex post-processing steps to produce final *** address these limitations,we propose TextFormer,a query-based end-to-end text spotter with a transformer ***,using query embedding per text instance,TextFormer builds upon an image encoder and a text decoder to learn a joint semantic understanding for multitask *** allows for mutual training and optimization of classification,segmentation and recognition branches,resulting in deeper feature sharing without sacrificing flexibility or ***,we design an adaptive global aggregation(AGG)module to transfer global features into sequential features for reading arbitrarilyshaped texts,which overcomes the suboptimization problem of Rol ***,potential corpus information is utilized from weak annotations to full labels through mixed supervision,further improving text detection and end-to-end text spotting *** experiments on various bilingual(i.e.,English and Chinese)benchmarks demonstrate the superiority of our *** on the TDA-ReCTS dataset,TextFormer surpasses the state-of-the-art method in terms of 1-NED by 13.2%.
Rapid urbanization has made road construction and maintenance imperative, but detecting road diseases has been time-consuming with limited accuracy. To overcome these challenges, we propose an efficient YOLOv7 road di...
详细信息
We study a novel replication mechanism to ensure service continuity against multiple simultaneous server *** this mechanism,each item represents a computing task and is replicated intoξ+1 servers for some integerξ≥...
详细信息
We study a novel replication mechanism to ensure service continuity against multiple simultaneous server *** this mechanism,each item represents a computing task and is replicated intoξ+1 servers for some integerξ≥1,with workloads specified by the amount of required *** one or more servers fail,the affected workloads can be redirected to other servers that host replicas associated with the same item,such that the service is not interrupted by the failure of up toξ*** requires that any feasible assignment algorithm must reserve some capacity in each server to accommodate the workload redirected from potential failed servers without overloading,and determining the optimal method for reserving capacity becomes a key *** existing algorithms that assume that no two servers share replicas of more than one item,we first formulate capacity reservation for a general arbitrary *** to the combinatorial nature of this problem,finding the optimal solution is *** this end,we propose a Generalized and Simple Calculating Reserved Capacity(GSCRC)algorithm,with a time complexity only related to the number of items packed in the *** conjunction with GSCRC,we propose a robust replica packing algorithm with capacity optimization(RobustPack),which aims to minimize the number of servers hosting replicas and tolerate multiple server *** theoretical analysis and experimental evaluations,we show that the RobustPack algorithm can achieve better performance.
Global illumination(GI)plays a crucial role in rendering realistic results for virtual exhibitions,such as virtual car *** scenarios usually include all-frequency bidirectional reflectance distribution functions(BRDFs...
详细信息
Global illumination(GI)plays a crucial role in rendering realistic results for virtual exhibitions,such as virtual car *** scenarios usually include all-frequency bidirectional reflectance distribution functions(BRDFs),although their geometries and light configurations may be *** allfrequency BRDFs in real time remains challenging due to the complex light *** approaches,including precomputed radiance transfer,light probes,and the most recent path-tracing-based approaches(ReSTIR PT),cannot satisfy both quality and performance requirements ***,we propose a practical hybrid global illumination approach that combines ray tracing and cached GI by caching the incoming radiance with *** approach can produce results close to those of ofline renderers at the cost of only approximately 17 ms at runtime and is robust over all-frequency *** approach is designed for applications involving static lighting and geometries,such as virtual exhibitions.
To address the problems of network congestion and spectrum resources shortage in multi-user large-scale scenarios,this paper proposes a twice random access OFDMA-NOMA-RA protocol combining the advantages of orthogonal...
详细信息
To address the problems of network congestion and spectrum resources shortage in multi-user large-scale scenarios,this paper proposes a twice random access OFDMA-NOMA-RA protocol combining the advantages of orthogonal frequency division multiple access(OFDMA)and non-orthogonal multiple access(NOMA).The idea of this protocol is that OFMDA is used to divide the entire frequency field into multiple orthogonal resource units(RUs),and NOMA is used on each RU to enable more users to access the channel and improve spectrum *** on the protocol designed in this paper,in the case of imperfect successive interference cancellation(SIC),the probability of successful competition subchannels and the outage probability are derived for two scenarios:Users occupy the subchannel individually and users share the ***,when two users share the channel,the decoding order of the users and the corresponding probabilities are ***,the system throughput is *** achieve better outage performance in the system,the optimal power allocation algorithm is proposed in this paper,which enables the optimal power allocation strategy to be *** results show that the larger the imperfect SIC coefficient,the worse the outage performance of weak *** with pure OFDMA and NOMA,OFDMA-NOMA-RA always maintains an advantage when the imperfect SIC coefficient is less than a specific value.
Permissioned blockchain is a promising methodology to build zero-trust storage foundation with trusted data storage and sharing for the zero-trust network. However, the inherent full-backup feature of the permissioned...
详细信息
The extraction of atomic-level material features from electron microscope images is crucial for studying structure-property relationships and discovering new materials. However, traditional electron microscope analyse...
详细信息
The extraction of atomic-level material features from electron microscope images is crucial for studying structure-property relationships and discovering new materials. However, traditional electron microscope analyses rely on time-consuming and complex human operations; thus, they are only applicable to images with a small number of atoms. In addition, the analysis results vary due to observers' individual deviations. Although efforts to introduce automated methods have been performed previously, many of these methods lack sufficient labeled data or require various conditions in the detection process that can only be applied to the target material. Thus, in this study, we developed AtomGAN, which is a robust, unsupervised learning method, that segments defects in classical 2D material systems and the heterostructures of MoS2/WS2automatically. To solve the data scarcity problem, the proposed model is trained on unpaired simulated data that contain point and line defects for MoS2/WS2. The proposed AtomGAN was evaluated on both simulated and real electron microscope images. The results demonstrate that the segmented point defects and line defects are presented perfectly in the resulting figures, with a measurement precision of 96.9%. In addition, the cycled structure of AtomGAN can quickly generate a large number of simulated electron microscope images.
Deep neural networks(DNNs)are vulnerable to elaborately crafted and imperceptible adversarial *** the continuous development of adversarial attack methods,existing defense algorithms can no longer defend against them ...
详细信息
Deep neural networks(DNNs)are vulnerable to elaborately crafted and imperceptible adversarial *** the continuous development of adversarial attack methods,existing defense algorithms can no longer defend against them ***,numerous studies have shown that vision transformer(ViT)has stronger robustness and generalization performance than the convolutional neural network(CNN)in various ***,because the standard denoiser is subject to the error amplification effect,the prediction network cannot correctly classify all reconstruction ***,this paper proposes a defense network(CVTNet)that combines CNNs and ViTs that is appended in front of the prediction *** can effectively eliminate adversarial perturbations and maintain high ***,this paper proposes a regularization loss(L_(CPL)),which optimizes the CVTNet by computing different losses for the correct prediction set(CPS)and the wrong prediction set(WPS)of the reconstruction examples,*** evaluation results on several standard benchmark datasets show that CVTNet performs better robustness than other advanced *** with state-of-the-art algorithms,the proposed CVTNet defense improves the average accuracy of pixel-constrained attack examples generated on the CIFAR-10 dataset by 24.25%and spatially-constrained attack examples by 14.06%.Moreover,CVTNet shows excellent generalizability in cross-model protection.
This paper focuses on the effective utilization of data augmentation techniques for 3Dlidar point clouds to enhance the performance of neural network *** point clouds,which represent spatial information through a coll...
详细信息
This paper focuses on the effective utilization of data augmentation techniques for 3Dlidar point clouds to enhance the performance of neural network *** point clouds,which represent spatial information through a collection of 3D coordinates,have found wide-ranging *** augmentation has emerged as a potent solution to the challenges posed by limited labeled data and the need to enhance model generalization *** of the existing research is devoted to crafting novel data augmentation methods specifically for 3D lidar point ***,there has been a lack of focus on making the most of the numerous existing augmentation *** this deficiency,this research investigates the possibility of combining two fundamental data augmentation *** paper introduces PolarMix andMix3D,two commonly employed augmentation techniques,and presents a new approach,named *** of using a fixed or predetermined combination of augmentation methods,RandomFusion randomly chooses one method from a pool of options for each instance or *** innovative data augmentation technique randomly augments each point in the point cloud with either PolarMix or *** crux of this strategy is the random choice between PolarMix and Mix3Dfor the augmentation of each point within the point cloud data *** results of the experiments conducted validate the efficacy of the RandomFusion strategy in enhancing the performance of neural network models for 3D lidar point cloud semantic segmentation *** is achieved without compromising computational *** examining the potential of merging different augmentation techniques,the research contributes significantly to a more comprehensive understanding of how to utilize existing augmentation methods for 3D lidar point *** data augmentation technique offers a simple yet effective method to leverage the diversity of augmentation techniques and boost the ro
暂无评论