Smart grid monitoring, automation and control will completely rely on PMU based sensor data soon. Accordingly, a high throughput, low latency Information and Communication Technology (ICT) infrastructure should be opt...
详细信息
The most significant zone of study for Natural Language Processing (NLP) is text compression. Since the number of characters in Unicode are many, 16 bits are needed to process the entire code. This study suggests a us...
详细信息
The most significant zone of study for Natural Language Processing (NLP) is text compression. Since the number of characters in Unicode are many, 16 bits are needed to process the entire code. This study suggests a useful method for compressing Bangla natural text called the 5 Bit Compression Scheme for Bangla Text(5BCS), which uses a 5-bit encoding method to change the 16-bit Bangla letters into a 5-bit format. This technique provides an encoding algorithm which representing the 16-bit Bangla characters to 5 bits by utilizing a query table. The query table contains 4 sets which comprises all the Bangla characters as well as transliterations and special symbols. An m-series technique is used for logically determining index of a given characters combination while translating characters into 5 bits. By utilizing the 5BCS, a natural text can be compressed by a maximum of 84%. The algorithm for decompress the compressed data to translate the original data is also detailed in this paper. Additionally, a comparison section is developed to compare our 5BCS technique with the widely used Huffman and LZW technique. The experimental result of the comparison looks very much optimistic.
College classes are becoming increasingly large.A critical component in scaling class size is the collaboration and interactions among instructors,teaching assistants,and *** develop a prototype of an intelligent voic...
详细信息
College classes are becoming increasingly large.A critical component in scaling class size is the collaboration and interactions among instructors,teaching assistants,and *** develop a prototype of an intelligent voice instructorassistant system for supporting large classes,in which Amazon Web Services,Alexa Voice Services,and self-developed services are *** uses a scraping service for reading the questions and answers from the past and current course discussion boards,organizes the questions in JavaScript object notation format,and stores them in the database,which can be accessed by Amazon web services Alexa *** a voice question from a student comes,Alexa is used for translating the voice sentence into ***,Siamese deep long short-term memory model is introduced to calculate the similarity between the question asked and the questions in the database to find the best-matched *** with no match will be sent to the instructor,and instructor’s answer will be added into the *** show that the implemented model achieves promising results that can lead to a practical *** voice instructor-assistant system starts with a small set of *** can grow through learning and improving when more and more questions are asked and answered.
There are many factors that affect the quality of data received from crowdsourcing, including cognitive biases, varying levels of expertise, and varying subjective scales. This work investigates how the elicitation an...
详细信息
Recently, some weakly supervised multi-object tracking (MOT) methods learn identity embedding features with pseudo identity labels rather than the high-cost manual ones. However, these pseudo identity labels may conta...
详细信息
Recently, some weakly supervised multi-object tracking (MOT) methods learn identity embedding features with pseudo identity labels rather than the high-cost manual ones. However, these pseudo identity labels may contain many false or missing identities, which adversely affect the optimization of tracking networks, resulting in interrupted trajectories of occluded targets. To effectively reconnect the interrupted trajectories caused by noisy pseudo labels, we propose a novel weakly supervised MOT method based on a Trajectory-Reconnecting Transformer (TRTMOT). TRT-MOT performs feature decoupling to extract discriminative embedding features for reconnecting trajectories of occluded targets. Experimental results show that TRTMOT outperforms previous weakly supervised MOT methods by at least +3.6 and +5.6 on MOTA for the MOT17 and MOT20 datasets, respectively.
Since its inception, web application development has undergone constant evolution, and with it the evolution of the web application software developer. Developers are increasingly specialized in the frameworks and too...
详细信息
Following procedural texts written in natural languages is challenging. We must read the whole text to identify the relevant information or identify the instruction flows to complete a task, which is prone to failures...
详细信息
One simplifying assumption made in the existing and well-performing multi-robot systems is that the robots are single-tasking: each robot operates on a single task at any time. While this assumption is innocent to mak...
详细信息
One simplifying assumption made in the existing and well-performing multi-robot systems is that the robots are single-tasking: each robot operates on a single task at any time. While this assumption is innocent to make in situations with sufficient resources such that robots can work independently, it becomes a restriction when they must share capabilities. In this paper, we consider multitasking robots with multi-robot tasks. Given a set of tasks, each achievable by a coalition of robots, our approach allows the coalitions to overlap by exploiting task synergies based on the physical constraints required to maintain these coalitions. The key contribution is a general and flexible framework that extends the current multi-robot systems to enable multitasking. The proposed approach is inspired by the information invariant theory, which orients around the equivalence of different information requirements. We map physical constraints to information requirements in our work, thereby allowing task synergies to be identified by reasoning about the relationships between such requirements. We show that our algorithm is sound and complete. Simulation results show its effectiveness under resource-constrained situations and in handling challenging scenarios in a realistic UAV simulator.
We conduct an eye tracking study to investigate perception text-embellished narrative visualizations under different task *** stimuli are data visualizations embellished with text-based elements:annotations,captions,l...
详细信息
We conduct an eye tracking study to investigate perception text-embellished narrative visualizations under different task *** stimuli are data visualizations embellished with text-based elements:annotations,captions,labels,and descriptive *** consider three common viewing tasks that occur when these types of graphics are viewed:(1)simple observation,(2)active search to answer a query,and(3)information memorization for later *** overarching goal is to understand,at a perceptual level,if and how task affects how these visualizations are interacted *** analyzing collected gaze data and conducting advanced semantic scanpath analysis,we find,at a high level,diverse patterns of gaze behavior:simple observation and information memorization lead to similar optical viewing strategies,while active search significantly diverges,both in regards to which areas of the visualization are focused upon and how often embellishments are interacted *** discuss study outcomes in the context of embellishing visualizations with text for various usage scenarios.
Word embedding has been widely used in word sense disambiguation(WSD)and many other tasks in recent years for it can well represent the semantics of ***,the existing word embedding methods mostly represent each word a...
详细信息
Word embedding has been widely used in word sense disambiguation(WSD)and many other tasks in recent years for it can well represent the semantics of ***,the existing word embedding methods mostly represent each word as a single vector,without considering the homonymy and polysemy of the word;thus,their performances are *** order to address this problem,an effective topical word embedding(TWE)‐based WSD method,named TWE‐WSD,is proposed,which integrates Latent Dirichlet Allocation(LDA)and word *** of generating a single word vector(WV)for each word,TWE‐WSD generates a topical WV for each word under each *** integrating strategies are designed to obtain high quality contextual *** experiments on SemEval‐2013 and SemEval‐2015 for English all‐words tasks showed that TWE‐WSD outperforms other state‐of‐the‐art WSD methods,especially on nouns.
暂无评论