Visual loop closure detection, which can be considered as an image retrieval task, is an important problem in SLAM (Simultaneous Localization and Mapping) systems. The frequently used bag-of-words (BoW) models can ach...
详细信息
Objective:Prevention and early detection of colorectal cancer(CRC)can increase the chances of successful treatment and reduce *** data mining technologies have been utilized to strengthen the early detection of CRC in...
详细信息
Objective:Prevention and early detection of colorectal cancer(CRC)can increase the chances of successful treatment and reduce *** data mining technologies have been utilized to strengthen the early detection of CRC in primary *** synthesis on the model’s effectiveness is *** systematic review synthesizes studies that examine the effect of data mining on improving risk prediction of ***:The PRISMA framework guided the conduct of this *** obtained papers via Pub Med,Cochrane Library,EMBASE and Google *** appraisal was performed using Downs and Black’s quality *** evaluate the performance of included models,the values of specificity and sensitivity were comparted,the values of area under the curve(AUC)were plotted,and the median of overall AUC of included studies was ***:A total of 316 studies were reviewed for full *** articles were *** studies implement techniques including artificial neural networks,Bayesian networks and decision *** articles reported the overall model ***,the median AUC is 0.8243[interquartile range(IQR):0.8050-0.8886].In the two articles that reported comparison results with traditional models,the data mining method performed better than the traditional models,with the best AUC improvement of 10.7%.Conclusions:The adoption of data mining technologies for CRC detection is at an early *** numbers of included articles and heterogeneity of those studies implied that more rigorous research is expected to further investigate the techniques’effects.
Offline Signature Verification (OSV) is a challenging pattern recognition task, especially in the presence of skilled forgeries that are not available during training. This study aims to tackle its challenges and meet...
详细信息
Offline Signature Verification (OSV) is a challenging pattern recognition task, especially in the presence of skilled forgeries that are not available during training. This study aims to tackle its challenges and meet the substantial need for generalization for OSV by examining different loss functions for Convolutional Neural Network (CNN). We adopt our new approach to OSV by asking two questions: 1. which classification loss provides more generalization for feature learning in OSV?, and 2. How integration of different losses into a unified multi-loss function lead to an improved learning framework? These questions are studied based on analysis of three loss functions, including cross entropy, Cauchy-Schwarz divergence, and hinge loss. According to complementary features of these losses, we combine them into a dynamic multi-loss function and propose a novel ensemble framework for simultaneous use of them in CNN. Our proposed Multi-Loss Snapshot Ensemble (MLSE) consists of several sequential trials. In each trial, a dominant loss function is selected from the multi-loss set, and the remaining losses act as a regularizer. Different trials learn diverse representations for each input based on signature identification task. This multi-representation set is then employed for the verification task. An ensemble of SVMs is trained on these representations, and their decisions are finally combined according to the selection of most generalizable SVM for each user. We conducted two sets of experiments based on two different protocols of OSV, i.e., writer-dependent and writer-independent on three signature datasets: GPDS-Synthetic, MCYT, and UT-SIG. Based on the writer-dependent OSV protocol, On UT-SIG, we achieved 6.17% Equal Error Rate (EER) which showed substantial improvement over the best EER in the literature, 9.61%. Our method surpassed state-of-the-arts by 2.5% on GPDS-Synthetic, achieving 6.13%. Our result on MCYT was also comparable to the best previous results. The
Free-space optical (FSO) links are considered as a cost-efficient way to fill the backhaul/fronthaul connectivity gap between millimeter wave (mmWave) access networks and optical fiber based central networks. In this ...
详细信息
Mobile Edge Computing(MEC)has become the most possible network architecture to realize the vision of interconnection of all *** offloading compute-intensive or latency-sensitive applications to nearby small cell base ...
详细信息
Mobile Edge Computing(MEC)has become the most possible network architecture to realize the vision of interconnection of all *** offloading compute-intensive or latency-sensitive applications to nearby small cell base stations(sBSs),the execution latency and device power consumption can be reduced on resource-constrained mobile ***,computation delay of Mobile Edge Network(MEN)tasks are neglected while the unloading decision-making is studied in *** this paper,we propose a workload allocation scheme which combines the task allocation optimization of mobile edge network with the actual user behavior activities to predict the task allocation of single *** obtain the next possible location through the user's past location information,and receive the next access server according to the grid ***,the next time task sequence is calculated on the base of the historical time task sequence,and the server is chosen to preload the *** the experiments,the results demonstrate a high accuracy of our proposed model.
Due to the diversity of garbage types in our daily life, we will encounter many difficulties in the process of classification. In this regard, I combine hog features and boosting algorithm to develop a SVM classificat...
Due to the diversity of garbage types in our daily life, we will encounter many difficulties in the process of classification. In this regard, I combine hog features and boosting algorithm to develop a SVM classification method. Firstly, the input image is preprocessed to make the image more recognizable. Secondly, the hog algorithm is used to extract the features of the image. Finally, the classification device is trained, and the relevant information is sent to the image set. On this basis, the classification situation is detected. The final results show that the classification efficiency of the algorithm is as high as 95% or even more, which is about 10% higher than that of single SVM classification method. It can accurately classify garbage and has certain feasibility.
In order to investigate the stochastic features in urban traffic dynamics, we propose a Stochastic Link Flow Model (SLFM) for signalized traffic networks with demand uncertainties. In the proposed model, the link traf...
详细信息
In order to monitor the wear condition of grinding roller of coal mill in power plant and improve the reliability of production equipment, it is necessary to establish a state monitoring model with high accuracy and g...
详细信息
In order to monitor the wear condition of grinding roller of coal mill in power plant and improve the reliability of production equipment, it is necessary to establish a state monitoring model with high accuracy and good prediction effect. It has been shown that the power of coal mill can reflect the wear degree of grinding roller. If the voltage and power factor of coal mill are constant, grinding current can be used to replace the power of coal mill. In this paper, through collecting field historical operation data and data preprocessing, the current model of coal mill is established by using double hidden layers BP (Back Propagation) neural network to predict the wear state of grinding roller. The simulation results show that compared with single hidden layer, double hidden layers BP neural network can improve the performance of the network, so as to improve the prediction accuracy of the model and provide basis for the follow-up maintenance of coal mill, which has certain practical engineering significance.
With the rapid development of Internet of Things and communication technologies, substations are becoming more intelligent, which brings opportunities for cyber attacks, threatens the safety of substations, and the hi...
With the rapid development of Internet of Things and communication technologies, substations are becoming more intelligent, which brings opportunities for cyber attacks, threatens the safety of substations, and the high coupling of equipment in substations increases the threat. This paper analyzes and studies the information-physical characteristics and equipment coupling problems of smart substations, constructs a smart substation CPS model based on the balance equation of state quantity, and designs a line fault simulation example to verify the stability of the model.
暂无评论