Column-oriented databases have emerged as effective solutions for handling massive amounts of data, and data compression plays a crucial role. Attribute columns are divided into blocks and stored in separate files, an...
Column-oriented databases have emerged as effective solutions for handling massive amounts of data, and data compression plays a crucial role. Attribute columns are divided into blocks and stored in separate files, and records within the same attribute column often exhibit high similarity, providing favorable conditions for data compression. Researchers have proposed numerous compression algorithms, but these algorithms can only achieve optimal compression results when applied to data with specific features. Therefore, it is crucial to select the compression algorithm that performs best based on the features of the data. We propose a novel method for selecting compression algorithms using Stacking, a technique that effectively enhances the prediction ability of classification models in machine learning. Our experimental results demonstrate that the stacked model achieves an accuracy of 92.9%, surpassing other models in terms of F1-Score and Kappa coefficient. Furthermore, our compression algorithm selection method outperforms other existing methods in terms of compression performance.
Accurate cancer survival prediction enables clinicians to tailor treatment regimens based on individual patient prognoses, effectively mitigating over-treatment and inefficient medical resource allocation. Recently, t...
详细信息
Charity giving is a fundamental aspect of society, but there are concerns about the accountability and transparency of the donation process. Blockchain technology has emerged as a potential solution, offering a secure...
详细信息
Sharing learned models is crucial in research and the industry’s rapid development and progress. Meanwhile, as the Intellectual Property (IP) of the model proposer, the learned high-performance models must be protect...
Sharing learned models is crucial in research and the industry’s rapid development and progress. Meanwhile, as the Intellectual Property (IP) of the model proposer, the learned high-performance models must be protected to avoid being illegally copied or redistributed by malicious users. Unfortunately, even though the field of Electroencephalography (EEG) has made significant progress and the models are becoming increasingly complex, more work still needs to be done on protecting EEG-based models. The damage caused by model stealing and attack on the brain-computer interface (BCI) is more severe than in other fields. In this paper, we propose a method that protects the IP of EEG-based models with watermarking for the first time. Watermarks are embedded into three representative EEG-based models by designing a trigger set. On the premise of not sacrificing the primary task’s performance significantly, the models’ legality can be verified remotely through the trigger set. Furthermore, we demonstrate that the proposed model protection method is robust to various anti-watermarking attacks, such as fine-tuning, transfer learning, pruning, and watermark overwriting.
With the increasing variety and quantity of medical devices, there is an urgent need for safe and efficient management of them. The traditional centralized management system has the problems of information asymmetry a...
详细信息
Fashion complementary recommendation has always been crucial in the field of recommendation. In previous work, researchers did not pay attention to the connection and combinability between multi-dimensional image feat...
详细信息
Fashion complementary recommendation has always been crucial in the field of recommendation. In previous work, researchers did not pay attention to the connection and combinability between multi-dimensional image features of fashion items. To effectively utilize the advantages of high-level and low-level features in images, we propose a Fashion Feature Fusion Network (FFFN) to solve the fashion complementary recommended tasks, which extracts and combines the features of different dimensions in the neural network into a fusion feature. Then, we input the fused image features and the category text features of fashion items into the co-attention module to realize the guidance of the text attention information to the image attention information. Experimental results on different datasets show that our model has advantages compared to the state-of-the-art methods.
Tabular data, which are also known as structured data, is one of the most common forms of data and can be frequently seen in fields such as healthcare, finance, recommendation systems and network security. In contrast...
Tabular data, which are also known as structured data, is one of the most common forms of data and can be frequently seen in fields such as healthcare, finance, recommendation systems and network security. In contrast to homogeneous data like image, audio and text, tabular data is usually heterogeneous and shows a small sample size and weak correlations between features. Besides, tabular data may contain not only numerical features but also categorical ones that can not be handled directly by the majority of those popular learning algorithms. The aforementioned characteristics make decision tree ensemble methods, such as random forests and gradient boosting trees, more suitable for processing tabular data than other models. In this context, it is essential to transform categorical features into numerical ones in the setting of category embedding. This paper surveys embedding methods for handling low-cardinality categorical features in tabular data. Specifically, these methods are put into two categories, namely, supervised and unsupervised encoding, which each is introduced in terms of the strategies of category encoding. Moreover, the characteristics of each method are summarized. On the basis of the summarization, further directions of category embedding are suggested within the setting of representation learning.
In this paper, we use polar codes to design the robust steganography for blind watermarking and non-blind watermarking problems, respectively. The proposed steganography enables the embedded cover sequence to effectiv...
详细信息
The overgrowth of weeds growing along with the primary crop in the fields reduces crop *** solutions like hand weeding are labor-intensive,costly,and time-consuming;farmers have used *** application of herbicide is ef...
详细信息
The overgrowth of weeds growing along with the primary crop in the fields reduces crop *** solutions like hand weeding are labor-intensive,costly,and time-consuming;farmers have used *** application of herbicide is effective but causes environmental and health ***,Precision Agriculture(PA)suggests the variable spraying of herbicides so that herbicide chemicals do not affect the primary *** by the gap above,we proposed a Deep Learning(DL)based model for detecting Eggplant(Brinjal)weed in this *** key objective of this study is to detect plant and non-plant(weed)parts from crop *** the help of object detection,the precise location of weeds from images can be *** dataset is collected manually from a private farm in Gandhinagar,Gujarat,*** combined approach of classification and object detection is applied in the proposed *** Convolutional Neural Network(CNN)model is used to classify weed and non-weed images;further DL models are applied for object *** have compared DL models based on accuracy,memory usage,and Intersection over Union(IoU).ResNet-18,YOLOv3,CenterNet,and Faster RCNN are used in the proposed *** outperforms all other models in terms of accuracy,i.e.,88%.Compared to other models,YOLOv3 is the least memory-intensive,utilizing 4.78 GB to evaluate the data.
The annotation of Open Reading Frames (ORFs) is a crucial step in gene annotation, as it precisely delineates the specific regions of expressed genes. However, small Open Reading Frames (smORFs), in comparison to ORFs...
详细信息
暂无评论