Implicit discourse relation recognition is a crucial component for automatic discourse-level analysis and nature language understanding. Previous studies exploit discriminative models that are built on either powerful...
详细信息
Overcome context-independent probabilities based reasoning, with decomposition of categories and predicates into features as non-stable predicates. With distinction between generative classifier and discriminative cla...
详细信息
Overcome context-independent probabilities based reasoning, with decomposition of categories and predicates into features as non-stable predicates. With distinction between generative classifier and discriminative classifier, we purpose to use some discriminative classifiers such as dual-form perceptron and kernelized support vector machine to improve to result of reasoning process. With capability of dual-form perceptron and kernelized support vector machine, finding linear or non-linear decision boundary for similarity-like supporting predicate for reasoning process.
The article A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks, written by Shujuan Ji, Haiyan Ma, Yongquan Liang, Hofung Leung and Chunjin Zhang, was originally p...
The article A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks, written by Shujuan Ji, Haiyan Ma, Yongquan Liang, Hofung Leung and Chunjin Zhang, was originally published electronically on the publisher’s internet portal.
We consider deep learning (DL) for event classification using electroencephalogram (EEG) measurements of brain activities. We proposed HDNN or hierarchical deep neural network, and CNN4EEG, a new convolution neural ne...
详细信息
In the present study, there are a number of recognition methods with high recognition accuracy, which are based on deep learning. However, these methods usually have a good effect in a restricted environment, but in t...
详细信息
In the present study, there are a number of recognition methods with high recognition accuracy, which are based on deep learning. However, these methods usually have a good effect in a restricted environment, but in the natural environment, the accuracy of face recognition has decreased significantly, especially in the case of occlusion, face recognition will appear inaccurate or unrecognized situation. Based on this, this paper presents a face recognition method based on the deep learning in the natural environment, hoping to achieve robust performance in the natural environment, especially in the case of occlusion. The main contribution of this paper is improving the method of multi-patches by using 4 areas' patches in the face. And in order to have a higher performance, we use a Joint Bayesian (JB) measure in face-verification. Finally, we trained the model by the set of CASIA-WebFace and test it in the Labeled Faces in the Wild (LFW).
In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user's trajectory da...
In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user's trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are selected from the accessing point database, then the algorithm calculates the polygon centroids; finally, the noises are added to the polygon centroids by the differential privacy method, and the polygon centroids replace the protected points, and then the algorithm constructs and issues the new trajectory data. The experiments show that the running time of the proposed algorithms is fast, the privacy protection of the scheme is effective and the data usability of the scheme is higher.
As the feature size of CMOS transistors scales down, single event transient (SET) has been an important consideration in designing logic circuits. Many researches have been done in analyzing the impact of SET. However...
As the feature size of CMOS transistors scales down, single event transient (SET) has been an important consideration in designing logic circuits. Many researches have been done in analyzing the impact of SET. However, it is difficult to consider numerous factors. We present a new approach for analyzing the SET pulses propagation probabilities (SPPs). It considers all masking effects and uses SET pulses propagation probabilities matrices (SPPMs) to represent the SPPs in current cycle. Based on the matrix union operations, the SPPs in consecutive cycles can be calculated. Experimental results show that our approach is practicable and efficient.
Dear editor,The Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA)hybrid with the resource reservation approach from Time Division Multiple Address(TDMA)has been emerged as a promising method to solve col...
详细信息
Dear editor,The Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA)hybrid with the resource reservation approach from Time Division Multiple Address(TDMA)has been emerged as a promising method to solve collision problems in wireless LANs[1–6].In the hybrid method,a TDMA circle contains multiple slots for nodes to contend for the ***,it allows a
With the development of 4 G and 5 G mobile communication technology,using mobile phone to pay for goods and services has become a very popular *** traditional forms of payment cannot be applied in e-commerce *** paper...
详细信息
With the development of 4 G and 5 G mobile communication technology,using mobile phone to pay for goods and services has become a very popular *** traditional forms of payment cannot be applied in e-commerce *** paper employs model checking method to verify the security and reliability of the Environment information Systems.A PROMELA model for the System is *** an important part of the modeling methodology,the Environment information System is translated into a simpler model that nevertheless preserves all the essential behavior to be *** also proposes initial results on the actual verification of the Environment information System using *** result of this work is a complete procedure for the modeling and verification of the Environment information System.
In the {CLAW, DIAMOND}-FREE EDGE DELETION problem (CDFED), we are given a graph G and an integer k > 0, and the question is whether there are at most k edges whose deletion results in a graph without claws and diam...
详细信息
暂无评论