In this paper we propose a first empirical mapping between the RST-DT and the PDTB 3.0. We provide an original algorithm which allows the mapping of 6,510 (80.0%) explicit and implicit discourse relations between the ...
详细信息
Understanding and quantifying the capabilities of foundation models, particularly in text-to-image(T2I) generation, is crucial for verifying their alignment with human expectations and practical requirements. However,...
详细信息
Understanding and quantifying the capabilities of foundation models, particularly in text-to-image(T2I) generation, is crucial for verifying their alignment with human expectations and practical requirements. However, evaluating T2I foundation models presents significant challenges due to the complex, multi-dimensional psychological factors that influence human preferences for generated images. In this work, we propose MindScore, a multi-view framework for assessing the generation capacity of T2I models through the lens of human preference. Specifically, MindScore decomposes the evaluation into four complementary modules that align with human cognitive processing of images: matching, faithfulness, quality,and realness. The matching module quantifies the semantic alignment between generated images and prompt text, while the faithfulness module measures how accurately the images reflect specific prompt details. Furthermore, we incorporate quality and realness modules to capture deeper psychological preferences, recognizing that unpleasant or distorted images often trigger adverse human responses. Extensive experiments on three T2I datasets with human preference annotations clearly validate the superiority of our proposed MindScore over various state-of-the-art baselines. Our case studies further reveal that MindScore offers valuable insights into T2I generation from a human-centric perspective.
The advanced integrated circuits have been widely used in various situations including the Internet of Things,wireless communication,*** its manufacturing process exists unreliability,so cryptographic chips must be ri...
详细信息
The advanced integrated circuits have been widely used in various situations including the Internet of Things,wireless communication,*** its manufacturing process exists unreliability,so cryptographic chips must be rigorously *** to scan testing provides high test coverage,it is applied to the testing of cryptographic integrated ***,while providing good controllability and observability,it also provides attackers with a backdoor to steal *** the text,a novel protection scheme is put forward to resist scan-based attacks,in which we first use the responses generated by a strong physical unclonable function circuit to solidify fuseantifuse structures in a non-linear shift register(NLSR),then determine the scan input code according to the configuration of the fuse-antifuse structures and the styles of connection between the NLSR cells and the scan *** the key is right,the chip can be tested normally;otherwise,the data in the scan chain cannot be propagated normally,it is also impossible for illegal users to derive the desired scan *** proposed technique not only enhances the security of cryptographic chips,but also incurs acceptable overhead.
As e-Health systems become more widely used starting with COVID-19 pandemic, the amount of data they collect increases significantly. The volume, diversity, and unpredictability of patient data necessitate distinct st...
详细信息
Due to the risks associated with vulnerabilities in smart contracts, their security has gained significant attention in recent years. However, there is a lack of open datasets on smart contract vulnerabilities and the...
详细信息
People with hearing loss or hard hearing struggle with daily life activities as sign language is not widely known by the public. There are many attempts to use technology to help assist hearing loss individuals. Howev...
详细信息
Recently, advancements in artificial intelligence technology have greatly influenced the field of education, particularly in the area of intelligent homework assistance. However, current approaches are primarily desig...
详细信息
This study discusses the development of a web application aimed at facilitating Sinhala document creation, with a specific emphasis on Sinhala voice-to-text conversion and the handling of Sinhala commands through voca...
详细信息
ISBN:
(纸本)9798350319200
This study discusses the development of a web application aimed at facilitating Sinhala document creation, with a specific emphasis on Sinhala voice-to-text conversion and the handling of Sinhala commands through vocal input. Leveraging machine learning techniques, including convolutional neural networks and Natural Language Processing, the application's core features were established. Extensive research was conducted to tailor the application's content to the needs of its primary users, ensuring maximum effectiveness. The user-friendly interfaces of the web application are designed for clarity, simplicity, and consistency. The primary objective of this research is to comprehensively analyze the implementation of Sinhala voice-to-text conversion and Sinhala command handling systems. These systems are primarily designed to benefit diverse users, including journalists, content writers, and differently abled individuals with verbal abilities, by enhancing the efficiency of creating Sinhala documents. Through a detailed exploration of the research methodology, this study offers insight into the development process of the web-based system. The outcomes of the linguistic model training, presented within the study, reveal achievements and advancements that address the limitations inherent in existing solutions. Key findings from this research demonstrate the successful functionality of the Sinhala voice-to-text converter and the efficacy of the Sinhala command handler. The voice-to-text conversion system achieved an impressive accuracy rate of over 80%, while the Sinhala command handler exhibited an accuracy of approximately 80%. Moreover, this research envisions potential applications that extend beyond document creation. The technology showcased in the web application holds promise for broader language-based applications, impacting education, accessibility, and communication across the native Sinhala-speaking community in Sri Lanka. In summary, this research showcases th
Code summarization aims to generate natural language descriptions of source code, facilitating programmers to understand and maintain it rapidly. While previous code summarization efforts have predominantly focused on...
详细信息
ISBN:
(纸本)9798350330663
Code summarization aims to generate natural language descriptions of source code, facilitating programmers to understand and maintain it rapidly. While previous code summarization efforts have predominantly focused on method-level, this paper studies file-level code summarization, which can assist programmers in understanding and maintaining large source code projects. Unlike method-level code summarization, file-level code summarization typically involves long source code within a single file, which makes it challenging for Transformer-based models to understand the code semantics for the maximum input length of these models is difficult to set to a large number that can handle long code input well, due to the quadratic scaling of computational complexity with the input sequence length. To address this challenge, we propose SparseCoder, an identifier-aware sparse transformer for effectively handling long code sequences. Specifically, the SparseCoder employs a sliding window mechanism for self-attention to model short-term dependencies and leverages the structure message of code to capture long-term dependencies among source code identifiers by introducing two types of sparse attention patterns named global and identifier attention. To evaluate the performance of SparseCoder, we construct a new dataset FILE-CS for file-level code summarization in Python. Experimental results show that our SparseCoder model achieves state-of-the-art performance compared with other pre-trained models, including full self-attention and sparse models. Additionally, our model has low memory overhead and achieves comparable performance with models using full self-attention mechanism. Furthermore, we verify the generality of SparseCoder on other code understanding tasks, i.e., code clone detection and code search, and results show that our model outperforms baseline models in both tasks, demonstrating that our model can generate better code representations for various downstream tasks. Our
Edge computing (EC) serves as an effective technology, empowering end-users to attain high bandwidth and low latency by offloading tasks with high computational demands from mobile devices to edge servers. However, a ...
详细信息
暂无评论