In the field of quantum communication,quantum steganography is an important branch of quantum information hiding.In a realistic quantum communication system,quantum noises are unavoidable and will seriously impact the...In the field of quantum communication,quantum steganography is an important branch of quantum information hiding.In a realistic quantum communication system,quantum noises are unavoidable and will seriously impact the safety and reliability of the quantum steganographic system.Therefore,it is very important to analyze the influence of noise on the quantum steganography protocol and how to reduce the effect of noise.This paper takes the quantum steganography protocol proposed in 2010 as an example to analyze the effects of noises on information qubits and secret message qubits in the four primary quantum noise environments.The results show that when the noise factor of one quantum channel noise is known,the size of the noise factor of the other quantum channel can be adjusted accordingly,such as artificially applying noise,so that the influence of noises on the protocol is minimized.In addition,this paper also proposes a method of improving the efficiency of the steganographic protocol in a noisy environment.展开更多
The assessment of the fairness of health resource allocation is an important part of the study for the fairness of social development.The data used in most of the existing assessment methods comes from statistical yea...The assessment of the fairness of health resource allocation is an important part of the study for the fairness of social development.The data used in most of the existing assessment methods comes from statistical yearbooks or field survey sampling.These statistics are generally based on administrative areas and are difficult to support a fine-grained evaluation model.In response to these problems,the evaluation method proposed in this paper is based on the query statistics of the geographic grid of the target area,which are more accurate and efficient.Based on the query statistics of hot words in the geographic grids,this paper adopts the maximum likelihood estimation method to estimate the population in the grid region.Then,according to the statistical yearbook data of Hunan province,the estimated number and actual number of hospitals in each grid are analyzed and compared to measure the fairness of health resource allocation in the target region.Experiments show that the geographical grid population assessment based on hot words is more accurate and close to the actual value.The estimated average error is only about 17.8 percent.This method can assess the fairness of health resource allocation in any scale,and is innovative in data acquisition and evaluation methods.展开更多
In the past few years,deep learning has developed rapidly,and many researchers try to combine their subjects with deep learning.The algorithm based on Recurrent Neural Network(RNN)has been successfully applied in the ...In the past few years,deep learning has developed rapidly,and many researchers try to combine their subjects with deep learning.The algorithm based on Recurrent Neural Network(RNN)has been successfully applied in the fields of weather forecasting,stock forecasting,action recognition,etc.because of its excellent performance in processing Spatio-temporal sequence data.Among them,algorithms based on LSTM and GRU have developed most rapidly because of their good design.This paper reviews the RNN-based Spatio-temporal sequence prediction algorithm,introduces the development history of RNN and the common application directions of the Spatio-temporal sequence prediction,and includes precipitation nowcasting algorithms and traffic flow forecasting algorithms.At the same time,it also compares the advantages and disadvantages,and innovations of each algorithm.The purpose of this article is to give readers a clear understanding of solutions to such problems.Finally,it prospects the future development of RNN in the Spatio-temporal sequence prediction algorithm.展开更多
The development of various applications based on social network text is in full swing.Studying text features and classifications is of great value to extract important information.This paper mainly introduces the comm...The development of various applications based on social network text is in full swing.Studying text features and classifications is of great value to extract important information.This paper mainly introduces the common feature selection algorithms and feature representation methods,and introduces the basic principles,advantages and disadvantages of SVM and KNN,and the evaluation indexes of classification algorithms.In the aspect of mutual information feature selection function,it describes its processing flow,shortcomings and optimization improvements.In view of its weakness in not balancing the positive and negative correlation characteristics,a balance weight attribute factor and feature difference factor are introduced to make up for its deficiency.The experimental stage mainly describes the specific process:the word segmentation processing,to disuse words,using various feature selection algorithms,including optimized mutual information,and weighted with TF-IDF.Under the two classification algorithms of SVM and KNN,we compare the merits and demerits of all the feature selection algorithms according to the evaluation index.Experiments show that the optimized mutual information feature selection has good performance and is better than KNN under the SVM classification algorithm.This experiment proves its validity.展开更多
Person re-identification(re-ID)aims to match images of the same pedestrian across different cameras.It plays an important role in the field of security and surveillance.Although it has been studied for many years,it i...Person re-identification(re-ID)aims to match images of the same pedestrian across different cameras.It plays an important role in the field of security and surveillance.Although it has been studied for many years,it is still considered as an unsolved problem.Since the rise of deep learning,the accuracy of supervised person re-ID on public datasets has reached the highest level.However,these methods are difficult to apply to real-life scenarios because a large number of labeled training data is required in this situation.Pedestrian identity labeling,especially cross-camera pedestrian identity labeling,is heavy and expensive.Why we cannot apply the pre-trained model directly to the unseen camera network?Due to the existence of domain bias between source and target environment,the accuracy on target dataset is always low.For example,the model trained on the mall needs to adapt to the new environment of airport obviously.Recently,some researches have been proposed to solve this problem,including clustering-based methods,GAN-based methods,co-training methods and unsupervised domain adaptation methods.展开更多
Person re-ID is becoming increasingly popular in the field of modern surveillance.The purpose of person re-ID is to retrieve person of interests in non-overlapping multi-camera surveillance system.Due to the complexit...Person re-ID is becoming increasingly popular in the field of modern surveillance.The purpose of person re-ID is to retrieve person of interests in non-overlapping multi-camera surveillance system.Due to the complexity of the surveillance scene,the person images captured by cameras often have problems such as size variation,rotation,occlusion,illumination difference,etc.,which brings great challenges to the study of person re-ID.In recent years,studies based on deep learning have achieved great success in person re-ID.The improvement of basic networks and a large number of studies on the influencing factors have greatly improved the accuracy of person re-ID.Recently,some studies utilize GAN to tackle the domain adaptation task by transferring person images of source domain to the style of target domain and have achieved state of the art result in person re-ID.展开更多
feature representations from a large amount of data,and use reinforcement learning to learn the best strategy to complete the task.Through the combination of deep learning and reinforcement learning,end-to-end input a...feature representations from a large amount of data,and use reinforcement learning to learn the best strategy to complete the task.Through the combination of deep learning and reinforcement learning,end-to-end input and output can be achieved,and substantial breakthroughs have been made in many planning and decision-making systems with infinite states,such as games,in particular,AlphaGo,robotics,natural language processing,dialogue systems,machine translation,and computer vision.In this paper we have summarized the main techniques of deep reinforcement learning and its applications in image processing.展开更多
MEMS accelerometers are widely used in various fields due to their small size and low cost,and have good application prospects.However,the low accuracy limits its range of applications.To ensure data accuracy and safe...MEMS accelerometers are widely used in various fields due to their small size and low cost,and have good application prospects.However,the low accuracy limits its range of applications.To ensure data accuracy and safety we need to calibrate MEMS accelerometers.Many authors have improved accelerometer accuracy by calculating calibration parameters,and a large number of published calibration methods have been confusing.In this context,this paper introduces these techniques and methods,analyzes and summarizes the main error models and calibration procedures,and provides useful suggestions.Finally,the content of the accelerometer calibration method needs to be overcome.展开更多
With the development of image restoration technology based on deep learning,more complex problems are being solved,especially in image semantic inpainting based on context.Nowadays,image semantic inpainting techniques...With the development of image restoration technology based on deep learning,more complex problems are being solved,especially in image semantic inpainting based on context.Nowadays,image semantic inpainting techniques are becoming more mature.However,due to the limitations of memory,the instability of training,and the lack of sample diversity,the results of image restoration are still encountering difficult problems,such as repairing the content of glitches which cannot be well integrated with the original image.Therefore,we propose an image inpainting network based on Wasserstein generative adversarial network(WGAN)distance.With the corresponding technology having been adjusted and improved,we attempted to use the Adam algorithm to replace the traditional stochastic gradient descent,and another algorithm to optimize the training used in recent years.We evaluated our algorithm on the ImageNet dataset.We obtained high-quality restoration results,indicating that our algorithm improves the clarity and consistency of the image.展开更多
Person Re-identification(re-ID)is a hot research topic in the field of computer vision now,which can be regarded as a sub-problem of image retrieval.The goal of person re-ID is to give a monitoring pedestrian image an...Person Re-identification(re-ID)is a hot research topic in the field of computer vision now,which can be regarded as a sub-problem of image retrieval.The goal of person re-ID is to give a monitoring pedestrian image and retrieve other images of the pedestrian across the device.At present,person re-ID is mainly divided into two categories.One is the traditional methods,which relies heavily on manual features.The other is to use deep learning technology to solve.Because traditional methods mainly rely on manual feature,they cannot adapt well to a complex environment with a large amount of data.In recent years,with the development of deep learning technology,a large number of person re-ID methods based on deep learning have been proposed,which greatly improves the accuracy of person re-ID.展开更多
With the continuous development of face recognition network,the selection of loss function plays an increasingly important role in improving accuracy.The loss function of face recognition network needs to minimize the...With the continuous development of face recognition network,the selection of loss function plays an increasingly important role in improving accuracy.The loss function of face recognition network needs to minimize the intra-class distance while expanding the inter-class distance.So far,one of our mainstream loss function optimization methods is to add penalty terms,such as orthogonal loss,to further constrain the original loss function.The other is to optimize using the loss based on angular/cosine margin.The last is Triplet loss and a new type of joint optimization based on HST Loss and ACT Loss.In this paper,based on the three methods with good practical performance and the joint optimization method,various loss functions are thoroughly reviewed.展开更多
To solve the problem of hiding quantum information in simplified subsystems,Modi et al.[1]introduced the concept of quantum masking.Quantum masking is the encoding of quantum information by composite quantum states in...To solve the problem of hiding quantum information in simplified subsystems,Modi et al.[1]introduced the concept of quantum masking.Quantum masking is the encoding of quantum information by composite quantum states in such a way that the quantum information is hidden to the subsystem and spreads to the correlation of the composite systems.The concept of quantum masking was developed along with a new quantum impossibility theorem,the quantum no-masking theorem.The question of whether a quantum state can be masked has been studied by many people from the perspective of the types of quantum states,the number of masking participants,and error correction codes.Others have studied the relationships between maskable quantum states,the deterministic and probabilistic masking of quantum states,and the problem of probabilistic masking.Quantum masking techniques have been shown to outperform previous strategies in quantum bit commitment,quantum multi-party secret sharing,and so on.展开更多
Event detection(ED)is aimed at detecting event occurrences and categorizing them.This task has been previously solved via recognition and classification of event triggers(ETs),which are defined as the phrase or word m...Event detection(ED)is aimed at detecting event occurrences and categorizing them.This task has been previously solved via recognition and classification of event triggers(ETs),which are defined as the phrase or word most clearly expressing event occurrence.Thus,current approaches require both annotated triggers as well as event types in training data.Nevertheless,triggers are non-essential in ED,and it is time-wasting for annotators to identify the“most clearly”word from a sentence,particularly in longer sentences.To decrease manual effort,we evaluate event detectionwithout triggers.We propose a novel framework that combines Type-aware Attention and Graph Convolutional Networks(TA-GCN)for event detection.Specifically,the task is identified as a multi-label classification problem.We first encode the input sentence using a novel type-aware neural network with attention mechanisms.Then,a Graph Convolutional Networks(GCN)-based multilabel classification model is exploited for event detection.Experimental results demonstrate the effectiveness.展开更多
Image recognition has always been a hot research topic in the scientific community and industry.The emergence of convolutional neural networks(CNN)has made this technology turned into research focus on the field of co...Image recognition has always been a hot research topic in the scientific community and industry.The emergence of convolutional neural networks(CNN)has made this technology turned into research focus on the field of computer vision,especially in image recognition.But it makes the recognition result largely dependent on the number and quality of training samples.Recently,DCGAN has become a frontier method for generating images,sounds,and videos.In this paper,DCGAN is used to generate sample that is difficult to collect and proposed an efficient design method of generating model.We combine DCGAN with CNN for the second time.Use DCGAN to generate samples and training in image recognition model,which based by CNN.This method can enhance the classification model and effectively improve the accuracy of image recognition.In the experiment,we used the radar profile as dataset for 4 categories and achieved satisfactory classification performance.This paper applies image recognition technology to the meteorological field.展开更多
Image recognition technology is an important field of artificial intelligence.Combined with the development of machine learning technology in recent years,it has great researches value and commercial value.As a matter...Image recognition technology is an important field of artificial intelligence.Combined with the development of machine learning technology in recent years,it has great researches value and commercial value.As a matter of fact,a single recognition function can no longer meet people’s needs,and accurate image prediction is the trend that people pursue.This paper is based on Long Short-Term Memory(LSTM)and Deep Convolution Generative Adversarial Networks(DCGAN),studies and implements a prediction model by using radar image data.We adopt a stack cascading strategy in designing network connection which can control of parameter convergence better.This new method enables effective learning of image features and makes predictive models to have greater generalization capabilities.Experiments demonstrate that our network model is more robust and efficient in terms of timing prediction than 3DCNN and traditional ConvLSTM.The sequential image prediction model architecture proposed in this paper is theoretically applicable to all sequential images.展开更多
Wind speed prediction is of great importance because it affects the efficiency and stability of power systems with a high proportion of wind power.Temporal-spatial wind speed features contain rich information;however,...Wind speed prediction is of great importance because it affects the efficiency and stability of power systems with a high proportion of wind power.Temporal-spatial wind speed features contain rich information;however,their use to predict wind speed remains one of the most challenging and less studied areas.This paper investigates the problem of predicting wind speeds for multiple sites using temporal and spatial features and proposes a novel two-layer attentionbased long short-term memory(LSTM),termed 2Attn-LSTM,a unified framework of encoder and decoder mechanisms to handle temporal-spatial wind speed data.To eliminate the unevenness of the original wind speed,we initially decompose the preprocessing data into IMF components by variational mode decomposition(VMD).Then,it encodes the spatial features of IMF components at the bottom of the model and decodes the temporal features to obtain each component's predicted value on the second layer.Finally,we obtain the ultimate prediction value after denormalization and superposition.We have performed extensive experiments for short-term predictions on real-world data,demonstrating that 2Attn-LSTM outperforms the four baseline methods.It is worth pointing out that the presented 2Atts-LSTM is a general model suitable for other spatial-temporal features.展开更多
Object detection is one of the most important and challenging branches of computer vision,which has been widely applied in people s life,such as monitoring security,autonomous driving and so on,with the purpose of loc...Object detection is one of the most important and challenging branches of computer vision,which has been widely applied in people s life,such as monitoring security,autonomous driving and so on,with the purpose of locating instances of semantic objects of a certain class.With the rapid development of deep learning algorithms for detection tasks,the performance of object detectors has been greatly improved.In order to understand the main development status of target detection,a comprehensive literature review of target detection and an overall discussion of the works closely related to it are presented in this paper.This paper various object detection methods,including one-stage and two-stage detectors,are systematically summarized,and the datasets and evaluation criteria used in object detection are introduced.In addition,the development of object detection technology is reviewed.Finally,based on the understanding of the current development of target detection,we discuss the main research directions in the future.展开更多
Digital images can be tampered easily with simple image editing software tools.Therefore,image forensic investigation on the authenticity of digital images’content is increasingly important.Copy-move is one of the mo...Digital images can be tampered easily with simple image editing software tools.Therefore,image forensic investigation on the authenticity of digital images’content is increasingly important.Copy-move is one of the most common types of image forgeries.Thus,an overview of the traditional and the recent copy-move forgery localization methods using passive techniques is presented in this paper.These methods are classified into three types:block-based methods,keypoint-based methods,and deep learning-based methods.In addition,the strengths and weaknesses of these methods are compared and analyzed in robustness and computational cost.Finally,further research directions are discussed.展开更多
In recent years,with the increasing popularity of social networks,rumors have become more common.At present,the solution to rumors in social networks is mainly through media censorship and manual reporting,but this me...In recent years,with the increasing popularity of social networks,rumors have become more common.At present,the solution to rumors in social networks is mainly through media censorship and manual reporting,but this method requires a lot of manpower and material resources,and the cost is relatively high.Therefore,research on the characteristics of rumors and automatic identification and classification of network message text is of great significance.This paper uses the Naive Bayes algorithm combined with Laplacian smoothing to identify rumors in social network texts.The first is to segment the text and remove the stop words after the word segmentation is completed.Because of the data-sensitive nature of Naive Bayes,this paper performs text preprocessing on the input data.Then a naive Bayes classifier is constructed,and the Laplacian smoothing method is introduced to solve the problem of using the naive Bayes model to estimate the zero probability in rumor recognition.Finally,experiments show that the Naive Bayes algorithm combined with Laplace smoothing can effectively improve the accuracy of rumor recognition.展开更多
Every day we receive a large amount of information through different social media and software,and this data and information can be realized with the advent of data mining methods.In the process of data mining,to solv...Every day we receive a large amount of information through different social media and software,and this data and information can be realized with the advent of data mining methods.In the process of data mining,to solve some high-dimensional problems,feature selection is carried out in limited training samples,and effective features are selected.This paper focuses on two Relief feature selection algorithms:Relief and ReliefF algorithm.The differences between them and their respective applicable scopes are analyzed.Based on Relief algorithm,the high weight feature subset is obtained,and the correlation between features is calculated according to the mutual information distance measure,and the high redundant features are removed to obtain the feature subset with higher quality.Experimental results on six datasets show the effectiveness of our method.展开更多
基金This work was supported by the National Natural Science Foundation of China(Nos.61373131,61303039,61232016,61501247)the Six Talent Peaks Project of Jiangsu Province(Grant No.2015-XXRJ-013)+3 种基金Natural Science Foundation of Jiangsu Province(Grant No.BK20171458)the Natural Science Foundation of the Higher Education Institutions of Jiangsu Province(China under Grant No.16KJB520030)Sichuan Youth Science and Technique Foundation(No.2017JQ0048)NUIST Research Foundation for Talented Scholars(2015r014),PAPD and CICAEET funds.
文摘In the field of quantum communication,quantum steganography is an important branch of quantum information hiding.In a realistic quantum communication system,quantum noises are unavoidable and will seriously impact the safety and reliability of the quantum steganographic system.Therefore,it is very important to analyze the influence of noise on the quantum steganography protocol and how to reduce the effect of noise.This paper takes the quantum steganography protocol proposed in 2010 as an example to analyze the effects of noises on information qubits and secret message qubits in the four primary quantum noise environments.The results show that when the noise factor of one quantum channel noise is known,the size of the noise factor of the other quantum channel can be adjusted accordingly,such as artificially applying noise,so that the influence of noises on the protocol is minimized.In addition,this paper also proposes a method of improving the efficiency of the steganographic protocol in a noisy environment.
文摘The assessment of the fairness of health resource allocation is an important part of the study for the fairness of social development.The data used in most of the existing assessment methods comes from statistical yearbooks or field survey sampling.These statistics are generally based on administrative areas and are difficult to support a fine-grained evaluation model.In response to these problems,the evaluation method proposed in this paper is based on the query statistics of the geographic grid of the target area,which are more accurate and efficient.Based on the query statistics of hot words in the geographic grids,this paper adopts the maximum likelihood estimation method to estimate the population in the grid region.Then,according to the statistical yearbook data of Hunan province,the estimated number and actual number of hospitals in each grid are analyzed and compared to measure the fairness of health resource allocation in the target region.Experiments show that the geographical grid population assessment based on hot words is more accurate and close to the actual value.The estimated average error is only about 17.8 percent.This method can assess the fairness of health resource allocation in any scale,and is innovative in data acquisition and evaluation methods.
基金This work was supported by the National Natural Science Foundation of China(Grant No.42075007)the Open Project of Provincial Key Laboratory for Computer Information Processing Technology under Grant KJS1935Soochow University,and the Priority Academic Program Development of Jiangsu Higher Education Institutions。
文摘In the past few years,deep learning has developed rapidly,and many researchers try to combine their subjects with deep learning.The algorithm based on Recurrent Neural Network(RNN)has been successfully applied in the fields of weather forecasting,stock forecasting,action recognition,etc.because of its excellent performance in processing Spatio-temporal sequence data.Among them,algorithms based on LSTM and GRU have developed most rapidly because of their good design.This paper reviews the RNN-based Spatio-temporal sequence prediction algorithm,introduces the development history of RNN and the common application directions of the Spatio-temporal sequence prediction,and includes precipitation nowcasting algorithms and traffic flow forecasting algorithms.At the same time,it also compares the advantages and disadvantages,and innovations of each algorithm.The purpose of this article is to give readers a clear understanding of solutions to such problems.Finally,it prospects the future development of RNN in the Spatio-temporal sequence prediction algorithm.
文摘The development of various applications based on social network text is in full swing.Studying text features and classifications is of great value to extract important information.This paper mainly introduces the common feature selection algorithms and feature representation methods,and introduces the basic principles,advantages and disadvantages of SVM and KNN,and the evaluation indexes of classification algorithms.In the aspect of mutual information feature selection function,it describes its processing flow,shortcomings and optimization improvements.In view of its weakness in not balancing the positive and negative correlation characteristics,a balance weight attribute factor and feature difference factor are introduced to make up for its deficiency.The experimental stage mainly describes the specific process:the word segmentation processing,to disuse words,using various feature selection algorithms,including optimized mutual information,and weighted with TF-IDF.Under the two classification algorithms of SVM and KNN,we compare the merits and demerits of all the feature selection algorithms according to the evaluation index.Experiments show that the optimized mutual information feature selection has good performance and is better than KNN under the SVM classification algorithm.This experiment proves its validity.
文摘Person re-identification(re-ID)aims to match images of the same pedestrian across different cameras.It plays an important role in the field of security and surveillance.Although it has been studied for many years,it is still considered as an unsolved problem.Since the rise of deep learning,the accuracy of supervised person re-ID on public datasets has reached the highest level.However,these methods are difficult to apply to real-life scenarios because a large number of labeled training data is required in this situation.Pedestrian identity labeling,especially cross-camera pedestrian identity labeling,is heavy and expensive.Why we cannot apply the pre-trained model directly to the unseen camera network?Due to the existence of domain bias between source and target environment,the accuracy on target dataset is always low.For example,the model trained on the mall needs to adapt to the new environment of airport obviously.Recently,some researches have been proposed to solve this problem,including clustering-based methods,GAN-based methods,co-training methods and unsupervised domain adaptation methods.
文摘Person re-ID is becoming increasingly popular in the field of modern surveillance.The purpose of person re-ID is to retrieve person of interests in non-overlapping multi-camera surveillance system.Due to the complexity of the surveillance scene,the person images captured by cameras often have problems such as size variation,rotation,occlusion,illumination difference,etc.,which brings great challenges to the study of person re-ID.In recent years,studies based on deep learning have achieved great success in person re-ID.The improvement of basic networks and a large number of studies on the influencing factors have greatly improved the accuracy of person re-ID.Recently,some studies utilize GAN to tackle the domain adaptation task by transferring person images of source domain to the style of target domain and have achieved state of the art result in person re-ID.
基金This work was supported in part by the Open Research Project of State Key Laboratory of Novel Software Technology under Grant KFKT2018B23the Priority Academic Program Development of Jiangsu Higher Education Institutions,the 2018 Tiancheng Huizhi Innovation Promotion Education and Scientific Research Innovation Fund of the Ministry of Education under Grant 2018A03038 and the Open Project Program of the State Key Lab of CAD&CG(Grant No.A1916),Zhejiang University.
文摘feature representations from a large amount of data,and use reinforcement learning to learn the best strategy to complete the task.Through the combination of deep learning and reinforcement learning,end-to-end input and output can be achieved,and substantial breakthroughs have been made in many planning and decision-making systems with infinite states,such as games,in particular,AlphaGo,robotics,natural language processing,dialogue systems,machine translation,and computer vision.In this paper we have summarized the main techniques of deep reinforcement learning and its applications in image processing.
基金This work has received funding from 5150 Spring Specialists(05492018012)the European Union Horizon 2020 research and innovation programme under the Marie Sklodowska-Curie grant agreement No.701697,Major Program of the National Social Science Fund of China(Grant No.17ZDA092)+1 种基金Basic Research Programs(Natural Science Foundation)of Jiangsu Province(BK20180794)333 High-Level Talent Cultivation Project of Jiangsu Province(BRA2018332)and the PAPD fund.
文摘MEMS accelerometers are widely used in various fields due to their small size and low cost,and have good application prospects.However,the low accuracy limits its range of applications.To ensure data accuracy and safety we need to calibrate MEMS accelerometers.Many authors have improved accelerometer accuracy by calculating calibration parameters,and a large number of published calibration methods have been confusing.In this context,this paper introduces these techniques and methods,analyzes and summarizes the main error models and calibration procedures,and provides useful suggestions.Finally,the content of the accelerometer calibration method needs to be overcome.
基金supported by the National Natural Science Foundation of China(Grant No.42075007)the Open Project of Provincial Key Laboratory for Computer Information Processing Technology under Grant KJS1935,Soochow University+1 种基金the Priority Academic Program Development of Jiangsu Higher Education InstitutionsGraduate Scientific Research Innovation Program of Jiangsu Province under Grant no.KYCX21_1015.
文摘With the development of image restoration technology based on deep learning,more complex problems are being solved,especially in image semantic inpainting based on context.Nowadays,image semantic inpainting techniques are becoming more mature.However,due to the limitations of memory,the instability of training,and the lack of sample diversity,the results of image restoration are still encountering difficult problems,such as repairing the content of glitches which cannot be well integrated with the original image.Therefore,we propose an image inpainting network based on Wasserstein generative adversarial network(WGAN)distance.With the corresponding technology having been adjusted and improved,we attempted to use the Adam algorithm to replace the traditional stochastic gradient descent,and another algorithm to optimize the training used in recent years.We evaluated our algorithm on the ImageNet dataset.We obtained high-quality restoration results,indicating that our algorithm improves the clarity and consistency of the image.
文摘Person Re-identification(re-ID)is a hot research topic in the field of computer vision now,which can be regarded as a sub-problem of image retrieval.The goal of person re-ID is to give a monitoring pedestrian image and retrieve other images of the pedestrian across the device.At present,person re-ID is mainly divided into two categories.One is the traditional methods,which relies heavily on manual features.The other is to use deep learning technology to solve.Because traditional methods mainly rely on manual feature,they cannot adapt well to a complex environment with a large amount of data.In recent years,with the development of deep learning technology,a large number of person re-ID methods based on deep learning have been proposed,which greatly improves the accuracy of person re-ID.
基金This work was supported in part by the National Natural Science Foundation of China(Grant No.41875184)Innovation Team of“Six Talent Peaks”In Jiangsu Province(Grant No.TD-XYDXX-004).
文摘With the continuous development of face recognition network,the selection of loss function plays an increasingly important role in improving accuracy.The loss function of face recognition network needs to minimize the intra-class distance while expanding the inter-class distance.So far,one of our mainstream loss function optimization methods is to add penalty terms,such as orthogonal loss,to further constrain the original loss function.The other is to optimize using the loss based on angular/cosine margin.The last is Triplet loss and a new type of joint optimization based on HST Loss and ACT Loss.In this paper,based on the three methods with good practical performance and the joint optimization method,various loss functions are thoroughly reviewed.
基金This work was supported by the innovation and entrepreneurship training program of Nanjing University of Information Science&Technology(No.202010300212).
文摘To solve the problem of hiding quantum information in simplified subsystems,Modi et al.[1]introduced the concept of quantum masking.Quantum masking is the encoding of quantum information by composite quantum states in such a way that the quantum information is hidden to the subsystem and spreads to the correlation of the composite systems.The concept of quantum masking was developed along with a new quantum impossibility theorem,the quantum no-masking theorem.The question of whether a quantum state can be masked has been studied by many people from the perspective of the types of quantum states,the number of masking participants,and error correction codes.Others have studied the relationships between maskable quantum states,the deterministic and probabilistic masking of quantum states,and the problem of probabilistic masking.Quantum masking techniques have been shown to outperform previous strategies in quantum bit commitment,quantum multi-party secret sharing,and so on.
基金supported by the Hunan Provincial Natural Science Foundation of China(Grant No.2020JJ4624)the National Social Science Fund of China(Grant No.20&ZD047)+1 种基金the Scientific Research Fund of Hunan Provincial Education Department(Grant No.19A020)the National University of Defense Technology Research Project ZK20-46 and the Young Elite Scientists Sponsorship Program 2021-JCJQ-QT-050.
文摘Event detection(ED)is aimed at detecting event occurrences and categorizing them.This task has been previously solved via recognition and classification of event triggers(ETs),which are defined as the phrase or word most clearly expressing event occurrence.Thus,current approaches require both annotated triggers as well as event types in training data.Nevertheless,triggers are non-essential in ED,and it is time-wasting for annotators to identify the“most clearly”word from a sentence,particularly in longer sentences.To decrease manual effort,we evaluate event detectionwithout triggers.We propose a novel framework that combines Type-aware Attention and Graph Convolutional Networks(TA-GCN)for event detection.Specifically,the task is identified as a multi-label classification problem.We first encode the input sentence using a novel type-aware neural network with attention mechanisms.Then,a Graph Convolutional Networks(GCN)-based multilabel classification model is exploited for event detection.Experimental results demonstrate the effectiveness.
文摘Image recognition has always been a hot research topic in the scientific community and industry.The emergence of convolutional neural networks(CNN)has made this technology turned into research focus on the field of computer vision,especially in image recognition.But it makes the recognition result largely dependent on the number and quality of training samples.Recently,DCGAN has become a frontier method for generating images,sounds,and videos.In this paper,DCGAN is used to generate sample that is difficult to collect and proposed an efficient design method of generating model.We combine DCGAN with CNN for the second time.Use DCGAN to generate samples and training in image recognition model,which based by CNN.This method can enhance the classification model and effectively improve the accuracy of image recognition.In the experiment,we used the radar profile as dataset for 4 categories and achieved satisfactory classification performance.This paper applies image recognition technology to the meteorological field.
基金This work was supported in part by the Open Research Project of State Key Laboratory of Novel Software Technology under Grant KFKT2018B23the Priority Academic Program Development of Jiangsu Higher Education Institutions,and the Open Project Program of the State Key Lab of CAD\&CG(Grant No.A1916),Zhejiang University.
文摘Image recognition technology is an important field of artificial intelligence.Combined with the development of machine learning technology in recent years,it has great researches value and commercial value.As a matter of fact,a single recognition function can no longer meet people’s needs,and accurate image prediction is the trend that people pursue.This paper is based on Long Short-Term Memory(LSTM)and Deep Convolution Generative Adversarial Networks(DCGAN),studies and implements a prediction model by using radar image data.We adopt a stack cascading strategy in designing network connection which can control of parameter convergence better.This new method enables effective learning of image features and makes predictive models to have greater generalization capabilities.Experiments demonstrate that our network model is more robust and efficient in terms of timing prediction than 3DCNN and traditional ConvLSTM.The sequential image prediction model architecture proposed in this paper is theoretically applicable to all sequential images.
基金This work is supported in part by the Priority Academic Program Development of Jiangsu Higher Education Institutions,Natural Science Foundation of China(No.61103141,No.61105007 and No.51405241)NARI Nanjing Control System Ltd.(No.524608190024).
文摘Wind speed prediction is of great importance because it affects the efficiency and stability of power systems with a high proportion of wind power.Temporal-spatial wind speed features contain rich information;however,their use to predict wind speed remains one of the most challenging and less studied areas.This paper investigates the problem of predicting wind speeds for multiple sites using temporal and spatial features and proposes a novel two-layer attentionbased long short-term memory(LSTM),termed 2Attn-LSTM,a unified framework of encoder and decoder mechanisms to handle temporal-spatial wind speed data.To eliminate the unevenness of the original wind speed,we initially decompose the preprocessing data into IMF components by variational mode decomposition(VMD).Then,it encodes the spatial features of IMF components at the bottom of the model and decodes the temporal features to obtain each component's predicted value on the second layer.Finally,we obtain the ultimate prediction value after denormalization and superposition.We have performed extensive experiments for short-term predictions on real-world data,demonstrating that 2Attn-LSTM outperforms the four baseline methods.It is worth pointing out that the presented 2Atts-LSTM is a general model suitable for other spatial-temporal features.
基金This work was supported National Natural Science Foundation of China(Grant No.41875184)innovation team of“Six Talent Peaks”in Jiangsu Province(Grant No.TD-XYDXX-004).
文摘Object detection is one of the most important and challenging branches of computer vision,which has been widely applied in people s life,such as monitoring security,autonomous driving and so on,with the purpose of locating instances of semantic objects of a certain class.With the rapid development of deep learning algorithms for detection tasks,the performance of object detectors has been greatly improved.In order to understand the main development status of target detection,a comprehensive literature review of target detection and an overall discussion of the works closely related to it are presented in this paper.This paper various object detection methods,including one-stage and two-stage detectors,are systematically summarized,and the datasets and evaluation criteria used in object detection are introduced.In addition,the development of object detection technology is reviewed.Finally,based on the understanding of the current development of target detection,we discuss the main research directions in the future.
文摘Digital images can be tampered easily with simple image editing software tools.Therefore,image forensic investigation on the authenticity of digital images’content is increasingly important.Copy-move is one of the most common types of image forgeries.Thus,an overview of the traditional and the recent copy-move forgery localization methods using passive techniques is presented in this paper.These methods are classified into three types:block-based methods,keypoint-based methods,and deep learning-based methods.In addition,the strengths and weaknesses of these methods are compared and analyzed in robustness and computational cost.Finally,further research directions are discussed.
文摘In recent years,with the increasing popularity of social networks,rumors have become more common.At present,the solution to rumors in social networks is mainly through media censorship and manual reporting,but this method requires a lot of manpower and material resources,and the cost is relatively high.Therefore,research on the characteristics of rumors and automatic identification and classification of network message text is of great significance.This paper uses the Naive Bayes algorithm combined with Laplacian smoothing to identify rumors in social network texts.The first is to segment the text and remove the stop words after the word segmentation is completed.Because of the data-sensitive nature of Naive Bayes,this paper performs text preprocessing on the input data.Then a naive Bayes classifier is constructed,and the Laplacian smoothing method is introduced to solve the problem of using the naive Bayes model to estimate the zero probability in rumor recognition.Finally,experiments show that the Naive Bayes algorithm combined with Laplace smoothing can effectively improve the accuracy of rumor recognition.
文摘Every day we receive a large amount of information through different social media and software,and this data and information can be realized with the advent of data mining methods.In the process of data mining,to solve some high-dimensional problems,feature selection is carried out in limited training samples,and effective features are selected.This paper focuses on two Relief feature selection algorithms:Relief and ReliefF algorithm.The differences between them and their respective applicable scopes are analyzed.Based on Relief algorithm,the high weight feature subset is obtained,and the correlation between features is calculated according to the mutual information distance measure,and the high redundant features are removed to obtain the feature subset with higher quality.Experimental results on six datasets show the effectiveness of our method.