One of the critical hurdles, and breakthroughs, in the field of Natural Language Processing (NLP) in the last two decades has been the development of techniques for text representation that solves the so-called curse ...One of the critical hurdles, and breakthroughs, in the field of Natural Language Processing (NLP) in the last two decades has been the development of techniques for text representation that solves the so-called curse of dimensionality, a problem which plagues NLP in general given that the feature set for learning starts as a function of the size of the language in question, upwards of hundreds of thousands of terms typically. As such, much of the research and development in NLP in the last two decades has been in finding and optimizing solutions to this problem, to feature selection in NLP effectively. This paper looks at the development of these various techniques, leveraging a variety of statistical methods which rest on linguistic theories that were advanced in the middle of the last century, namely the distributional hypothesis which suggests that words that are found in similar contexts generally have similar meanings. In this survey paper we look at the development of some of the most popular of these techniques from a mathematical as well as data structure perspective, from Latent Semantic Analysis to Vector Space Models to their more modern variants which are typically referred to as word embeddings. In this review of algoriths such as Word2Vec, GloVe, ELMo and BERT, we explore the idea of semantic spaces more generally beyond applicability to NLP.展开更多
The writer identification system identifies individuals based on their handwriting is a frequent topic in biometric authentication and verification systems.Due to its importance,numerous studies have been conducted in...The writer identification system identifies individuals based on their handwriting is a frequent topic in biometric authentication and verification systems.Due to its importance,numerous studies have been conducted in various languages.Researchers have established several learning methods for writer identification including supervised and unsupervised learning.However,supervised methods require a large amount of annotation data,which is impossible in most scenarios.On the other hand,unsupervised writer identification methods may be limited and dependent on feature extraction that cannot provide the proper objectives to the architecture and be misinterpreted.This paper introduces an unsupervised writer identification system that analyzes the data and recognizes the writer based on the inter-feature relations of the data to resolve the uncertainty of the features.A pairwise architecturebased Autoembedder was applied to generate clusterable embeddings for handwritten text images.Furthermore,the trained baseline architecture generates the embedding of the data image,and the K-means algorithm is used to distinguish the embedding of individual writers.The proposed model utilized the IAM dataset for the experiment as it is inconsistent with contributions from the authors but is easily accessible for writer identification tasks.In addition,traditional evaluation metrics are used in the proposed model.Finally,the proposed model is compared with a few unsupervised models,and it outperformed the state-of-the-art deep convolutional architectures in recognizing writers based on unlabeled data.展开更多
随着民航经济的发展和人民生活水平的提高,旅客出行的服务要求越来越高,而当前传统的民航客服知识库检索普遍存在检索准确率以及效率低的问题,已经不能满足旅客的服务需求。文章通过结合Best Match 25算法、文本Embeddings和交叉编码器...随着民航经济的发展和人民生活水平的提高,旅客出行的服务要求越来越高,而当前传统的民航客服知识库检索普遍存在检索准确率以及效率低的问题,已经不能满足旅客的服务需求。文章通过结合Best Match 25算法、文本Embeddings和交叉编码器对知识库进行检索,高效检索出符合座席意图的答案,进而提升民航客服知识库查找效率,缩短座席通话查询时长,提升旅客服务体验,助力实现民航客服数字化、智能化转型。展开更多
The substantial competition among the news industries puts editors under the pressure of posting news articleswhich are likely to gain more user attention. Anticipating the popularity of news articles can help the edi...The substantial competition among the news industries puts editors under the pressure of posting news articleswhich are likely to gain more user attention. Anticipating the popularity of news articles can help the editorial teamsin making decisions about posting a news article. Article similarity extracted from the articles posted within a smallperiod of time is found to be a useful feature in existing popularity prediction approaches. This work proposesa new approach to estimate the popularity of news articles by adding semantics in the article similarity basedapproach of popularity estimation. A semantically enriched model is proposed which estimates news popularity bymeasuring cosine similarity between document embeddings of the news articles. Word2vec model has been used togenerate distributed representations of the news content. In this work, we define popularity as the number of timesa news article is posted on different websites. We collect data from different websites that post news concerning thedomain of cybersecurity and estimate the popularity of cybersecurity news. The proposed approach is comparedwith different models and it is shown that it outperforms the other models.展开更多
Purpose:Due to the incompleteness nature of knowledge graphs(KGs),the task of predicting missing links between entities becomes important.Many previous approaches are static,this posed a notable problem that all meani...Purpose:Due to the incompleteness nature of knowledge graphs(KGs),the task of predicting missing links between entities becomes important.Many previous approaches are static,this posed a notable problem that all meanings of a polysemous entity share one embedding vector.This study aims to propose a polysemous embedding approach,named KG embedding under relational contexts(ContE for short),for missing link prediction.Design/methodology/approach:ContE models and infers different relationship patterns by considering the context of the relationship,which is implicit in the local neighborhood of the relationship.The forward and backward impacts of the relationship in ContE are mapped to two different embedding vectors,which represent the contextual information of the relationship.Then,according to the position of the entity,the entity’s polysemous representation is obtained by adding its static embedding vector to the corresponding context vector of the relationship.Findings:ContE is a fully expressive,that is,given any ground truth over the triples,there are embedding assignments to entities and relations that can precisely separate the true triples from false ones.ContE is capable of modeling four connectivity patterns such as symmetry,antisymmetry,inversion and composition.Research limitations:ContE needs to do a grid search to find best parameters to get best performance in practice,which is a time-consuming task.Sometimes,it requires longer entity vectors to get better performance than some other models.Practical implications:ContE is a bilinear model,which is a quite simple model that could be applied to large-scale KGs.By considering contexts of relations,ContE can distinguish the exact meaning of an entity in different triples so that when performing compositional reasoning,it is capable to infer the connectivity patterns of relations and achieves good performance on link prediction tasks.Originality/value:ContE considers the contexts of entities in terms of their positions in triples and the relationships they link to.It decomposes a relation vector into two vectors,namely,forward impact vector and backward impact vector in order to capture the relational contexts.ContE has the same low computational complexity as TransE.Therefore,it provides a new approach for contextualized knowledge graph embedding.展开更多
In this paper, the authors discuss the upper bound for the genus of strong embeddings for 3-connected planar graphs on higher surfaces. It is shown that the problem of determining the upper bound for the strong embedd...In this paper, the authors discuss the upper bound for the genus of strong embeddings for 3-connected planar graphs on higher surfaces. It is shown that the problem of determining the upper bound for the strong embedding of 3-connected planar near-triangulations on higher non-orientable surfaces is NP-hard. As a corollary, a theorem of Richter, Seymour and Siran about the strong embedding of 3-connected planar graphs is generalized to orientable surface.展开更多
In this paper, it is shown that for every maximal planar graph G=(V,E) , a strong embedding on some non orientable surface with genus at most |V(G)|-22 is admitted such that the surface dual of G is also a...In this paper, it is shown that for every maximal planar graph G=(V,E) , a strong embedding on some non orientable surface with genus at most |V(G)|-22 is admitted such that the surface dual of G is also a planar graph. As a corollary, an interpolation theorem for strong embeddings of G on non orientable surfaces is obtained.展开更多
In this paper we show that the face-width of any embedding of a Halin graph(a type of planar graph) in the torus is one, and give a formula for determining the number of all nonequivalent embeddings of a Halin graph...In this paper we show that the face-width of any embedding of a Halin graph(a type of planar graph) in the torus is one, and give a formula for determining the number of all nonequivalent embeddings of a Halin graph in the torus.展开更多
We establish an explicit embedding of a quantum affine sl_(n) into a quantum affine sl_(n)+1.This embedding serves as a common generalization of two natural,but seemingly unrelated,embed-dings,one on the quantum affin...We establish an explicit embedding of a quantum affine sl_(n) into a quantum affine sl_(n)+1.This embedding serves as a common generalization of two natural,but seemingly unrelated,embed-dings,one on the quantum affine Schur algebra level and the other on the non-quantum level.The embedding on the quantum affine Schur algebras is used extensively in the analysis of canonical bases of quantum affine sln and gl_(n).The embedding on the non-quantum level is used crucially in a work of Riche and Williamson on the study of modular representation theory of general linear groups over a finite field.The same embedding is also used in a work of Maksimau on the categorical representations of affine general linear algebras.We further provide a more natural compatibility statement of the em-bedding on the idempotent version with that on the quantum affine Schur algebra level.A gl_(n)-variant of the embedding is also established.展开更多
The article “Time-series embeddings from language models: A tool for wind direction nowcasting”, written by Décio ALVES, Fábio MENDON?A, Sheikh Shanawaz MOSTAFA, and Fernando MORGADO-DIAS was originally pu...The article “Time-series embeddings from language models: A tool for wind direction nowcasting”, written by Décio ALVES, Fábio MENDON?A, Sheikh Shanawaz MOSTAFA, and Fernando MORGADO-DIAS was originally published electronically on the publisher's internet portal on 9 July 2024 without open access.展开更多
In this paper,we study Sobolev spaces in infinite dimensions and the corresponding embedding theorems.Our underlying spaces areℓ^(r)for r ∈[1,∞),equipped with corresponding probability measures.For the weighted Sobo...In this paper,we study Sobolev spaces in infinite dimensions and the corresponding embedding theorems.Our underlying spaces areℓ^(r)for r ∈[1,∞),equipped with corresponding probability measures.For the weighted Sobolev space W_(b)^(1,p)(ℓ^(r),γa)with a weight a∈ℓ^(r)of the Gaussian measureγa and a gradient weight b∈l^(∞),we characterize the relation between the weights(a and b)and the continuous(resp.compact)log-Sobolev embedding for p∈[1,∞)(resp.p∈(1,∞)).Several counterexamples are also constructed,which are of independent interest.展开更多
Let X and Y be two pointed metric spaces.In this article,we give a generalization of the Cheng-Dong-Zhang theorem for coarse Lipschitz embeddings as follows:If f:X→Y is a standard coarse Lipschitz embedding,then for ...Let X and Y be two pointed metric spaces.In this article,we give a generalization of the Cheng-Dong-Zhang theorem for coarse Lipschitz embeddings as follows:If f:X→Y is a standard coarse Lipschitz embedding,then for each x^(*)∈Lip_(0)(X)there existα,γ>0 depending only on f and Q_(x)*∈Lip_(0)(Y)with‖Q_(x)*‖_(Lip)≤α‖x^(*)‖_(Lip)such that|Q_(x)*f(x)-x^(*)(x)|≤γ‖x^(*)‖_(Lip),for all x∈X.Coarse stability for a pair of metric spaces is studied.This can be considered as a coarse version of Qian Problem.As an application,we give candidate negative answers to a 58-year old problem by Lindenstrauss asking whether every Banach space is a Lipschitz retract of its bidual.Indeed,we show that X is not a Lipschitz retract of its bidual if X is a universally left-coarsely stable space but not an absolute cardinality-Lipschitz retract.If there exists a universally right-coarsely stable Banach space with the RNP but not isomorphic to any Hilbert space,then the problem also has a negative answer for a separable space.展开更多
The metal-organic framework(MOF)derived Ni–Co–C–N composite alloys(NiCCZ)were“embedded”inside the carbon cloth(CC)strands as opposed to the popular idea of growing them upward to realize ultrastable energy storag...The metal-organic framework(MOF)derived Ni–Co–C–N composite alloys(NiCCZ)were“embedded”inside the carbon cloth(CC)strands as opposed to the popular idea of growing them upward to realize ultrastable energy storage and conversion application.The NiCCZ was then oxygen functionalized,facilitating the next step of stoichiometric sulfur anion diffusion during hydrothermal sulfurization,generating a flower-like metal hydroxysulfide structure(NiCCZOS)with strong partial implantation inside CC.Thus obtained NiCCZOS shows an excellent capacity when tested as a supercapacitor electrode in a three-electrode configuration.Moreover,when paired with the biomass-derived nitrogen-rich activated carbon,the asymmetric supercapacitor device shows almost 100%capacity retention even after 45,000 charge–discharge cycles with remarkable energy density(59.4 Wh kg^(-1)/263.8μWh cm^(–2))owing to a uniquely designed cathode.Furthermore,the same electrode performed as an excellent bifunctional water-splitting electrocatalyst with an overpotential of 271 mV for oxygen evolution reaction(OER)and 168.4 mV for hydrogen evolution reaction(HER)at 10 mA cm−2 current density along with 30 h of unhinged chronopotentiometric stability performance for both HER and OER.Hence,a unique metal chalcogenide composite electrode/substrate configuration has been proposed as a highly stable electrode material for flexible energy storage and conversion applications.展开更多
Purpose-Hate speech is an expression of intense hatred.Twitter has become a popular analytical tool for the prediction and monitoring of abusive behaviors.Hate speech detection with social media data has witnessed spe...Purpose-Hate speech is an expression of intense hatred.Twitter has become a popular analytical tool for the prediction and monitoring of abusive behaviors.Hate speech detection with social media data has witnessed special research attention in recent studies,hence,the need to design a generic metadata architecture and efficient feature extraction technique to enhance hate speech detection.Design/methodology/approach-This study proposes a hybrid embeddings enhanced with a topic inference method and an improved cuckoo search neural network for hate speech detection in Twitter data.The proposed method uses a hybrid embeddings technique that includes Term Frequency-Inverse Document Frequency(TF-IDF)for word-level feature extraction and Long Short Term Memory(LSTM)which is a variant of recurrent neural networks architecture for sentence-level feature extraction.The extracted features from the hybrid embeddings then serve as input into the improved cuckoo search neural network for the prediction of a tweet as hate speech,offensive language or neither.Findings-The proposed method showed better results when tested on the collected Twitter datasets compared to other related methods.In order to validate the performances of the proposed method,t-test and post hoc multiple comparisons were used to compare the significance and means of the proposed method with other related methods for hate speech detection.Furthermore,Paired Sample t-Test was also conducted to validate the performances of the proposed method with other related methods.Research limitations/implications-Finally,the evaluation results showed that the proposed method outperforms other related methods with mean F1-score of 91.3.Originality/value-The main novelty of this study is the use of an automatic topic spotting measure based on na€ıve Bayes model to improve features representation.展开更多
We study embeddings of spaces of Besov-Morrey type, MB p1^s1 q1^r1(R^d)→MB p2^s2 q2^r2(R^d) and obtain necessary and sufficient conditions for this. Moreover, we can also charaeterise the special weighted situat...We study embeddings of spaces of Besov-Morrey type, MB p1^s1 q1^r1(R^d)→MB p2^s2 q2^r2(R^d) and obtain necessary and sufficient conditions for this. Moreover, we can also charaeterise the special weighted situation Bp1^s1 (R^d ,w)→MB p2^s2 q2^r2(R^d) for a Muekenhoupt A∞ weight w, with wα(x) = |x|^a, 〉 -d, as a typical example.展开更多
New embeddings of some weighted Sobolev spaces with weights a(x)and b(x)are established.The weights a(x)and b(x)can be singular.Some applications of these embeddings to a class of degenerate elliptic problems of the f...New embeddings of some weighted Sobolev spaces with weights a(x)and b(x)are established.The weights a(x)and b(x)can be singular.Some applications of these embeddings to a class of degenerate elliptic problems of the form-div(a(x)?u)=b(x)f(x,u)in?,u=0 on??,where?is a bounded or unbounded domain in RN,N 2,are presented.The main results of this paper also give some generalizations of the well-known Caffarelli-Kohn-Nirenberg inequality.展开更多
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in...Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information undetectable.To enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover modification.In this paper,a novel encrypted communication scheme for image SWE is proposed.It reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer domains.By employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be identified.The receiver can restore the secretmessage fromthe received image using only the list header position information.The scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover image.It boasts high concealment and security,along with a complete message restoration rate,making it resistant to steganalysis.Furthermore,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of robustness.To validate the proposed framework,practical tests and comparisons are conducted using multiple datasets.The results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks.展开更多
A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete...A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality.展开更多
Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into ...Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography.展开更多
文摘One of the critical hurdles, and breakthroughs, in the field of Natural Language Processing (NLP) in the last two decades has been the development of techniques for text representation that solves the so-called curse of dimensionality, a problem which plagues NLP in general given that the feature set for learning starts as a function of the size of the language in question, upwards of hundreds of thousands of terms typically. As such, much of the research and development in NLP in the last two decades has been in finding and optimizing solutions to this problem, to feature selection in NLP effectively. This paper looks at the development of these various techniques, leveraging a variety of statistical methods which rest on linguistic theories that were advanced in the middle of the last century, namely the distributional hypothesis which suggests that words that are found in similar contexts generally have similar meanings. In this survey paper we look at the development of some of the most popular of these techniques from a mathematical as well as data structure perspective, from Latent Semantic Analysis to Vector Space Models to their more modern variants which are typically referred to as word embeddings. In this review of algoriths such as Word2Vec, GloVe, ELMo and BERT, we explore the idea of semantic spaces more generally beyond applicability to NLP.
文摘The writer identification system identifies individuals based on their handwriting is a frequent topic in biometric authentication and verification systems.Due to its importance,numerous studies have been conducted in various languages.Researchers have established several learning methods for writer identification including supervised and unsupervised learning.However,supervised methods require a large amount of annotation data,which is impossible in most scenarios.On the other hand,unsupervised writer identification methods may be limited and dependent on feature extraction that cannot provide the proper objectives to the architecture and be misinterpreted.This paper introduces an unsupervised writer identification system that analyzes the data and recognizes the writer based on the inter-feature relations of the data to resolve the uncertainty of the features.A pairwise architecturebased Autoembedder was applied to generate clusterable embeddings for handwritten text images.Furthermore,the trained baseline architecture generates the embedding of the data image,and the K-means algorithm is used to distinguish the embedding of individual writers.The proposed model utilized the IAM dataset for the experiment as it is inconsistent with contributions from the authors but is easily accessible for writer identification tasks.In addition,traditional evaluation metrics are used in the proposed model.Finally,the proposed model is compared with a few unsupervised models,and it outperformed the state-of-the-art deep convolutional architectures in recognizing writers based on unlabeled data.
文摘随着民航经济的发展和人民生活水平的提高,旅客出行的服务要求越来越高,而当前传统的民航客服知识库检索普遍存在检索准确率以及效率低的问题,已经不能满足旅客的服务需求。文章通过结合Best Match 25算法、文本Embeddings和交叉编码器对知识库进行检索,高效检索出符合座席意图的答案,进而提升民航客服知识库查找效率,缩短座席通话查询时长,提升旅客服务体验,助力实现民航客服数字化、智能化转型。
基金This research was supported by Korea Institute for Advancement of Technology(KIAT)grant funded by the Korea Government(MOTIE)(P0012724,The Competency Development Program for Industry Specialist)and the Soonchunhyang University Research Fund.
文摘The substantial competition among the news industries puts editors under the pressure of posting news articleswhich are likely to gain more user attention. Anticipating the popularity of news articles can help the editorial teamsin making decisions about posting a news article. Article similarity extracted from the articles posted within a smallperiod of time is found to be a useful feature in existing popularity prediction approaches. This work proposesa new approach to estimate the popularity of news articles by adding semantics in the article similarity basedapproach of popularity estimation. A semantically enriched model is proposed which estimates news popularity bymeasuring cosine similarity between document embeddings of the news articles. Word2vec model has been used togenerate distributed representations of the news content. In this work, we define popularity as the number of timesa news article is posted on different websites. We collect data from different websites that post news concerning thedomain of cybersecurity and estimate the popularity of cybersecurity news. The proposed approach is comparedwith different models and it is shown that it outperforms the other models.
基金supported by the Key R&D Program Project of Zhejiang Province under Grant no.2019 C01004 and 2021C02004.
文摘Purpose:Due to the incompleteness nature of knowledge graphs(KGs),the task of predicting missing links between entities becomes important.Many previous approaches are static,this posed a notable problem that all meanings of a polysemous entity share one embedding vector.This study aims to propose a polysemous embedding approach,named KG embedding under relational contexts(ContE for short),for missing link prediction.Design/methodology/approach:ContE models and infers different relationship patterns by considering the context of the relationship,which is implicit in the local neighborhood of the relationship.The forward and backward impacts of the relationship in ContE are mapped to two different embedding vectors,which represent the contextual information of the relationship.Then,according to the position of the entity,the entity’s polysemous representation is obtained by adding its static embedding vector to the corresponding context vector of the relationship.Findings:ContE is a fully expressive,that is,given any ground truth over the triples,there are embedding assignments to entities and relations that can precisely separate the true triples from false ones.ContE is capable of modeling four connectivity patterns such as symmetry,antisymmetry,inversion and composition.Research limitations:ContE needs to do a grid search to find best parameters to get best performance in practice,which is a time-consuming task.Sometimes,it requires longer entity vectors to get better performance than some other models.Practical implications:ContE is a bilinear model,which is a quite simple model that could be applied to large-scale KGs.By considering contexts of relations,ContE can distinguish the exact meaning of an entity in different triples so that when performing compositional reasoning,it is capable to infer the connectivity patterns of relations and achieves good performance on link prediction tasks.Originality/value:ContE considers the contexts of entities in terms of their positions in triples and the relationships they link to.It decomposes a relation vector into two vectors,namely,forward impact vector and backward impact vector in order to capture the relational contexts.ContE has the same low computational complexity as TransE.Therefore,it provides a new approach for contextualized knowledge graph embedding.
文摘In this paper, the authors discuss the upper bound for the genus of strong embeddings for 3-connected planar graphs on higher surfaces. It is shown that the problem of determining the upper bound for the strong embedding of 3-connected planar near-triangulations on higher non-orientable surfaces is NP-hard. As a corollary, a theorem of Richter, Seymour and Siran about the strong embedding of 3-connected planar graphs is generalized to orientable surface.
文摘In this paper, it is shown that for every maximal planar graph G=(V,E) , a strong embedding on some non orientable surface with genus at most |V(G)|-22 is admitted such that the surface dual of G is also a planar graph. As a corollary, an interpolation theorem for strong embeddings of G on non orientable surfaces is obtained.
基金Supported by the NNSF of China(10671073)Supported by the NSF of Jiangsu’s Universities( 07KJB110090)
文摘In this paper we show that the face-width of any embedding of a Halin graph(a type of planar graph) in the torus is one, and give a formula for determining the number of all nonequivalent embeddings of a Halin graph in the torus.
基金Partially supported by NSF DMS(Grant No.1801915)。
文摘We establish an explicit embedding of a quantum affine sl_(n) into a quantum affine sl_(n)+1.This embedding serves as a common generalization of two natural,but seemingly unrelated,embed-dings,one on the quantum affine Schur algebra level and the other on the non-quantum level.The embedding on the quantum affine Schur algebras is used extensively in the analysis of canonical bases of quantum affine sln and gl_(n).The embedding on the non-quantum level is used crucially in a work of Riche and Williamson on the study of modular representation theory of general linear groups over a finite field.The same embedding is also used in a work of Maksimau on the categorical representations of affine general linear algebras.We further provide a more natural compatibility statement of the em-bedding on the idempotent version with that on the quantum affine Schur algebra level.A gl_(n)-variant of the embedding is also established.
文摘The article “Time-series embeddings from language models: A tool for wind direction nowcasting”, written by Décio ALVES, Fábio MENDON?A, Sheikh Shanawaz MOSTAFA, and Fernando MORGADO-DIAS was originally published electronically on the publisher's internet portal on 9 July 2024 without open access.
基金supported by National Natural Science Foundation of China(Grant Nos.11931011 and 11901407)New Cornerstone Investigator Program and the Science Development Project of Sichuan University(Grant No 2020SCUNL201).
文摘In this paper,we study Sobolev spaces in infinite dimensions and the corresponding embedding theorems.Our underlying spaces areℓ^(r)for r ∈[1,∞),equipped with corresponding probability measures.For the weighted Sobolev space W_(b)^(1,p)(ℓ^(r),γa)with a weight a∈ℓ^(r)of the Gaussian measureγa and a gradient weight b∈l^(∞),we characterize the relation between the weights(a and b)and the continuous(resp.compact)log-Sobolev embedding for p∈[1,∞)(resp.p∈(1,∞)).Several counterexamples are also constructed,which are of independent interest.
基金Supported by National Natural Science Foundation of China(Grant Nos.12126329,12171266,12126346,12101234)Simons Foundation(Grant No.585081)+6 种基金Educational Commission of Fujian Province(Grant No.JAT190589)Natural Science Foundation of Fujian Province(Grant No.2021J05237)the research start-up fund of Jimei University(Grant No.ZQ2021017)the research start-up fund of Putian University(Grant No.2020002)the Natural Science Foundation of Hebei Province(Grant No.A2022502010)the Fundamental Research Funds for the Central Universities(Grant No.2023MS164)the Natural Science Foundation of Fujian Province(Grant No.2023J01805)。
文摘Let X and Y be two pointed metric spaces.In this article,we give a generalization of the Cheng-Dong-Zhang theorem for coarse Lipschitz embeddings as follows:If f:X→Y is a standard coarse Lipschitz embedding,then for each x^(*)∈Lip_(0)(X)there existα,γ>0 depending only on f and Q_(x)*∈Lip_(0)(Y)with‖Q_(x)*‖_(Lip)≤α‖x^(*)‖_(Lip)such that|Q_(x)*f(x)-x^(*)(x)|≤γ‖x^(*)‖_(Lip),for all x∈X.Coarse stability for a pair of metric spaces is studied.This can be considered as a coarse version of Qian Problem.As an application,we give candidate negative answers to a 58-year old problem by Lindenstrauss asking whether every Banach space is a Lipschitz retract of its bidual.Indeed,we show that X is not a Lipschitz retract of its bidual if X is a universally left-coarsely stable space but not an absolute cardinality-Lipschitz retract.If there exists a universally right-coarsely stable Banach space with the RNP but not isomorphic to any Hilbert space,then the problem also has a negative answer for a separable space.
基金supported by the Basic Science Research Program through the National Research Foundation of Korea(NRF)grant funded by the Korean government(MSIT)(2021R1A4A2000934).
文摘The metal-organic framework(MOF)derived Ni–Co–C–N composite alloys(NiCCZ)were“embedded”inside the carbon cloth(CC)strands as opposed to the popular idea of growing them upward to realize ultrastable energy storage and conversion application.The NiCCZ was then oxygen functionalized,facilitating the next step of stoichiometric sulfur anion diffusion during hydrothermal sulfurization,generating a flower-like metal hydroxysulfide structure(NiCCZOS)with strong partial implantation inside CC.Thus obtained NiCCZOS shows an excellent capacity when tested as a supercapacitor electrode in a three-electrode configuration.Moreover,when paired with the biomass-derived nitrogen-rich activated carbon,the asymmetric supercapacitor device shows almost 100%capacity retention even after 45,000 charge–discharge cycles with remarkable energy density(59.4 Wh kg^(-1)/263.8μWh cm^(–2))owing to a uniquely designed cathode.Furthermore,the same electrode performed as an excellent bifunctional water-splitting electrocatalyst with an overpotential of 271 mV for oxygen evolution reaction(OER)and 168.4 mV for hydrogen evolution reaction(HER)at 10 mA cm−2 current density along with 30 h of unhinged chronopotentiometric stability performance for both HER and OER.Hence,a unique metal chalcogenide composite electrode/substrate configuration has been proposed as a highly stable electrode material for flexible energy storage and conversion applications.
文摘Purpose-Hate speech is an expression of intense hatred.Twitter has become a popular analytical tool for the prediction and monitoring of abusive behaviors.Hate speech detection with social media data has witnessed special research attention in recent studies,hence,the need to design a generic metadata architecture and efficient feature extraction technique to enhance hate speech detection.Design/methodology/approach-This study proposes a hybrid embeddings enhanced with a topic inference method and an improved cuckoo search neural network for hate speech detection in Twitter data.The proposed method uses a hybrid embeddings technique that includes Term Frequency-Inverse Document Frequency(TF-IDF)for word-level feature extraction and Long Short Term Memory(LSTM)which is a variant of recurrent neural networks architecture for sentence-level feature extraction.The extracted features from the hybrid embeddings then serve as input into the improved cuckoo search neural network for the prediction of a tweet as hate speech,offensive language or neither.Findings-The proposed method showed better results when tested on the collected Twitter datasets compared to other related methods.In order to validate the performances of the proposed method,t-test and post hoc multiple comparisons were used to compare the significance and means of the proposed method with other related methods for hate speech detection.Furthermore,Paired Sample t-Test was also conducted to validate the performances of the proposed method with other related methods.Research limitations/implications-Finally,the evaluation results showed that the proposed method outperforms other related methods with mean F1-score of 91.3.Originality/value-The main novelty of this study is the use of an automatic topic spotting measure based on na€ıve Bayes model to improve features representation.
文摘We study embeddings of spaces of Besov-Morrey type, MB p1^s1 q1^r1(R^d)→MB p2^s2 q2^r2(R^d) and obtain necessary and sufficient conditions for this. Moreover, we can also charaeterise the special weighted situation Bp1^s1 (R^d ,w)→MB p2^s2 q2^r2(R^d) for a Muekenhoupt A∞ weight w, with wα(x) = |x|^a, 〉 -d, as a typical example.
基金supported by National Natural Science Foundation of China (Grant Nos. 11171092, 11571093 and 11371117)
文摘New embeddings of some weighted Sobolev spaces with weights a(x)and b(x)are established.The weights a(x)and b(x)can be singular.Some applications of these embeddings to a class of degenerate elliptic problems of the form-div(a(x)?u)=b(x)f(x,u)in?,u=0 on??,where?is a bounded or unbounded domain in RN,N 2,are presented.The main results of this paper also give some generalizations of the well-known Caffarelli-Kohn-Nirenberg inequality.
基金supported in part by the National Natural Science Foundation of China(Nos.62372083,62072074,62076054,62027827,62002047)the Sichuan Science and Technology Innovation Platform and Talent Plan(No.2022JDJQ0039)+2 种基金the Sichuan Science and Technology Support Plan(Nos.2024NSFTD0005,2022YFQ0045,2022YFS0220,2023YFS0020,2023YFS0197,2023YFG0148)the CCF-Baidu Open Fund(No.202312)the Medico-Engineering Cooperation Funds from University of Electronic Science and Technology of China(Nos.ZYGX2021YGLH212,ZYGX2022YGRH012).
文摘Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information undetectable.To enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover modification.In this paper,a novel encrypted communication scheme for image SWE is proposed.It reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer domains.By employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be identified.The receiver can restore the secretmessage fromthe received image using only the list header position information.The scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover image.It boasts high concealment and security,along with a complete message restoration rate,making it resistant to steganalysis.Furthermore,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of robustness.To validate the proposed framework,practical tests and comparisons are conducted using multiple datasets.The results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks.
基金supported by the Key Area R&D Program of Guangdong Province (Grant No.2022B0701180001)the National Natural Science Foundation of China (Grant No.61801127)+1 种基金the Science Technology Planning Project of Guangdong Province,China (Grant Nos.2019B010140002 and 2020B111110002)the Guangdong-Hong Kong-Macao Joint Innovation Field Project (Grant No.2021A0505080006)。
文摘A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality.
基金This research was funded by the Ministry of Higher Education(MOHE)through Fundamental Research Grant Scheme(FRGS)under the Grand Number FRGS/1/2020/ICT01/UK M/02/4,and University Kebangsaan Malaysia for open access publication.
文摘Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography.