Software project outcomes heavily depend on natural language requirements,often causing diverse interpretations and issues like ambiguities and incomplete or faulty requirements.Researchers are exploring machine learn...Software project outcomes heavily depend on natural language requirements,often causing diverse interpretations and issues like ambiguities and incomplete or faulty requirements.Researchers are exploring machine learning to predict software bugs,but a more precise and general approach is needed.Accurate bug prediction is crucial for software evolution and user training,prompting an investigation into deep and ensemble learning methods.However,these studies are not generalized and efficient when extended to other datasets.Therefore,this paper proposed a hybrid approach combining multiple techniques to explore their effectiveness on bug identification problems.The methods involved feature selection,which is used to reduce the dimensionality and redundancy of features and select only the relevant ones;transfer learning is used to train and test the model on different datasets to analyze how much of the learning is passed to other datasets,and ensemble method is utilized to explore the increase in performance upon combining multiple classifiers in a model.Four National Aeronautics and Space Administration(NASA)and four Promise datasets are used in the study,showing an increase in the model’s performance by providing better Area Under the Receiver Operating Characteristic Curve(AUC-ROC)values when different classifiers were combined.It reveals that using an amalgam of techniques such as those used in this study,feature selection,transfer learning,and ensemble methods prove helpful in optimizing the software bug prediction models and providing high-performing,useful end mode.展开更多
The epidemic characters of Omicron(e.g.large-scale transmission)are significantly different from the initial variants of COVID-19.The data generated by large-scale transmission is important to predict the trend of epi...The epidemic characters of Omicron(e.g.large-scale transmission)are significantly different from the initial variants of COVID-19.The data generated by large-scale transmission is important to predict the trend of epidemic characters.However,the re-sults of current prediction models are inaccurate since they are not closely combined with the actual situation of Omicron transmission.In consequence,these inaccurate results have negative impacts on the process of the manufacturing and the service industry,for example,the production of masks and the recovery of the tourism industry.The authors have studied the epidemic characters in two ways,that is,investigation and prediction.First,a large amount of data is collected by utilising the Baidu index and conduct questionnaire survey concerning epidemic characters.Second,theβ-SEIDR model is established,where the population is classified as Susceptible,Exposed,Infected,Dead andβ-Recovered persons,to intelligently predict the epidemic characters of COVID-19.Note thatβ-Recovered persons denote that the Recovered persons may become Sus-ceptible persons with probabilityβ.The simulation results show that the model can accurately predict the epidemic characters.展开更多
Offshore carbon dioxide(CO_(2)) geological storage(OCGS) represents a significant strategy for addressing climate change by curtailing greenhouse gas emissions. Nonetheless, the risk of CO_(2) leakage poses a substant...Offshore carbon dioxide(CO_(2)) geological storage(OCGS) represents a significant strategy for addressing climate change by curtailing greenhouse gas emissions. Nonetheless, the risk of CO_(2) leakage poses a substantial concern associated with this technology. This study introduces an innovative approach for establishing OCGS leakage scenarios, involving four pivotal stages, namely, interactive matrix establishment, risk matrix evaluation, cause–effect analysis, and scenario development, which has been implemented in the Pearl River Estuary Basin in China. The initial phase encompassed the establishment of an interaction matrix for OCGS systems based on features, events, and processes. Subsequent risk matrix evaluation and cause–effect analysis identified key system components, specifically CO_(2) injection and faults/features. Building upon this analysis, two leakage risk scenarios were successfully developed, accompanied by the corresponding mitigation measures. In addition, this study introduces the application of scenario development to risk assessment, including scenario numerical simulation and quantitative assessment. Overall, this research positively contributes to the sustainable development and safe operation of OCGS projects and holds potential for further refinement and broader application to diverse geographical environments and project requirements. This comprehensive study provides valuable insights into the establishment of OCGS leakage scenarios and demonstrates their practical application to risk assessment, laying the foundation for promoting the sustainable development and safe operation of ocean CO_(2) geological storage projects while proposing possibilities for future improvements and broader applications to different contexts.展开更多
Visual Question Answering(VQA)has sparked widespread interest as a crucial task in integrating vision and language.VQA primarily uses attention mechanisms to effectively answer questions to associate relevant visual r...Visual Question Answering(VQA)has sparked widespread interest as a crucial task in integrating vision and language.VQA primarily uses attention mechanisms to effectively answer questions to associate relevant visual regions with input questions.The detection-based features extracted by the object detection network aim to acquire the visual attention distribution on a predetermined detection frame and provide object-level insights to answer questions about foreground objects more effectively.However,it cannot answer the question about the background forms without detection boxes due to the lack of fine-grained details,which is the advantage of grid-based features.In this paper,we propose a Dual-Level Feature Embedding(DLFE)network,which effectively integrates grid-based and detection-based image features in a unified architecture to realize the complementary advantages of both features.Specifically,in DLFE,In DLFE,firstly,a novel Dual-Level Self-Attention(DLSA)modular is proposed to mine the intrinsic properties of the two features,where Positional Relation Attention(PRA)is designed to model the position information.Then,we propose a Feature Fusion Attention(FFA)to address the semantic noise caused by the fusion of two features and construct an alignment graph to enhance and align the grid and detection features.Finally,we use co-attention to learn the interactive features of the image and question and answer questions more accurately.Our method has significantly improved compared to the baseline,increasing accuracy from 66.01%to 70.63%on the test-std dataset of VQA 1.0 and from 66.24%to 70.91%for the test-std dataset of VQA 2.0.展开更多
To address the current issues of inaccurate segmentation and the limited applicability of segmentation methods for building facades in point clouds, we propose a facade segmentation algorithm based on optimal dual-sca...To address the current issues of inaccurate segmentation and the limited applicability of segmentation methods for building facades in point clouds, we propose a facade segmentation algorithm based on optimal dual-scale feature descriptors. First, we select the optimal dual-scale descriptors from a range of feature descriptors. Next, we segment the facade according to the threshold value of the chosen optimal dual-scale descriptors. Finally, we use RANSAC (Random Sample Consensus) to fit the segmented surface and optimize the fitting result. Experimental results show that, compared to commonly used facade segmentation algorithms, the proposed method yields more accurate segmentation results, providing a robust data foundation for subsequent 3D model reconstruction of buildings.展开更多
Single-cell RNA-sequencing(scRNA-seq)is a rapidly increasing research area in biomed-ical signal processing.However,the high complexity of single-cell data makes efficient and accurate analysis difficult.To improve th...Single-cell RNA-sequencing(scRNA-seq)is a rapidly increasing research area in biomed-ical signal processing.However,the high complexity of single-cell data makes efficient and accurate analysis difficult.To improve the performance of single-cell RNA data processing,two single-cell features calculation method and corresponding dual-input neural network structures are proposed.In this feature extraction and fusion scheme,the features at the cluster level are extracted by hier-archical clustering and differential gene analysis,and the features at the cell level are extracted by the calculation of gene frequency and cross cell frequency.Our experiments on COVID-19 data demonstrate that the combined use of these two feature achieves great results and high robustness for classification tasks.展开更多
As deep learning techniques are increasingly applied with greater depth and sophistication in the food industry,the realm of food image processing has progressively emerged as a central focus of research interest.This...As deep learning techniques are increasingly applied with greater depth and sophistication in the food industry,the realm of food image processing has progressively emerged as a central focus of research interest.This work provides an overview of key practices in food image processing techniques,detailing common processing tasks including classification,recognition,detection,segmentation,and image retrieval,as well as outlining metrics for evaluating task performance and thoroughly examining existing food image datasets,along with specialized food-related datasets.In terms of methodology,this work offers insight into the evolution of food image processing,tracing its development from traditional methods extracting low and intermediate-level features to advanced deep learning techniques for high-level feature extraction,along with some synergistic fusion of these approaches.It is believed that these methods will play a significant role in practical application scenarios such as self-checkout systems,dietary health management,intelligent food service,disease etiology tracing,chronic disease management,and food safety monitoring.However,due to the complex content and various types of distortions in food images,further improvements in related methods are needed to meet the requirements of practical applications in the future.It is believed that this study can help researchers to further understand the research in the field of food imaging and provide some contribution to the advancement of research in this field.展开更多
One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelli...One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelligence (AI) havebecome the basis for making strategic decisions in many sensitive areas, such as fraud detection, risk management,medical diagnosis, and counter-terrorism. However, there is still a need to assess how terrorist attacks are related,initiated, and detected. For this purpose, we propose a novel framework for classifying and predicting terroristattacks. The proposed framework posits that neglected text attributes included in the Global Terrorism Database(GTD) can influence the accuracy of the model’s classification of terrorist attacks, where each part of the datacan provide vital information to enrich the ability of classifier learning. Each data point in a multiclass taxonomyhas one or more tags attached to it, referred as “related tags.” We applied machine learning classifiers to classifyterrorist attack incidents obtained from the GTD. A transformer-based technique called DistilBERT extracts andlearns contextual features from text attributes to acquiremore information from text data. The extracted contextualfeatures are combined with the “key features” of the dataset and used to perform the final classification. Thestudy explored different experimental setups with various classifiers to evaluate the model’s performance. Theexperimental results show that the proposed framework outperforms the latest techniques for classifying terroristattacks with an accuracy of 98.7% using a combined feature set and extreme gradient boosting classifier.展开更多
As a dynamic projection to latent structures(PLS)method with a good output prediction ability,dynamic inner PLS(DiPLS)is widely used in the prediction of key performance indi-cators.However,due to the oblique decompos...As a dynamic projection to latent structures(PLS)method with a good output prediction ability,dynamic inner PLS(DiPLS)is widely used in the prediction of key performance indi-cators.However,due to the oblique decomposition of the input space by DiPLS,there are false alarms in the actual industrial process during fault detection.To address the above problems,a dynamic modeling method based on autoregressive-dynamic inner total PLS(AR-DiTPLS)is proposed.The method first uses the regression relation matrix to decompose the input space orthogonally,which reduces useless information for the predic-tion output in the quality-related dynamic subspace.Then,a vector autoregressive model(VAR)is constructed for the predic-tion score to separate dynamic information and static informa-tion.Based on the VAR model,appropriate statistical indicators are further constructed for online monitoring,which reduces the occurrence of false alarms.The effectiveness of the method is verified by a Tennessee-Eastman industrial simulation process and a three-phase flow system.展开更多
The authenticity identification of anti-counterfeiting codes based on mobile phone platforms is affected by lighting environment,photographing habits,camera resolution and other factors,resulting in poor collection qu...The authenticity identification of anti-counterfeiting codes based on mobile phone platforms is affected by lighting environment,photographing habits,camera resolution and other factors,resulting in poor collection quality of anti-counterfeiting codes and weak differentiation of anti-counterfeiting codes for high-quality counterfeits.Developing an anticounterfeiting code authentication algorithm based on mobile phones is of great commercial value.Although the existing algorithms developed based on special equipment can effectively identify forged anti-counterfeiting codes,the anti-counterfeiting code identification scheme based on mobile phones is still in its infancy.To address the small differences in texture features,low response speed and excessively large deep learning models used in mobile phone anti-counterfeiting and identification scenarios,we propose a feature-guided double pool attention network(FG-DPANet)to solve the reprinting forgery problem of printing anti-counterfeiting codes.To address the slight differences in texture features in high-quality reprinted anti-counterfeiting codes,we propose a feature guidance algorithm that creatively combines the texture features and the inherent noise feature of the scanner and printer introduced in the reprinting process to identify anti-counterfeiting code authenticity.The introduction of noise features effectively makes up for the small texture difference of high-quality anti-counterfeiting codes.The double pool attention network(DPANet)is a lightweight double pool attention residual network.Under the condition of ensuring detection accuracy,DPANet can simplify the network structure as much as possible,improve the network reasoning speed,and run better on mobile devices with low computing power.We conducted a series of experiments to evaluate the FG-DPANet proposed in this paper.Experimental results show that the proposed FG-DPANet can resist highquality and small-size anti-counterfeiting code reprint forgery.By comparing with the existing algorithm based on texture,it is shown that the proposed method has a higher authentication accuracy.Last but not least,the proposed scheme has been evaluated in the anti-counterfeiting code blurring scene,and the results show that our proposed method can well resist slight blurring of anti-counterfeiting images.展开更多
A novel technique for automatic seismic data processing using both integral and local feature of seismograms was presented in this paper. Here, the term integral feature of seismograms refers to feature which may depi...A novel technique for automatic seismic data processing using both integral and local feature of seismograms was presented in this paper. Here, the term integral feature of seismograms refers to feature which may depict the shape of the whole seismograms. However, unlike some previous efforts which completely abandon the DIAL approach, i.e., signal detection, phase identifi- cation, association, and event localization, and seek to use envelope cross-correlation to detect seismic events directly, our technique keeps following the DIAL approach, but in addition to detect signals corresponding to individual seismic phases, it also detects continuous wave-trains and explores their feature for phase-type identification and signal association. More concrete ideas about how to define wave-trains and combine them with various detections, as well as how to measure and utilize their feature in the seismic data processing were expatiated in the paper. This approach has been applied to the routine data processing by us for years, and test results for a 16 days' period using data from the Xinjiang seismic station network were presented. The automatic processing results have fairly low false and missed event rate simultaneously, showing that the new technique has good application prospects for improvement of the automatic seismic data processing.展开更多
Anomaly detection is becoming increasingly significant in industrial cyber security,and different machine-learning algorithms have been generally acknowledged as various effective intrusion detection engines to succes...Anomaly detection is becoming increasingly significant in industrial cyber security,and different machine-learning algorithms have been generally acknowledged as various effective intrusion detection engines to successfully identify cyber attacks.However,different machine-learning algorithms may exhibit their own detection effects even if they analyze the same feature samples.As a sequence,after developing one feature generation approach,the most effective and applicable detection engines should be desperately selected by comparing distinct properties of each machine-learning algorithm.Based on process control features generated by directed function transition diagrams,this paper introduces five different machine-learning algorithms as alternative detection engines to discuss their matching abilities.Furthermore,this paper not only describes some qualitative properties to compare their advantages and disadvantages,but also gives an in-depth and meticulous research on their detection accuracies and consuming time.In the verified experiments,two attack models and four different attack intensities are defined to facilitate all quantitative comparisons,and the impacts of detection accuracy caused by the feature parameter are also comparatively analyzed.All experimental results can clearly explain that SVM(Support Vector Machine)and WNN(Wavelet Neural Network)are suggested as two applicable detection engines under differing cases.展开更多
A topic studied in cartography is to make the extraction of cartographic features that provide the update of cartographic maps more easily. For this reason many automatic routines were created with the intent to perfo...A topic studied in cartography is to make the extraction of cartographic features that provide the update of cartographic maps more easily. For this reason many automatic routines were created with the intent to perform the features extraction. Despite of all studies about this, some features cannot be found by the algorithm or it can extract some pixels unduly. So the current article aims to show the results with the software development that uses the original and reference image to calculate some statistics about the extraction process. Furthermore, the calculated statistics can be used to evaluate the extraction process.展开更多
In industrial process control systems,there is overwhelming evidence corroborating the notion that economic or technical limitations result in some key variables that are very difficult to measure online.The data-driv...In industrial process control systems,there is overwhelming evidence corroborating the notion that economic or technical limitations result in some key variables that are very difficult to measure online.The data-driven soft sensor is an effective solution because it provides a reliable and stable online estimation of such variables.This paper employs a deep neural network with multiscale feature extraction layers to build soft sensors,which are applied to the benchmarked Tennessee-Eastman process(TEP)and a real wind farm case.The comparison of modelling results demonstrates that the multiscale feature extraction layers have the following advantages over other methods.First,the multiscale feature extraction layers significantly reduce the number of parameters compared to the other deep neural networks.Second,the multiscale feature extraction layers can powerfully extract dataset characteristics.Finally,the multiscale feature extraction layers with fully considered historical measurements can contain richer useful information and improved representation compared to traditional data-driven models.展开更多
Feature based design has been regarded as a promising approach for CAD/CAM integration.This paper aims to establish a domain independent representation formalism for feature based design in three aspects: formal re...Feature based design has been regarded as a promising approach for CAD/CAM integration.This paper aims to establish a domain independent representation formalism for feature based design in three aspects: formal representation,design process model and design algorithm.The implementing scheme and formal description of feature taxonomy,feature operator,feature model validation and feature transformation are given in the paper.The feature based design process model suited for either sequencial or concurrent engineering is proposed and its application to product structural design and process plan design is presented. Some general design algorithms for developing feature based design system are also addressed.The proposed scheme provides a formal methodology elementary for feature based design system development and operation in a structural way.展开更多
The adaptability of features definition to applications is an essential condition for implementing feature based design. This paper makes attempt to present a hierarchical definition structure of features. The propos...The adaptability of features definition to applications is an essential condition for implementing feature based design. This paper makes attempt to present a hierarchical definition structure of features. The proposed scheme divides feature definition into application level, form level and geometric level, and provides links between different levels with feature semantics interpretation and enhanced geometric face adjacent graph. respectively. The results not only enable feature definition to abate from the specific dependence and become more extensive, but also provide a theoretical foundation for establishing the concurrent feature based design process model.展开更多
多模态数据处理是一个重要的研究领域,它可以通过结合文本、图像等多种信息来提高模型性能.然而,由于不同模态之间的异构性以及信息融合的挑战,设计有效的多模态分类模型仍然是一个具有挑战性的问题.本文提出了一种新的多模态分类模型—...多模态数据处理是一个重要的研究领域,它可以通过结合文本、图像等多种信息来提高模型性能.然而,由于不同模态之间的异构性以及信息融合的挑战,设计有效的多模态分类模型仍然是一个具有挑战性的问题.本文提出了一种新的多模态分类模型——MCM-ICE,它通过联合独立编码和协同编码策略来解决特征表示和特征融合的挑战.MCM-ICE在Fashion-Gen和Hateful Memes Challenge两个数据集上进行了实验,结果表明该模型在这两项任务中均优于现有的最先进方法.本文还探究了协同编码模块Transformer输出层的不同向量选取对结果的影响,结果表明选取[CLS]向量和去除[CLS]的向量的平均池化向量可以获得最佳结果.消融研究和探索性分析支持了MCM-ICE模型在处理多模态分类任务方面的有效性.展开更多
基金This Research is funded by Researchers Supporting Project Number(RSPD2024R947),King Saud University,Riyadh,Saudi Arabia.
文摘Software project outcomes heavily depend on natural language requirements,often causing diverse interpretations and issues like ambiguities and incomplete or faulty requirements.Researchers are exploring machine learning to predict software bugs,but a more precise and general approach is needed.Accurate bug prediction is crucial for software evolution and user training,prompting an investigation into deep and ensemble learning methods.However,these studies are not generalized and efficient when extended to other datasets.Therefore,this paper proposed a hybrid approach combining multiple techniques to explore their effectiveness on bug identification problems.The methods involved feature selection,which is used to reduce the dimensionality and redundancy of features and select only the relevant ones;transfer learning is used to train and test the model on different datasets to analyze how much of the learning is passed to other datasets,and ensemble method is utilized to explore the increase in performance upon combining multiple classifiers in a model.Four National Aeronautics and Space Administration(NASA)and four Promise datasets are used in the study,showing an increase in the model’s performance by providing better Area Under the Receiver Operating Characteristic Curve(AUC-ROC)values when different classifiers were combined.It reveals that using an amalgam of techniques such as those used in this study,feature selection,transfer learning,and ensemble methods prove helpful in optimizing the software bug prediction models and providing high-performing,useful end mode.
基金Key discipline construction project for traditional Chinese Medicine in Guangdong province,Grant/Award Number:20220104The construction project of inheritance studio of national famous and old traditional Chinese Medicine experts,Grant/Award Number:140000020132。
文摘The epidemic characters of Omicron(e.g.large-scale transmission)are significantly different from the initial variants of COVID-19.The data generated by large-scale transmission is important to predict the trend of epidemic characters.However,the re-sults of current prediction models are inaccurate since they are not closely combined with the actual situation of Omicron transmission.In consequence,these inaccurate results have negative impacts on the process of the manufacturing and the service industry,for example,the production of masks and the recovery of the tourism industry.The authors have studied the epidemic characters in two ways,that is,investigation and prediction.First,a large amount of data is collected by utilising the Baidu index and conduct questionnaire survey concerning epidemic characters.Second,theβ-SEIDR model is established,where the population is classified as Susceptible,Exposed,Infected,Dead andβ-Recovered persons,to intelligently predict the epidemic characters of COVID-19.Note thatβ-Recovered persons denote that the Recovered persons may become Sus-ceptible persons with probabilityβ.The simulation results show that the model can accurately predict the epidemic characters.
文摘Offshore carbon dioxide(CO_(2)) geological storage(OCGS) represents a significant strategy for addressing climate change by curtailing greenhouse gas emissions. Nonetheless, the risk of CO_(2) leakage poses a substantial concern associated with this technology. This study introduces an innovative approach for establishing OCGS leakage scenarios, involving four pivotal stages, namely, interactive matrix establishment, risk matrix evaluation, cause–effect analysis, and scenario development, which has been implemented in the Pearl River Estuary Basin in China. The initial phase encompassed the establishment of an interaction matrix for OCGS systems based on features, events, and processes. Subsequent risk matrix evaluation and cause–effect analysis identified key system components, specifically CO_(2) injection and faults/features. Building upon this analysis, two leakage risk scenarios were successfully developed, accompanied by the corresponding mitigation measures. In addition, this study introduces the application of scenario development to risk assessment, including scenario numerical simulation and quantitative assessment. Overall, this research positively contributes to the sustainable development and safe operation of OCGS projects and holds potential for further refinement and broader application to diverse geographical environments and project requirements. This comprehensive study provides valuable insights into the establishment of OCGS leakage scenarios and demonstrates their practical application to risk assessment, laying the foundation for promoting the sustainable development and safe operation of ocean CO_(2) geological storage projects while proposing possibilities for future improvements and broader applications to different contexts.
文摘Visual Question Answering(VQA)has sparked widespread interest as a crucial task in integrating vision and language.VQA primarily uses attention mechanisms to effectively answer questions to associate relevant visual regions with input questions.The detection-based features extracted by the object detection network aim to acquire the visual attention distribution on a predetermined detection frame and provide object-level insights to answer questions about foreground objects more effectively.However,it cannot answer the question about the background forms without detection boxes due to the lack of fine-grained details,which is the advantage of grid-based features.In this paper,we propose a Dual-Level Feature Embedding(DLFE)network,which effectively integrates grid-based and detection-based image features in a unified architecture to realize the complementary advantages of both features.Specifically,in DLFE,In DLFE,firstly,a novel Dual-Level Self-Attention(DLSA)modular is proposed to mine the intrinsic properties of the two features,where Positional Relation Attention(PRA)is designed to model the position information.Then,we propose a Feature Fusion Attention(FFA)to address the semantic noise caused by the fusion of two features and construct an alignment graph to enhance and align the grid and detection features.Finally,we use co-attention to learn the interactive features of the image and question and answer questions more accurately.Our method has significantly improved compared to the baseline,increasing accuracy from 66.01%to 70.63%on the test-std dataset of VQA 1.0 and from 66.24%to 70.91%for the test-std dataset of VQA 2.0.
文摘To address the current issues of inaccurate segmentation and the limited applicability of segmentation methods for building facades in point clouds, we propose a facade segmentation algorithm based on optimal dual-scale feature descriptors. First, we select the optimal dual-scale descriptors from a range of feature descriptors. Next, we segment the facade according to the threshold value of the chosen optimal dual-scale descriptors. Finally, we use RANSAC (Random Sample Consensus) to fit the segmented surface and optimize the fitting result. Experimental results show that, compared to commonly used facade segmentation algorithms, the proposed method yields more accurate segmentation results, providing a robust data foundation for subsequent 3D model reconstruction of buildings.
文摘Single-cell RNA-sequencing(scRNA-seq)is a rapidly increasing research area in biomed-ical signal processing.However,the high complexity of single-cell data makes efficient and accurate analysis difficult.To improve the performance of single-cell RNA data processing,two single-cell features calculation method and corresponding dual-input neural network structures are proposed.In this feature extraction and fusion scheme,the features at the cluster level are extracted by hier-archical clustering and differential gene analysis,and the features at the cell level are extracted by the calculation of gene frequency and cross cell frequency.Our experiments on COVID-19 data demonstrate that the combined use of these two feature achieves great results and high robustness for classification tasks.
文摘As deep learning techniques are increasingly applied with greater depth and sophistication in the food industry,the realm of food image processing has progressively emerged as a central focus of research interest.This work provides an overview of key practices in food image processing techniques,detailing common processing tasks including classification,recognition,detection,segmentation,and image retrieval,as well as outlining metrics for evaluating task performance and thoroughly examining existing food image datasets,along with specialized food-related datasets.In terms of methodology,this work offers insight into the evolution of food image processing,tracing its development from traditional methods extracting low and intermediate-level features to advanced deep learning techniques for high-level feature extraction,along with some synergistic fusion of these approaches.It is believed that these methods will play a significant role in practical application scenarios such as self-checkout systems,dietary health management,intelligent food service,disease etiology tracing,chronic disease management,and food safety monitoring.However,due to the complex content and various types of distortions in food images,further improvements in related methods are needed to meet the requirements of practical applications in the future.It is believed that this study can help researchers to further understand the research in the field of food imaging and provide some contribution to the advancement of research in this field.
文摘One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelligence (AI) havebecome the basis for making strategic decisions in many sensitive areas, such as fraud detection, risk management,medical diagnosis, and counter-terrorism. However, there is still a need to assess how terrorist attacks are related,initiated, and detected. For this purpose, we propose a novel framework for classifying and predicting terroristattacks. The proposed framework posits that neglected text attributes included in the Global Terrorism Database(GTD) can influence the accuracy of the model’s classification of terrorist attacks, where each part of the datacan provide vital information to enrich the ability of classifier learning. Each data point in a multiclass taxonomyhas one or more tags attached to it, referred as “related tags.” We applied machine learning classifiers to classifyterrorist attack incidents obtained from the GTD. A transformer-based technique called DistilBERT extracts andlearns contextual features from text attributes to acquiremore information from text data. The extracted contextualfeatures are combined with the “key features” of the dataset and used to perform the final classification. Thestudy explored different experimental setups with various classifiers to evaluate the model’s performance. Theexperimental results show that the proposed framework outperforms the latest techniques for classifying terroristattacks with an accuracy of 98.7% using a combined feature set and extreme gradient boosting classifier.
基金supported by the National Natural Science Foundation of China(62273354,61673387,61833016).
文摘As a dynamic projection to latent structures(PLS)method with a good output prediction ability,dynamic inner PLS(DiPLS)is widely used in the prediction of key performance indi-cators.However,due to the oblique decomposition of the input space by DiPLS,there are false alarms in the actual industrial process during fault detection.To address the above problems,a dynamic modeling method based on autoregressive-dynamic inner total PLS(AR-DiTPLS)is proposed.The method first uses the regression relation matrix to decompose the input space orthogonally,which reduces useless information for the predic-tion output in the quality-related dynamic subspace.Then,a vector autoregressive model(VAR)is constructed for the predic-tion score to separate dynamic information and static informa-tion.Based on the VAR model,appropriate statistical indicators are further constructed for online monitoring,which reduces the occurrence of false alarms.The effectiveness of the method is verified by a Tennessee-Eastman industrial simulation process and a three-phase flow system.
基金This work is supported by Supported by the National Key Research and Development Program of China under Grant No.2020YFF0304902the Science and Technology Research Project of Jiangxi Provincial Department of Education under Grant No.GJJ202511。
文摘The authenticity identification of anti-counterfeiting codes based on mobile phone platforms is affected by lighting environment,photographing habits,camera resolution and other factors,resulting in poor collection quality of anti-counterfeiting codes and weak differentiation of anti-counterfeiting codes for high-quality counterfeits.Developing an anticounterfeiting code authentication algorithm based on mobile phones is of great commercial value.Although the existing algorithms developed based on special equipment can effectively identify forged anti-counterfeiting codes,the anti-counterfeiting code identification scheme based on mobile phones is still in its infancy.To address the small differences in texture features,low response speed and excessively large deep learning models used in mobile phone anti-counterfeiting and identification scenarios,we propose a feature-guided double pool attention network(FG-DPANet)to solve the reprinting forgery problem of printing anti-counterfeiting codes.To address the slight differences in texture features in high-quality reprinted anti-counterfeiting codes,we propose a feature guidance algorithm that creatively combines the texture features and the inherent noise feature of the scanner and printer introduced in the reprinting process to identify anti-counterfeiting code authenticity.The introduction of noise features effectively makes up for the small texture difference of high-quality anti-counterfeiting codes.The double pool attention network(DPANet)is a lightweight double pool attention residual network.Under the condition of ensuring detection accuracy,DPANet can simplify the network structure as much as possible,improve the network reasoning speed,and run better on mobile devices with low computing power.We conducted a series of experiments to evaluate the FG-DPANet proposed in this paper.Experimental results show that the proposed FG-DPANet can resist highquality and small-size anti-counterfeiting code reprint forgery.By comparing with the existing algorithm based on texture,it is shown that the proposed method has a higher authentication accuracy.Last but not least,the proposed scheme has been evaluated in the anti-counterfeiting code blurring scene,and the results show that our proposed method can well resist slight blurring of anti-counterfeiting images.
文摘A novel technique for automatic seismic data processing using both integral and local feature of seismograms was presented in this paper. Here, the term integral feature of seismograms refers to feature which may depict the shape of the whole seismograms. However, unlike some previous efforts which completely abandon the DIAL approach, i.e., signal detection, phase identifi- cation, association, and event localization, and seek to use envelope cross-correlation to detect seismic events directly, our technique keeps following the DIAL approach, but in addition to detect signals corresponding to individual seismic phases, it also detects continuous wave-trains and explores their feature for phase-type identification and signal association. More concrete ideas about how to define wave-trains and combine them with various detections, as well as how to measure and utilize their feature in the seismic data processing were expatiated in the paper. This approach has been applied to the routine data processing by us for years, and test results for a 16 days' period using data from the Xinjiang seismic station network were presented. The automatic processing results have fairly low false and missed event rate simultaneously, showing that the new technique has good application prospects for improvement of the automatic seismic data processing.
基金This work is supported by the Scientific Research Project of Educational Department of Liaoning Province(Grant No.LJKZ0082)the Program of Hainan Association for Science and Technology Plans to Youth R&D Innovation(Grant No.QCXM201910)+2 种基金the National Natural Science Foundation of China(Grant Nos.61802092 and 92067110)the Hainan Provincial Natural Science Foundation of China(Grant No.620RC562)2020 Industrial Internet Innovation and Development Project-Industrial Internet Identification Data Interaction Middleware and Resource Pool Service Platform Project,Ministry of Industry and Information Technology of the People’s Republic of China.
文摘Anomaly detection is becoming increasingly significant in industrial cyber security,and different machine-learning algorithms have been generally acknowledged as various effective intrusion detection engines to successfully identify cyber attacks.However,different machine-learning algorithms may exhibit their own detection effects even if they analyze the same feature samples.As a sequence,after developing one feature generation approach,the most effective and applicable detection engines should be desperately selected by comparing distinct properties of each machine-learning algorithm.Based on process control features generated by directed function transition diagrams,this paper introduces five different machine-learning algorithms as alternative detection engines to discuss their matching abilities.Furthermore,this paper not only describes some qualitative properties to compare their advantages and disadvantages,but also gives an in-depth and meticulous research on their detection accuracies and consuming time.In the verified experiments,two attack models and four different attack intensities are defined to facilitate all quantitative comparisons,and the impacts of detection accuracy caused by the feature parameter are also comparatively analyzed.All experimental results can clearly explain that SVM(Support Vector Machine)and WNN(Wavelet Neural Network)are suggested as two applicable detection engines under differing cases.
文摘A topic studied in cartography is to make the extraction of cartographic features that provide the update of cartographic maps more easily. For this reason many automatic routines were created with the intent to perform the features extraction. Despite of all studies about this, some features cannot be found by the algorithm or it can extract some pixels unduly. So the current article aims to show the results with the software development that uses the original and reference image to calculate some statistics about the extraction process. Furthermore, the calculated statistics can be used to evaluate the extraction process.
基金supported by National Natural Science Foundation of China(No.61873142)the Science and Technology Research Program of the Chongqing Municipal Education Commission,China(Nos.KJZD-K202201901,KJQN202201109,KJQN202101904,KJQN202001903 and CXQT21035)+2 种基金the Scientific Research Foundation of Chongqing University of Technology,China(No.2019ZD76)the Scientific Research Foundation of Chongqing Institute of Engineering,China(No.2020xzky05)the Chongqing Municipal Natural Science Foundation,China(No.cstc2020jcyj-msxmX0666).
文摘In industrial process control systems,there is overwhelming evidence corroborating the notion that economic or technical limitations result in some key variables that are very difficult to measure online.The data-driven soft sensor is an effective solution because it provides a reliable and stable online estimation of such variables.This paper employs a deep neural network with multiscale feature extraction layers to build soft sensors,which are applied to the benchmarked Tennessee-Eastman process(TEP)and a real wind farm case.The comparison of modelling results demonstrates that the multiscale feature extraction layers have the following advantages over other methods.First,the multiscale feature extraction layers significantly reduce the number of parameters compared to the other deep neural networks.Second,the multiscale feature extraction layers can powerfully extract dataset characteristics.Finally,the multiscale feature extraction layers with fully considered historical measurements can contain richer useful information and improved representation compared to traditional data-driven models.
文摘Feature based design has been regarded as a promising approach for CAD/CAM integration.This paper aims to establish a domain independent representation formalism for feature based design in three aspects: formal representation,design process model and design algorithm.The implementing scheme and formal description of feature taxonomy,feature operator,feature model validation and feature transformation are given in the paper.The feature based design process model suited for either sequencial or concurrent engineering is proposed and its application to product structural design and process plan design is presented. Some general design algorithms for developing feature based design system are also addressed.The proposed scheme provides a formal methodology elementary for feature based design system development and operation in a structural way.
文摘The adaptability of features definition to applications is an essential condition for implementing feature based design. This paper makes attempt to present a hierarchical definition structure of features. The proposed scheme divides feature definition into application level, form level and geometric level, and provides links between different levels with feature semantics interpretation and enhanced geometric face adjacent graph. respectively. The results not only enable feature definition to abate from the specific dependence and become more extensive, but also provide a theoretical foundation for establishing the concurrent feature based design process model.
文摘多模态数据处理是一个重要的研究领域,它可以通过结合文本、图像等多种信息来提高模型性能.然而,由于不同模态之间的异构性以及信息融合的挑战,设计有效的多模态分类模型仍然是一个具有挑战性的问题.本文提出了一种新的多模态分类模型——MCM-ICE,它通过联合独立编码和协同编码策略来解决特征表示和特征融合的挑战.MCM-ICE在Fashion-Gen和Hateful Memes Challenge两个数据集上进行了实验,结果表明该模型在这两项任务中均优于现有的最先进方法.本文还探究了协同编码模块Transformer输出层的不同向量选取对结果的影响,结果表明选取[CLS]向量和去除[CLS]的向量的平均池化向量可以获得最佳结果.消融研究和探索性分析支持了MCM-ICE模型在处理多模态分类任务方面的有效性.