期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
The Application Model of Moving Objects in Cargo Delivery System
1
作者 张凤荔 周明天 徐波 《Journal of Electronic Science and Technology of China》 2004年第4期60-63,共4页
The development of spatio-temporal database systems is primarily motivated by applications which track and present mobile objects. In this paper, solutions for establishing the moving object database based on GPS/GIS ... The development of spatio-temporal database systems is primarily motivated by applications which track and present mobile objects. In this paper, solutions for establishing the moving object database based on GPS/GIS environment are presented, and a data modeling of moving object is given by using Temporal logical to extent the query language, finally the application model in cargo delivery system is shown. 展开更多
关键词 moving object database (MOD) geographic information system (GPS) global position system (GIS) material delivery system (MDS)
下载PDF
A Multi-Condition Relighting with Optimal Feature Selection to Robust Face Recognition with Illumination Variation
2
作者 HAO Yujie LIN Jie YIN Shi 《China Communications》 SCIE CSCD 2014年第6期99-107,共9页
In this paper, we proposed a new approach for face recognition with robust to illumination variation. The improved performance to various lights in recognition is obtained by a novel combination of multicondition reli... In this paper, we proposed a new approach for face recognition with robust to illumination variation. The improved performance to various lights in recognition is obtained by a novel combination of multicondition relighting and optimal feature selection. Multi-condition relighting provides a "coarse" compensation for the variable illumination, and then the optimal feature selection further refines the compensation, and additionally offers the robustness to shadow and highlight, by deemphasizing the local mismatches caused by imprecise lighting compensation, shadow or highlight on recognition. For evaluation, two databases with various illumination mismatches have been used. The results have demonstrated the improved robustness of the new methods. 展开更多
关键词 RELIGHTING illumination variation ROBUSTNESS face recognition.
下载PDF
集成层级图注意力网络检测非均衡虚假评论 被引量:1
3
作者 赵敏 张月琴 +1 位作者 窦英通 张泽华 《计算机科学与探索》 CSCD 北大核心 2023年第2期428-441,共14页
作为机器学习当前一大热点,图神经网络(GNN)模型近年来已逐渐开始结合用户评论应用于欺诈检测领域。但现实中汇总的用户评论涉及多个不同领域,可用信息复杂多样,海量的用户生成内容中欺诈信息通常也只占少数,基于GNN的相关检测方法对虚... 作为机器学习当前一大热点,图神经网络(GNN)模型近年来已逐渐开始结合用户评论应用于欺诈检测领域。但现实中汇总的用户评论涉及多个不同领域,可用信息复杂多样,海量的用户生成内容中欺诈信息通常也只占少数,基于GNN的相关检测方法对虚假评论的识别效果不甚理想。针对这种特征异构和数据分布不均衡的问题,将评论系统进行异构网络建模,提出一种新的集成层次图注意力网络(En-HGAN)识别方法。通过融合层次注意力结构,更加充分地利用异构网络中丰富的用户行为信息,为评论学习更加丰富的语义表征,并在集成学习Bagging框架下集成多个差异化的HGAN子模型,使用随机欠采样策略实现基学习器多样性聚合,从而减少有效信息丢失,增强对欺诈评论的检测能力。在YelpChi与Amazon真实数据集上的实验结果表明,En-HGAN方法具有良好的异常探测性能,和当前一些最新的方法相比,在数据类别倾斜分布的应用中显示En-HGAN方法对欺诈实体具有不错的鲁棒性。 展开更多
关键词 虚假评论检测 层次图注意力网络 网络表征学习 集成学习 非均衡数据分类
下载PDF
基于深度学习的语言模型研究进展 被引量:45
4
作者 王乃钰 叶育鑫 +3 位作者 刘露 凤丽洲 包铁 彭涛 《软件学报》 EI CSCD 北大核心 2021年第4期1082-1115,共34页
语言模型旨在对语言的内隐知识进行表示,作为自然语言处理的基本问题,一直广受关注.基于深度学习的语言模型是目前自然语言处理领域的研究热点,通过预训练-微调技术展现了内在强大的表示能力,并能够大幅提升下游任务性能.围绕语言模型... 语言模型旨在对语言的内隐知识进行表示,作为自然语言处理的基本问题,一直广受关注.基于深度学习的语言模型是目前自然语言处理领域的研究热点,通过预训练-微调技术展现了内在强大的表示能力,并能够大幅提升下游任务性能.围绕语言模型基本原理和不同应用方向,以神经概率语言模型与预训练语言模型作为深度学习与自然语言处理结合的切入点,从语言模型的基本概念和理论出发,介绍了神经概率与预训练模型的应用情况和当前面临的挑战,对现有神经概率、预训练语言模型及方法进行了对比和分析.同时又从新型训练任务和改进网络结构两方面对预训练语言模型训练方法进行了详细阐述,并对目前预训练模型在规模压缩、知识融合、多模态和跨语言等研究方向进行了概述和评价.最后总结了语言模型在当前自然语言处理应用中的瓶颈,对未来可能的研究重点做出展望. 展开更多
关键词 语言模型 预训练 深度学习 自然语言处理 神经语言模型
下载PDF
A survey of some tensor analysis techniques for biological systems 被引量:1
5
作者 Farzane Yahyanejad Reka Albert Bhaskar DasGupta 《Quantitative Biology》 CAS CSCD 2019年第4期266-277,共12页
Background:Since biological systems are complex and often involve multiple types of genomic relationships,tensor analysis methods can be utilized to elucidate these hidden complex relationships.There is a pressing nee... Background:Since biological systems are complex and often involve multiple types of genomic relationships,tensor analysis methods can be utilized to elucidate these hidden complex relationships.There is a pressing need for this,as the interpretation of the results of high-throughput experiments has advanced at a much slower pace than the accumulation of data.Results:In this review we provide an overview of some tensor analysis methods for biological systems.Conclusions:Tensors are natural and powerful generalizations of vectors and matrices to higher dimensions and play a fundamental role in physics,mathematics and many other areas.Tensor analysis methods can be used to provide the foundations of systematic approaches to distinguish significant higher order correlations among the elements of a complex systems via finding ensembles of a small number of reduced systems that provide a concise and representative summary of these correlations. 展开更多
关键词 biological systems tensor analysis biological and statistical validation
原文传递
Edge computing-Based mobile object tracking in internet of things
6
作者 Yalong Wu Pu Tian +2 位作者 Yuwei Cao Linqiang Ge Wei Yu 《High-Confidence Computing》 2022年第1期19-27,共9页
Mobile object tracking,which has broad applications,utilizes a large number of Internet of Things(IoT)devices to identify,record,and share the trajectory information of physical objects.Nonetheless,IoT devices are ene... Mobile object tracking,which has broad applications,utilizes a large number of Internet of Things(IoT)devices to identify,record,and share the trajectory information of physical objects.Nonetheless,IoT devices are energy con-strained and not feasible for deploying advanced tracking techniques due to significant computing requirements.To address these issues,in this paper,we develop an edge computing-based multivariate time series(EC-MTS)framework to accurately track mobile objects and exploit edge computing to offload its intensive computation tasks.Specifically,EC-MTS leverages statistical technique(i.e.,vector auto regression(VAR))to conduct arbitrary historical object trajectory data revisit and fit a best-effort trajectory model for accurate mobile object location prediction.Our framework offers the benefit of offloading computation intensive tasks from IoT devices by using edge computing infrastructure.We have validated the efficacy of EC-MTS and our experimental results demon-strate that EC-MTS framework could significantly improve mobile object tracking efficacy in terms of trajectory goodness-of-fit and location prediction accuracy of mobile objects.In addition,we extend our proposed EC-MTS framework to conduct multiple objects tracking in IoT systems. 展开更多
关键词 Internet of things Edge computing Architecture Mobile object tracking Vector auto regression
原文传递
Moving Objects with Transportation Modes:A Survey 被引量:1
7
作者 Jian-Qiu Xu Ralf Hartmut Güting +1 位作者 Yu Zheng Ouri Wolfson 《Journal of Computer Science & Technology》 SCIE EI CSCD 2019年第4期709-726,共18页
In this article,we survey the main achievements of moving objects with transportation modes that span the past decade.As an important kind of human behavior,transportation modes reflect characteristic movement feature... In this article,we survey the main achievements of moving objects with transportation modes that span the past decade.As an important kind of human behavior,transportation modes reflect characteristic movement features and enrich the mobility with informative knowledge.We make explicit comparisons with closely related work that investigates moving objects by incorporating into location-dependent semantics and descriptive attributes.An exhaustive survey is offered by considering the following aspects:1)modeling and representing mobility data with motion modes;2)answering spatio-temporal queries with transportation modes;3)query optimization techniques;4)predicting transportation modes from sensor data,e.g.,GPS-enabled devices.Several new and emergent issues concerning transportation modes are proposed for future research. 展开更多
关键词 MOVING OBJECT TRANSPORTATION mode DATA model performance DATA GENERATOR
原文传递
Review Authorship Attribution in a Similarity Space 被引量:1
8
作者 钱铁云 刘兵 +1 位作者 李青 司建锋 《Journal of Computer Science & Technology》 SCIE EI CSCD 2015年第1期200-213,共14页
Authorship attribution, also known as authorship classification, is the problem of identifying the authors (reviewers) of a set of documents (reviews). The common approach is to build a classifier using supervised... Authorship attribution, also known as authorship classification, is the problem of identifying the authors (reviewers) of a set of documents (reviews). The common approach is to build a classifier using supervised learning. This approach has several issues which hurts its applicability. First, supervised learning needs a large set of documents from each author to serve as the training data. This can be difficult in practice. For example, in the online review domain, most reviewers (authors) only write a few reviews, which are not enough to serve as the training data. Second, the learned classifier cannot be applied to authors whose documents have not been used in training. In this article, we propose a novel solution to deal with the two problems. The core idea is that instead of learning in the original document space, we transform it to a similarity space. In the similarity space, the learning is able to naturally tackle the issues. Our experiment results based on online reviews and reviewers show that the proposed method outperforms the state-of-the-art supervised and unsupervised baseline methods significantly. 展开更多
关键词 authorship attribution supervised learning similarity space
原文传递
Protect You More Than Blank: Anti-Learning Sensitive User Information in the Social Networks
9
作者 袁明轩 陈雷 +1 位作者 Philip S. Yu 梅宏 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第5期762-776,共15页
Social networks are getting more and more attention in recent years. People join social networks to share their information with others. However, due to the different cultures and backgrounds, people have different re... Social networks are getting more and more attention in recent years. People join social networks to share their information with others. However, due to the different cultures and backgrounds, people have different requirements on what kind of information should be published. Currently, when social network websites publish data, they just leave the information that a user feels sensitive blank. This is not enough due to the existence of the label-structure relationship. A group of analyzing algorithms can be used to learn the blank information with high accuracy. In this paper, we propose a personalized model to protect private information in social networks. Specifically, we break the label-structure association by slightly changing the edges in some users' neighborhoods. More importantly, in order to increase the usability of the published graph, we also preserve the influence value of each user during the privacy protection. We verify the effectiveness of our methods through extensive experiments. The results show that the proposed methods can protect sensitive labels against learning algorithms and at the same time, preserve certain graph utilities. 展开更多
关键词 social network PRIVACY protection
原文传递
Lifelong machine learning: a paradigm for continuous learning 被引量:4
10
作者 Bing LIU 《Frontiers of Computer Science》 SCIE EI CSCD 2017年第3期359-361,共3页
Machine learning (ML) has been instrumental for the ad- vances of both data analysis and artificial intelligence (AI). The recent success of deep learning brings it to a new height. ML algorithms have been success... Machine learning (ML) has been instrumental for the ad- vances of both data analysis and artificial intelligence (AI). The recent success of deep learning brings it to a new height. ML algorithms have been successfully used in almost all ar- eas of applications in industry, science, and engineering. 展开更多
原文传递
Overlapping community detection combining content and link
11
作者 Zhou-zhou HE Zhong-fei(Mark)ZHANG Philip S.YU 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2012年第11期828-839,共12页
In classic community detection, it is assumed that communities are exclusive, in the sense of either soft clustering or hard clustering. It has come to attention in the recent literature that many real-world problems ... In classic community detection, it is assumed that communities are exclusive, in the sense of either soft clustering or hard clustering. It has come to attention in the recent literature that many real-world problems violate this assumption, and thus overlapping community detection has become a hot research topic. The existing work on this topic uses either content or link information, but not both of them. In this paper, we deal with the issue of overlapping community detection by combining content and link information. We develop an effective solution called subgraph overlapping clustering (SOC) and evaluate this new approach in comparison with several peer methods in the literature that use either content or link information. The evaluations demonstrate the effectiveness and promise of SOC in dealing with large scale real datasets. 展开更多
关键词 OVERLAPPING CONTENT LINK Community detection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部