2,762 Result(s)
-
Chapter and Conference Paper
SimEmotion: A Simple Knowledgeable Prompt Tuning Method for Image Emotion Classification
Image emotion classification is an important computer vision task to extract emotions from images. The state-of-the-art methods for image emotion classification are primarily based on proposing new architectur...
-
Chapter and Conference Paper
Knowledge-Enhanced Interactive Matching Network for Multi-turn Response Selection in Medical Dialogue Systems
Recently, the response selection for retrieval-based dialogue systems has gained enormous attention from both academic and industrial communities. Although the previous methods achieve promising results for in...
-
Chapter and Conference Paper
A Three-Stage Curriculum Learning Framework with Hierarchical Label Smoothing for Fine-Grained Entity Ty**
In this paper, we study the noisy labeling problem on the fine-grained entity ty** (FET) task. Most existing methods propose to divide the training data into “clean” and “noisy” sets and use different strategie...
-
Chapter and Conference Paper
Parallel High Utility Itemset Mining
Association rule mining is a popular data mining task for finding relationships between values from the itemsets that co-occur frequently in a transactional database. Association rule mining has many applicati...
-
Chapter and Conference Paper
The Impact of Policy on the Clustering of the Blockchain Industry
Although local governments in China are encouraging the development of blockchain technology, the regional clustering of the blockchain industry still shows obvious differentiation. We use blockchain industry-...
-
Chapter and Conference Paper
HRSE: Reframing the Human Resource Management with MBSE
According to the ISO/IEC/IEEE 15288 standard, human resource management process is an essential part of organizational project-enabling processes, becoming more and more important during the process of science...
-
Chapter and Conference Paper
Automated Fish Classification Using Unprocessed Fatty Acid Chromatographic Data: A Machine Learning Approach
Fish is approximately 40% edible fillet. The remaining 60% can be processed into low-value fertilizer or high-value pharmaceutical-grade omega-3 concentrates. High-value manufacturing options depend on the co...
-
Chapter and Conference Paper
Research on Construction Method of SoS Architecture Knowledge Graph
System of systems (SoS) architecture data is the foundation of SoS architecture design, modeling, and evaluation. Traditional methods of architecture data collection generally need the involvement of modelers....
-
Chapter and Conference Paper
An Oriented Attention Model for Infectious Disease Cases Prediction
Effective infectious disease prediction supports the success of infection prevention and control. Several attention-based predictive models can be applied to undertake the prediction task. However, using a sin...
-
Chapter and Conference Paper
Real-World Superresolution by Using Deep Degradation Learning
Most current deep convolutional neural networks can achieve excellent results on a single image superresolution and are trained using corresponding high-resolution (HR) images and low-resolution (LR) images. C...
-
Chapter and Conference Paper
Inter-and-Intra Domain Attention Relational Inference for Rack Temperature Prediction in Data Center
In a data center, predicting the rack temperature then generating alarms when an exception is detected can prevent server failure caused by high rack temperature. Each measuring point records the temperature o...
-
Chapter and Conference Paper
Ultra-short-Term Load Forecasting Model Based on VMD and TGCN-GRU
Load forecasting is to use historical load information to estimate the load demand for a period of time in the future. At present, mode decomposition algorithm is often used in the field to improve the forecas...
-
Chapter and Conference Paper
IDMBS: An Interactive System to Find Interesting Co-location Patterns Using SVM
Spatial co-location pattern mining is an important task in spatial data mining. However, traditional mining frameworks cannot help a particular user effectively discover interesting co-location patterns accord...
-
Chapter and Conference Paper
An Intelligent Data Routing Scheme for Multi-UAV Avionics System Based on Integrated Communication Effectiveness
The rapid development of information technology promotes the transformation and development of future air combat, from mechanization to informatization, intelligence, and multiplatform integration. For the mul...
-
Chapter and Conference Paper
Data Analyses and Parallel Optimization of the Tropical-Cyclone Coupled Numerical Model
Tropical cyclones (TCs) are one of the most feared and deadly weather systems in the world. An air-sea coupled numerical model offers a more accurate description of physical processes between atmospheric-ocean...
-
Chapter and Conference Paper
Predicting Rumor Veracity on Social Media with Graph Structured Multi-task Learning
Previous studies have shown that the multi-task learning paradigm with the stance classification could facilitate the successful detection of rumours, but the shared layers in multi-task learning tend to yield...
-
Chapter and Conference Paper
Medical Image Fusion Based on Pixel-Level Nonlocal Self-similarity Prior and Optimization
“Self-similarity” is a common characteristic of medical images. That is, small-scale features often appear in multiple locations in the image frequently. Therefore, the global search for similar pixels helps t...
-
Chapter and Conference Paper
A Joint Framework for Explainable Recommendation with Knowledge Reasoning and Graph Representation
With the development of recommendation systems (RSs), researchers are no longer only satisfied with the recommendation results, but also put forward requirements for the recommendation reasons, which helps imp...
-
Chapter and Conference Paper
Squeezing Water from a Stone: A Bag of Tricks for Further Improving Cross-Encoder Effectiveness for Reranking
While much recent work has demonstrated that hard negative mining can be used to train better bi-encoder models, few have considered it in the context of cross-encoders, which are key ingredients in modern re...
-
Chapter and Conference Paper
Semi-supervised Context Discovery for Peer-Based Anomaly Detection in Multi-layer Networks
User-related cyber security attacks could cause tremendous losses to any organization. Detecting such threat can be formulated as anomaly detection problem in multilayer networks where each layer of the multil...