期刊文献+
共找到942篇文章
< 1 2 48 >
每页显示 20 50 100
GraphCWGAN-GP:A Novel Data Augmenting Approach for Imbalanced Encrypted Traffic Classification 被引量:2
1
作者 Jiangtao Zhai Peng Lin +2 位作者 Yongfu Cui Lilong Xu Ming Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期2069-2092,共24页
Encrypted traffic classification has become a hot issue in network security research.The class imbalance problem of traffic samples often causes the deterioration of Machine Learning based classifier performance.Altho... Encrypted traffic classification has become a hot issue in network security research.The class imbalance problem of traffic samples often causes the deterioration of Machine Learning based classifier performance.Although the Generative Adversarial Network(GAN)method can generate new samples by learning the feature distribution of the original samples,it is confronted with the problems of unstable training andmode collapse.To this end,a novel data augmenting approach called Graph CWGAN-GP is proposed in this paper.The traffic data is first converted into grayscale images as the input for the proposed model.Then,the minority class data is augmented with our proposed model,which is built by introducing conditional constraints and a new distance metric in typical GAN.Finally,the classical deep learning model is adopted as a classifier to classify datasets augmented by the Condition GAN(CGAN),Wasserstein GAN-Gradient Penalty(WGAN-GP)and Graph CWGAN-GP,respectively.Compared with the state-of-the-art GAN methods,the Graph CWGAN-GP cannot only control the modes of the data to be generated,but also overcome the problem of unstable training and generate more realistic and diverse samples.The experimental results show that the classification precision,recall and F1-Score of theminority class in the balanced dataset augmented in this paper have improved by more than 2.37%,3.39% and 4.57%,respectively. 展开更多
关键词 Generative Adversarial Network imbalanced traffic data data augmenting encrypted traffic classification
在线阅读 下载PDF
Augmenting peripheral nerve regeneration using stem cells: A review of current opinion 被引量:13
2
作者 Neil G Fairbairn Amanda M Meppelink +2 位作者 Joanna Ng-Glazier Mark A Randolph Jonathan M Winograd 《World Journal of Stem Cells》 SCIE CAS 2015年第1期11-26,共16页
Outcomes following peripheral nerve injury remain frustratingly poor. The reasons for this are multifactorial, although maintaining a growth permissive environment in the distal nerve stump following repair is arguabl... Outcomes following peripheral nerve injury remain frustratingly poor. The reasons for this are multifactorial, although maintaining a growth permissive environment in the distal nerve stump following repair is arguably the most important. The optimal environment for axonal regeneration relies on the synthesis and release of many biochemical mediators that are temporally and spatially regulated with a high level of incompletely understood complexity. The Schwann cell(SC) has emerged as a key player in this process. Prolonged periods of distal nerve stump denervation, characteristic of large gaps and proximal injuries, have been associated with a reduction in SC number and ability to support regenerating axons. Cell based therapy offers a potential therapy for the improvement of outcomes following peripheral nerve reconstruction. Stem cells have the potential to increase the number of SCs and prolong their ability to support regeneration. They may also have the ability to rescue and replenish populations of chromatolytic and apoptotic neurons following axotomy. Finally, they can be used in non-physiologic ways to preserve injured tissues such as denervated muscle while neuronal ingrowth has not yet occurred. Aside from stem cell type, careful consideration must be given to differentiation status, how stem cells are supported following transplantation and how they will be delivered to the site of injury. It is the aim of this article to review current opinions on the strategies of stem cell based therapy for the augmentation of peripheral nerve regeneration. 展开更多
关键词 PERIPHERAL NERVE Augmentation REGENERATION STEM CELLS
暂未订购
Augmenting Internet of Medical Things Security:Deep Ensemble Integration and Methodological Fusion
3
作者 Hamad Naeem Amjad Alsirhani +2 位作者 Faeiz MAlserhani Farhan Ullah Ondrej Krejcar 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第12期2185-2223,共39页
When it comes to smart healthcare business systems,network-based intrusion detection systems are crucial for protecting the system and its networks from malicious network assaults.To protect IoMT devices and networks ... When it comes to smart healthcare business systems,network-based intrusion detection systems are crucial for protecting the system and its networks from malicious network assaults.To protect IoMT devices and networks in healthcare and medical settings,our proposed model serves as a powerful tool for monitoring IoMT networks.This study presents a robust methodology for intrusion detection in Internet of Medical Things(IoMT)environments,integrating data augmentation,feature selection,and ensemble learning to effectively handle IoMT data complexity.Following rigorous preprocessing,including feature extraction,correlation removal,and Recursive Feature Elimi-nation(RFE),selected features are standardized and reshaped for deep learning models.Augmentation using the BAT algorithm enhances dataset variability.Three deep learning models,Transformer-based neural networks,self-attention Deep Convolutional Neural Networks(DCNNs),and Long Short-Term Memory(LSTM)networks,are trained to capture diverse data aspects.Their predictions form a meta-feature set for a subsequent meta-learner,which combines model strengths.Conventional classifiers validate meta-learner features for broad algorithm suitability.This comprehensive method demonstrates high accuracy and robustness in IoMT intrusion detection.Evaluations were conducted using two datasets:the publicly available WUSTL-EHMS-2020 dataset,which contains two distinct categories,and the CICIoMT2024 dataset,encompassing sixteen categories.Experimental results showcase the method’s exceptional performance,achieving optimal scores of 100%on the WUSTL-EHMS-2020 dataset and 99%on the CICIoMT2024. 展开更多
关键词 Cyberattack ensemble learning feature selection intrusion detection smart cities machine learning BAT augmentation
在线阅读 下载PDF
Augmenting Android Malware Using Conditional Variational Autoencoder for the Malware Family Classification
4
作者 Younghoon Ban Jeong Hyun Yi Haehyun Cho 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期2215-2230,共16页
Android malware has evolved in various forms such as adware that continuously exposes advertisements,banking malware designed to access users’online banking accounts,and Short Message Service(SMS)malware that uses a ... Android malware has evolved in various forms such as adware that continuously exposes advertisements,banking malware designed to access users’online banking accounts,and Short Message Service(SMS)malware that uses a Command&Control(C&C)server to send malicious SMS,intercept SMS,and steal data.By using many malicious strategies,the number of malware is steadily increasing.Increasing Android malware threats numerous users,and thus,it is necessary to detect malware quickly and accurately.Each malware has distinguishable characteristics based on its actions.Therefore,security researchers have tried to categorize malware based on their behaviors by conducting the familial analysis which can help analysists to reduce the time and cost for analyzing malware.However,those studies algorithms typically used imbalanced,well-labeled open-source dataset,and thus,it is very difficult to classify some malware families which only have a few number of malware.To overcome this challenge,previous data augmentation studies augmented data by visualizing malicious codes and used them for malware analysis.However,visualization of malware can result in misclassifications because the behavior information of the malware could be compromised.In this study,we propose an android malware familial analysis system based on a data augmentation method that preserves malware behaviors to create an effective multi-class classifier for malware family analysis.To this end,we analyze malware and use Application Programming Interface(APIs)and permissions that can reflect the behavior of malware as features.By using these features,we augment malware dataset to enable effective malware detection while preserving original malicious behaviors.Our evaluation results demonstrate that,when a model is created by using only the augmented data,a macro-F1 score of 0.65 and accuracy of 0.63%.On the other hand,when the augmented data and original malware are used together,the evaluation results show that a macro-F1 score of 0.91 and an accuracy of 0.99%. 展开更多
关键词 ANDROID data augmentation artificial intelligence CYBERSECURITY
在线阅读 下载PDF
Fairness is essential for robustness:fair adversarial training by identifying and augmenting hard examples
5
作者 Ningping MOU Xinli YUE +1 位作者 Lingchen ZHAO Qian WANG 《Frontiers of Computer Science》 2025年第3期1-13,共13页
Adversarial training has been widely considered the most effective defense against adversarial attacks.However,recent studies have demonstrated that a large discrepancy exists in the class-wise robustness of adversari... Adversarial training has been widely considered the most effective defense against adversarial attacks.However,recent studies have demonstrated that a large discrepancy exists in the class-wise robustness of adversarial training,leading to two potential issues:firstly,the overall robustness of a model is compromised due to the weakest class;and secondly,ethical concerns arising from unequal protection and biases,where certain societal demographic groups receive less robustness in defense mechanisms.Despite these issues,solutions to address the discrepancy remain largely underexplored.In this paper,we advance beyond existing methods that focus on class-level solutions.Our investigation reveals that hard examples,identified by higher cross-entropy values,can provide more fine-grained information about the discrepancy.Furthermore,we find that enhancing the diversity of hard examples can effectively reduce the robustness gap between classes.Motivated by these observations,we propose Fair Adversarial Training(FairAT)to mitigate the discrepancy of class-wise robustness.Extensive experiments on various benchmark datasets and adversarial attacks demonstrate that FairAT outperforms state-of-the-art methods in terms of both overall robustness and fairness.For a WRN-28-10 model trained on CIFAR10,FairAT improves the average and worst-class robustness by 2.13%and 4.50%,respectively. 展开更多
关键词 robust fairness adversarial training hard example data augmentation
原文传递
Design of Navigation Message Authentication for BDSBAS System
6
作者 Chen Xiao Tian Xiang +2 位作者 Luo Ruidan Liu Ting Wu Haitao 《China Communications》 2026年第1期189-203,共15页
The satellite-based augmentation system(SBAS)provides differential and integrity augmentation services for life safety fields of aviation and navigation.However,the signal structure of SBAS is public,which incurs a ri... The satellite-based augmentation system(SBAS)provides differential and integrity augmentation services for life safety fields of aviation and navigation.However,the signal structure of SBAS is public,which incurs a risk of spoofing attacks.To improve the anti-spoofing capability of the SBAS,European Union and the United States conduct research on navigation message authentication,and promote the standardization of SBAS message authentication.For the development of Beidou satellite-based augmentation system(BDSBAS),this paper proposes navigation message authentication based on the Chinese commercial cryptographic standards.Firstly,this paper expounds the architecture and principles of the SBAS message authentication,and then carries out the design of timed efficient streaming losstolerant authentication scheme(TESLA)and elliptic curve digital signature algorithm(ECDSA)authentication schemes based on Chinese commercial cryptographic standards,message arrangement and the design of over-the-air rekeying(OTAR)message.Finally,this paper conducts a theoretical analysis of the time between authentications(TBA)and maximum authentication latency(MAL)for L5 TESLA-I and L5 ECDSA-Q,and further simulates the reception time of OTAR message,TBA and MAL from the aspects of OTAR message weight and demodulation error rate.The simulation results can provide theoretical supports for the standardization of BDSBAS message authentication. 展开更多
关键词 Beidou satellite-based augmentation system ECDSA message authentication satellite navigation TESLA
在线阅读 下载PDF
A Fine-Grained RecognitionModel based on Discriminative Region Localization and Efficient Second-Order Feature Encoding
7
作者 Xiaorui Zhang Yingying Wang +3 位作者 Wei Sun Shiyu Zhou Haoming Zhang Pengpai Wang 《Computers, Materials & Continua》 2026年第4期946-965,共20页
Discriminative region localization and efficient feature encoding are crucial for fine-grained object recognition.However,existing data augmentation methods struggle to accurately locate discriminative regions in comp... Discriminative region localization and efficient feature encoding are crucial for fine-grained object recognition.However,existing data augmentation methods struggle to accurately locate discriminative regions in complex backgrounds,small target objects,and limited training data,leading to poor recognition.Fine-grained images exhibit“small inter-class differences,”and while second-order feature encoding enhances discrimination,it often requires dual Convolutional Neural Networks(CNN),increasing training time and complexity.This study proposes a model integrating discriminative region localization and efficient second-order feature encoding.By ranking feature map channels via a fully connected layer,it selects high-importance channels to generate an enhanced map,accurately locating discriminative regions.Cropping and erasing augmentations further refine recognition.To improve efficiency,a novel second-order feature encoding module generates an attention map from the fourth convolutional group of Residual Network 50 layers(ResNet-50)and multiplies it with features from the fifth group,producing second-order features while reducing dimensionality and training time.Experiments on Caltech-University of California,San Diego Birds-200-2011(CUB-200-2011),Stanford Car,and Fine-Grained Visual Classification of Aircraft(FGVC Aircraft)datasets show state-of-the-art accuracy of 88.9%,94.7%,and 93.3%,respectively. 展开更多
关键词 Fine-grained recognition feature encoding data augmentation second-order feature discriminative regions
在线阅读 下载PDF
An Unsupervised Online Detection Method for Foreign Objects in Complex Environments
8
作者 YANG Xiaoyang YANG Yanzhu DENG Haiping 《Journal of Donghua University(English Edition)》 2026年第1期140-151,共12页
In modern industrial production,foreign object detection in complex environments is crucial to ensure product quality and production safety.Detection systems based on deep-learning image processing algorithms often fa... In modern industrial production,foreign object detection in complex environments is crucial to ensure product quality and production safety.Detection systems based on deep-learning image processing algorithms often face challenges with handling high-resolution images and achieving accurate detection against complex backgrounds.To address these issues,this study employs the PatchCore unsupervised anomaly detection algorithm combined with data augmentation techniques to enhance the system’s generalization capability across varying lighting conditions,viewing angles,and object scales.The proposed method is evaluated in a complex industrial detection scenario involving the bogie of an electric multiple unit(EMU).A dataset consisting of complex backgrounds,diverse lighting conditions,and multiple viewing angles is constructed to validate the performance of the detection system in real industrial environments.Experimental results show that the proposed model achieves an average area under the receiver operating characteristic curve(AUROC)of 0.92 and an average F1 score of 0.85.Combined with data augmentation,the proposed model exhibits improvements in AUROC by 0.06 and F1 score by 0.03,demonstrating enhanced accuracy and robustness for foreign object detection in complex industrial settings.In addition,the effects of key factors on detection performance are systematically analyzed,providing practical guidance for parameter selection in real industrial applications. 展开更多
关键词 foreign object detection unsupervised learning data augmentation complex environment BOGIE DATASET
在线阅读 下载PDF
Penile shaft reconstruction after cream self-injection:a case report
9
作者 Léa Bollen Stéphane Rysselinck +1 位作者 Jean-Philippe Salmin Gilles Dosin 《The Canadian Journal of Urology》 2026年第1期221-225,共5页
Background:Penile augmentation through injectable substances is becoming increasingly common.A growing number of aesthetic clinics are developing penile enlargement procedures using various injectable materials.Althou... Background:Penile augmentation through injectable substances is becoming increasingly common.A growing number of aesthetic clinics are developing penile enlargement procedures using various injectable materials.Although these procedures are now performed in more controlled and medically supervised environments,their long-term outcomes remain poorly understood.The promotion of such medical treatments contributes to an increasing interest among adult males in self-injection as a method to alleviate psychological distress associated with penile size concerns.At the same time,access to injectable substances through unofficial or unregulated sources has become increasingly easy.Tor our knowledge,we report the first documented case of self-injection with Garamycin®(gentamicin)cream,contributing to the literature on the often multidisciplinary management of penile enlargement injections,a field still lacking well-established guidelines.Case Description:This case report describes a young patient who self-injected Garamycin®into the penis for the purpose of enlargement.He presented to our urology department with worsening symptoms,including severe and poorly tolerated pain.His primary request was prompt relief of pain while preserving,as much as possible,the aesthetic appearance and functional integrity of his penis.This case required a multi-stage surgical approach to salvage the penis and preserve both its structural integrity and functional outcome.Conclusions:To our knowledge,this case report documents the first reported instance of Garamycin®injection performed for the purpose of penile enlargement.It provides insight into the clinical course of such penile cream injections,demonstrates that a two-stage scrotal flap can achieve both functional and aesthetic outcomes,and highlights the importance of comprehensive management particularly addressing the traumatic impact of penile deformity secondary to inflammation and/or infection,as well as the body dysmorphic concerns often associated with these cases. 展开更多
关键词 penile augmentation foreign body injection penile reconstruction scrotal flap complications case report
暂未订购
Effective Token Masking Augmentation Using Term-Document Frequency for Language Model-Based Legal Case Classification
10
作者 Ye-Chan Park Mohd Asyraf Zulkifley +1 位作者 Bong-Soo Sohn Jaesung Lee 《Computers, Materials & Continua》 2026年第4期928-945,共18页
Legal case classification involves the categorization of legal documents into predefined categories,which facilitates legal information retrieval and case management.However,real-world legal datasets often suffer from... Legal case classification involves the categorization of legal documents into predefined categories,which facilitates legal information retrieval and case management.However,real-world legal datasets often suffer from class imbalances due to the uneven distribution of case types across legal domains.This leads to biased model performance,in the form of high accuracy for overrepresented categories and underperformance for minority classes.To address this issue,in this study,we propose a data augmentation method that masks unimportant terms within a document selectively while preserving key terms fromthe perspective of the legal domain.This approach enhances data diversity and improves the generalization capability of conventional models.Our experiments demonstrate consistent improvements achieved by the proposed augmentation strategy in terms of accuracy and F1 score across all models,validating the effectiveness of the proposed method in legal case classification. 展开更多
关键词 Legal case classification class imbalance data augmentation token masking legal NLP
在线阅读 下载PDF
Augmented reality surgical navigation:Clinical applications,key technologies,and future directions
11
作者 Yuanyuan WANG Dawei LU +9 位作者 Jingfan FAN Deqiang XIAO Danni AI Tianyu FU Yucong LIN Long SHAO Tao CHEN Hong SONG Yongtian WANG Jian YANG 《虚拟现实与智能硬件(中英文)》 2026年第1期1-27,共27页
Surgical navigation has evolved significantly through advances in augmented reality,virtual reality,and mixed reality,improving precision and safety across many clinical applications,including neurosurgery,maxillofaci... Surgical navigation has evolved significantly through advances in augmented reality,virtual reality,and mixed reality,improving precision and safety across many clinical applications,including neurosurgery,maxillofacial,spinal,and arthroplasty procedures.By integrating preoperative imaging with real-time intraoperative data,these systems provide dynamic guidance,reduce radiation exposure,and minimize tissue damage.Key challenges persist,including intraoperative registration accuracy,flexible tissue deformation,respiratory compensation,and real-time imaging quality.Emerging solutions include artificial intelligence-driven segmentation,deformation-field modeling,and hybrid registration techniques.Future developments will include lightweight,portable systems,improved non-rigid registration algorithms,and greater clinical adoption.Despite advances in rigid-tissue applications,soft-tissue navigation requires additional innovation to address motion variability and registration reliability,ultimately advancing minimally invasive surgery and precision medicine. 展开更多
关键词 Surgical navigation Augmented reality Multimodal image registration Artificial intelligence
在线阅读 下载PDF
Diffusion-Driven Generation of Synthetic Complex Concrete Crack Images for Segmentation Tasks
12
作者 Pengwei Guo Xiao Tan Yiming Liu 《Structural Durability & Health Monitoring》 2026年第1期47-69,共23页
Crack detection accuracy in computer vision is often constrained by limited annotated datasets.Although Generative Adversarial Networks(GANs)have been applied for data augmentation,they frequently introduce blurs and ... Crack detection accuracy in computer vision is often constrained by limited annotated datasets.Although Generative Adversarial Networks(GANs)have been applied for data augmentation,they frequently introduce blurs and artifacts.To address this challenge,this study leverages Denoising Diffusion Probabilistic Models(DDPMs)to generate high-quality synthetic crack images,enriching the training set with diverse and structurally consistent samples that enhance the crack segmentation.The proposed framework involves a two-stage pipeline:first,DDPMs are used to synthesize high-fidelity crack images that capture fine structural details.Second,these generated samples are combined with real data to train segmentation networks,thereby improving accuracy and robustness in crack detection.Compared with GAN-based approaches,DDPM achieved the best fidelity,with the highest Structural Similarity Index(SSIM)(0.302)and lowest Learned Perceptual Image Patch Similarity(LPIPS)(0.461),producing artifact-free images that preserve fine crack details.To validate its effectiveness,six segmentation models were tested,among which LinkNet consistently achieved the best performance,excelling in both region-level accuracy and structural continuity.Incorporating DDPM-augmented data further enhanced segmentation outcomes,increasing F1 scores by up to 1.1%and IoU by 1.7%,while also improving boundary alignment and skeleton continuity compared with models trained on real images alone.Experiments with varying augmentation ratios showed consistent improvements,with F1 rising from 0.946(no augmentation)to 0.957 and IoU from 0.897 to 0.913 at the highest ratio.These findings demonstrate the effectiveness of diffusion-based augmentation for complex crack detection in structural health monitoring. 展开更多
关键词 Crack monitoring complex cracks denoising diffusion models generative artificial intelligence synthetic data augmentation
在线阅读 下载PDF
Individual Software Expertise Formalization and Assessment from Project Management Tool Databases
13
作者 Traian-Radu Plosca Alexandru-Mihai Pescaru +1 位作者 Bianca-Valeria Rus Daniel-Ioan Curiac 《Computers, Materials & Continua》 2026年第1期389-411,共23页
Objective expertise evaluation of individuals,as a prerequisite stage for team formation,has been a long-term desideratum in large software development companies.With the rapid advancements in machine learning methods... Objective expertise evaluation of individuals,as a prerequisite stage for team formation,has been a long-term desideratum in large software development companies.With the rapid advancements in machine learning methods,based on reliable existing data stored in project management tools’datasets,automating this evaluation process becomes a natural step forward.In this context,our approach focuses on quantifying software developer expertise by using metadata from the task-tracking systems.For this,we mathematically formalize two categories of expertise:technology-specific expertise,which denotes the skills required for a particular technology,and general expertise,which encapsulates overall knowledge in the software industry.Afterward,we automatically classify the zones of expertise associated with each task a developer has worked on using Bidirectional Encoder Representations from Transformers(BERT)-like transformers to handle the unique characteristics of project tool datasets effectively.Finally,our method evaluates the proficiency of each software specialist across already completed projects from both technology-specific and general perspectives.The method was experimentally validated,yielding promising results. 展开更多
关键词 Expertise formalization transformer-based models natural language processing augmented data project management tool skill classification
在线阅读 下载PDF
PEMFC Performance Degradation Prediction Based on CNN-BiLSTM with Data Augmentation by an Improved GAN
14
作者 Xiaolu Wang Haoyu Sun +1 位作者 Aiguo Wang Xin Xia 《Energy Engineering》 2026年第2期417-435,共19页
To address the issues of insufficient and imbalanced data samples in proton exchange membrane fuel cell(PEMFC)performance degradation prediction,this study proposes a data augmentation-based model to predict PEMFC per... To address the issues of insufficient and imbalanced data samples in proton exchange membrane fuel cell(PEMFC)performance degradation prediction,this study proposes a data augmentation-based model to predict PEMFC performance degradation.Firstly,an improved generative adversarial network(IGAN)with adaptive gradient penalty coefficient is proposed to address the problems of excessively fast gradient descent and insufficient diversity of generated samples.Then,the IGANis used to generate datawith a distribution analogous to real data,therebymitigating the insufficiency and imbalance of original PEMFC samples and providing the predictionmodel with training data rich in feature information.Finally,a convolutional neural network-bidirectional long short-termmemory(CNN-BiLSTM)model is adopted to predict PEMFC performance degradation.Experimental results show that the data generated by the proposed IGAN exhibits higher quality than that generated by the original GAN,and can fully characterize and enrich the original data’s features.Using the augmented data,the prediction accuracy of the CNN-BiLSTM model is significantly improved,rendering it applicable to tasks of predicting PEMFC performance degradation. 展开更多
关键词 PEMFC performance degradation prediction data augmentation improved generative adversarial network
在线阅读 下载PDF
Advancing living Bacillus spore identification:Multi-head self-attention mechanism-enabled deep learning combined with single-cell Raman spectroscopy
15
作者 Mengjiao Xue Fusheng Du +5 位作者 Lin He Junhui Hu Yuanpeng Li Yuan Lu Shuwen Zeng Yufeng Yuan 《Journal of Innovative Optical Health Sciences》 2026年第1期139-155,共17页
Many spore-forming Bacillus species can cause serious human diseases,because of accidental Bacillusspore infection.Thus,developing an identification strategy with both high sensitivity and specificity is greatly in de... Many spore-forming Bacillus species can cause serious human diseases,because of accidental Bacillusspore infection.Thus,developing an identification strategy with both high sensitivity and specificity is greatly in demand.In this work,we proposed a novel approach named multi-head self-attention mechanism-guided neural network Raman platform to identify living Bacillus spores within a single-cell resolution.The multi-head self-attention mechanism-guided neural network Raman platform was created by combining single-cell Raman spectroscopy,convolutional neural network(CNN),and multi-head self-attention mechanism.To address the limited size of the original spectra dataset,Gaussian noise-based spectra augmentation was employed to increase the number of single-cell Raman spectra datasets for CNN training.Owing to the assistance of both spectra augmentation and multi-head self-attention mechanism,the obtained prediction accuracy of five Bacillus spore species was further improved from 92.29±0.82%to 99.43±0.15%.To figure out the spectra differences covered by the multi-head self-attention mechanism-guided CNN,the relative classification weight from typical Raman bands was visualized via multi-head self-attention mechanism curve.In the process of spectra augmentation from 0 to 1000,the distribution of relative classification weight varied from a discrete state to a more concentrated phase.More importantly,these highlighted four Raman bands(1017,1449,1576,and 1660 cm^(-1))were assigned large weights,showing that the spectra differences in the Raman bands produced the largest contribution to prediction accuracy.It can be foreseen that,our proposed sorting platform has great potential in accurately identifying Bacillus and its related genera species at a single-cell level. 展开更多
关键词 Multi-head self-attention mechanism CNN single-cell Raman spectroscopy spectra augmentation advanced Bacillus spore identification
原文传递
AUGMENTED SUBSPACE SCHEME FOR EIGENVALUE PROBLEM BY WEAK GALERKIN FINITE ELEMENT METHOD
16
作者 Yue Feng Zhijin Guan +1 位作者 Hehu Xie Chenguang Zhou, 《Journal of Computational Mathematics》 2026年第1期135-164,共30页
This study proposes a class of augmented subspace schemes for the weak Galerkin(WG)finite element method used to solve eigenvalue problems.The augmented subspace is built with the conforming linear finite element spac... This study proposes a class of augmented subspace schemes for the weak Galerkin(WG)finite element method used to solve eigenvalue problems.The augmented subspace is built with the conforming linear finite element space defined on the coarse mesh and the eigen-function approximations in the WG finite element space defined on the fine mesh.Based on this augmented subspace,solving the eigenvalue problem in the fine WG finite element space can be reduced to the solution of the linear boundary value problem in the same WG finite element space and a low dimensional eigenvalue problem in the augmented sub-space.The proposed augmented subspace techniques have the second order convergence rate with respect to the coarse mesh size,as demonstrated by the accompanying error esti-mates.Finally,a few numerical examples are provided to validate the proposed numerical techniques. 展开更多
关键词 Eigenvalue problem Augmented subspace scheme Weak Galerkin finite ele-ment method Second order convergence rate
原文传递
Augmenting Trigger Semantics to Improve Event Coreference Resolution
17
作者 宦敏 徐昇 李培峰 《Journal of Computer Science & Technology》 SCIE EI CSCD 2023年第3期600-611,共12页
Due to the small size of the annotated corpora and the sparsity of the event trigger words, the event coreference resolver cannot capture enough event semantics, especially the trigger semantics, to identify coreferen... Due to the small size of the annotated corpora and the sparsity of the event trigger words, the event coreference resolver cannot capture enough event semantics, especially the trigger semantics, to identify coreferential event mentions. To address the above issues, this paper proposes a trigger semantics augmentation mechanism to boost event coreference resolution. First, this mechanism performs a trigger-oriented masking strategy to pre-train a BERT (Bidirectional Encoder Representations from Transformers)-based encoder (Trigger-BERT), which is fine-tuned on a large-scale unlabeled dataset Gigaword. Second, it combines the event semantic relations from the Trigger-BERT encoder with the event interactions from the soft-attention mechanism to resolve event coreference. Experimental results on both the KBP2016 and KBP2017 datasets show that our proposed model outperforms several state-of-the-art baselines. 展开更多
关键词 event coreference resolution trigger semantics augmentation information interaction
原文传递
面向复杂环境的改进YOLOv5安全帽检测算法 被引量:8
18
作者 宋春宁 李寅中 《电子测量技术》 北大核心 2025年第7期163-170,共8页
对施工工人的安全帽佩戴检测是保障人员安全的重要方法,但现有的安全帽检测大多为人工检测,不仅耗时费力且效率低下。且目前存在的算法在面对复杂的环境或者天气下,存在检测精度低等问题。针对这一现象,基于YOLOv5s算法提出一种改进的... 对施工工人的安全帽佩戴检测是保障人员安全的重要方法,但现有的安全帽检测大多为人工检测,不仅耗时费力且效率低下。且目前存在的算法在面对复杂的环境或者天气下,存在检测精度低等问题。针对这一现象,基于YOLOv5s算法提出一种改进的安全帽佩戴检测算法。首先,基于残差思想和大型可分离模块设计提出SLSKA-POOL模块,并在池化层使用,该模块可以使网络更加关注目标特征,进一步提高网络能力;其次,提出CAKConv卷积模块,该模块通过不规则的卷积操作高效的提取特征,以提高网络性能;最后,在主干添加EMA模块,聚合多尺度空间结构信息,建立长短依赖关系,以获得更好的性能。实验结果表明:改进的YOLOv5与原算法相比,检测精度提升2.2%,mAP@0.5提升了3.6%,mAP@0.5:0.95提升了6.4%,实现了更准确高效的安全帽佩戴检测。 展开更多
关键词 YOLOv5 安全帽检测 注意力机制 CAKConv data augmentation
原文传递
An Enhanced Lung Cancer Detection Approach Using Dual-Model Deep Learning Technique 被引量:1
19
作者 Sumaia Mohamed Elhassan Saad Mohamed Darwish Saleh Mesbah Elkaffas 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期835-867,共33页
Lung cancer continues to be a leading cause of cancer-related deaths worldwide,emphasizing the critical need for improved diagnostic techniques.Early detection of lung tumors significantly increases the chances of suc... Lung cancer continues to be a leading cause of cancer-related deaths worldwide,emphasizing the critical need for improved diagnostic techniques.Early detection of lung tumors significantly increases the chances of successful treatment and survival.However,current diagnostic methods often fail to detect tumors at an early stage or to accurately pinpoint their location within the lung tissue.Single-model deep learning technologies for lung cancer detection,while beneficial,cannot capture the full range of features present in medical imaging data,leading to incomplete or inaccurate detection.Furthermore,it may not be robust enough to handle the wide variability in medical images due to different imaging conditions,patient anatomy,and tumor characteristics.To overcome these disadvantages,dual-model or multi-model approaches can be employed.This research focuses on enhancing the detection of lung cancer by utilizing a combination of two learning models:a Convolutional Neural Network(CNN)for categorization and the You Only Look Once(YOLOv8)architecture for real-time identification and pinpointing of tumors.CNNs automatically learn to extract hierarchical features from raw image data,capturing patterns such as edges,textures,and complex structures that are crucial for identifying lung cancer.YOLOv8 incorporates multiscale feature extraction,enabling the detection of tumors of varying sizes and scales within a single image.This is particularly beneficial for identifying small or irregularly shaped tumors that may be challenging to detect.Furthermore,through the utilization of cutting-edge data augmentation methods,such as Deep Convolutional Generative Adversarial Networks(DCGAN),the suggested approach can handle the issue of limited data and boost the models’ability to learn from diverse and comprehensive datasets.The combined method not only improved accuracy and localization but also ensured efficient real-time processing,which is crucial for practical clinical applications.The CNN achieved an accuracy of 97.67%in classifying lung tissues into healthy and cancerous categories.The YOLOv8 model achieved an Intersection over Union(IoU)score of 0.85 for tumor localization,reflecting high precision in detecting and marking tumor boundaries within the images.Finally,the incorporation of synthetic images generated by DCGAN led to a 10%improvement in both the CNN classification accuracy and YOLOv8 detection performance. 展开更多
关键词 Lung cancer detection dual-model deep learning technique data augmentation CNN YOLOv8
在线阅读 下载PDF
Streamlined photonic reservoir computer with augmented memory capabilities 被引量:4
20
作者 Changdi Zhou Yu Huang +5 位作者 Yigong Yang Deyu Cai Pei Zhou Kuenyao Lau Nianqiang Li Xiaofeng Li 《Opto-Electronic Advances》 2025年第1期45-57,共13页
Photonic platforms are gradually emerging as a promising option to encounter the ever-growing demand for artificial intelligence,among which photonic time-delay reservoir computing(TDRC)is widely anticipated.While suc... Photonic platforms are gradually emerging as a promising option to encounter the ever-growing demand for artificial intelligence,among which photonic time-delay reservoir computing(TDRC)is widely anticipated.While such a computing paradigm can only employ a single photonic device as the nonlinear node for data processing,the performance highly relies on the fading memory provided by the delay feedback loop(FL),which sets a restriction on the extensibility of physical implementation,especially for highly integrated chips.Here,we present a simplified photonic scheme for more flexible parameter configurations leveraging the designed quasi-convolution coding(QC),which completely gets rid of the dependence on FL.Unlike delay-based TDRC,encoded data in QC-based RC(QRC)enables temporal feature extraction,facilitating augmented memory capabilities.Thus,our proposed QRC is enabled to deal with time-related tasks or sequential data without the implementation of FL.Furthermore,we can implement this hardware with a low-power,easily integrable vertical-cavity surface-emitting laser for high-performance parallel processing.We illustrate the concept validation through simulation and experimental comparison of QRC and TDRC,wherein the simpler-structured QRC outperforms across various benchmark tasks.Our results may underscore an auspicious solution for the hardware implementation of deep neural networks. 展开更多
关键词 photonic reservoir computing machine learning vertical-cavity surface-emitting laser quasi-convolution coding augmented memory capabilities
在线阅读 下载PDF
上一页 1 2 48 下一页 到第
使用帮助 返回顶部