2,012 research outputs found

    Computation-Performance Optimization of Convolutional Neural Networks with Redundant Kernel Removal

    Full text link
    Deep Convolutional Neural Networks (CNNs) are widely employed in modern computer vision algorithms, where the input image is convolved iteratively by many kernels to extract the knowledge behind it. However, with the depth of convolutional layers getting deeper and deeper in recent years, the enormous computational complexity makes it difficult to be deployed on embedded systems with limited hardware resources. In this paper, we propose two computation-performance optimization methods to reduce the redundant convolution kernels of a CNN with performance and architecture constraints, and apply it to a network for super resolution (SR). Using PSNR drop compared to the original network as the performance criterion, our method can get the optimal PSNR under a certain computation budget constraint. On the other hand, our method is also capable of minimizing the computation required under a given PSNR drop.Comment: This paper was accepted by 2018 The International Symposium on Circuits and Systems (ISCAS

    Heartthrob in Cyberspace - The Characteristics of the Popular Online Daters

    Get PDF
    Online dating websites are currently popular application for Internet users to make new friends and find their partners. An interesting observation is that some people are more popular than others in online dating websites. The current study focus on the personal profile characteristics which make one a popular dater. By two field surveys, this study discusses the relationship between online daters\u27 personal profiles and their popularity

    Using Header Session Messages to Filter-out Junk E-mails

    Get PDF
    Due to the popularity of Internet, e-mail use is the major activity when surfing Internet. However, in recent years, spam has become a major problem that is bothering the use of the e-mail. Many anti-spam filtering techniques have been implemented so far, such as RIPPER rule learning algorithm, Naïve Bayesian classifier, Support Vector Machine, Centroid Based, Decision trees or Memory-base filter. Most existed anti-spamming techniques filter junk emails out according to e-mail subjects and body messages. Nevertheless, subjects and e-mail contents are not the only cues for spamming judgment. In this paper, we present a new idea of filtering junk e-mail by utilizing the header session messages. In message head session, besides sender\u27s mail address, receiver\u27s mail address and time etc, users are not interested in other information. This paper conducted two content analyses. The first content analysis adopted 10,024 Junk e-mails collected by Spam Archive (http://spamarchive.org) in a two-months period. The second content analysis adopted 3,482 emails contributed by three volunteers for a one week period. According to content analysis results, this result shows that at most 92.5% of junk e-mails would be filtered out using message-ID, mail user agent, sender and receiver addresses in the header session as cues. In addition, the idea this study proposed may induce zero over block errors rate. This characteristic of zero over block errors rate is an important advantage for the antispamming approach this study proposed. This proposed idea of using header session messages to filter-out junk e-mails may coexist with other anti-spamming approaches. Therefore, no conflict would be found between the proposed idea and existing anti-spamming approaches

    Seismicity variations prior to the 2016 ML 6.6 Meinong, Taiwan earthquake

    Full text link
    • …
    corecore