317 research outputs found
Smart Image Search System Using Personalized Semantic Search Method
Due to the emerge in huge numbers of information on the internet nowadays, search technologies are widely used in various fields. Achieving the most relevant search result for the users becomes a big challenge now. While the traditional semantic search technologies seem to achieve the most relevant search result, however, it faces two problems: one is the one-size-fits-all problem, and another is low efficiency. The purpose of this research is to build a Smart Image Search System by using the personalized semantic search method to solve those problems. The personalized semantic search method makes the search system avoids the one-size-fits-all issue, and increase the efficiency. In the Smart Image Search System, the personalized semantic search method provides users three options to search. They are non-option search, general-option search, and private-option search. Each option search has its specific user needs to achieve the most relevant results. Those options are adopted to solve the one-size-fits-all problem. Also, based on the idea of semantic context concept, the personalized semantic method uses two approaches to increase the search efficiency. First, it applies Apache OpenNLP Library to avoid useless words. Second, it considers the searchers’ actions such as click and feedbacks to affect the associated words and associated weight. The Smart Image Search System uses the associated words and associated weight to calculate the relativity for the search results. This approach makes the Smart Image Search System becomes a self-improved system. Smart Image Search System is implemented based on the presented methodology and design. As a result of current research on semantic search technologies, we conclude that the Smart Image Search System can avoid useless words, fix the one-size-fits-all problem, and self-improve its relevancy
Quasi-B-mode generated by high-frequency gravitational waves and corresponding perturbative photon fluxes
Interaction of very low-frequency primordial(relic) gravitational waves(GWs)
to cosmic microwave background(CMB) can generate B-mode polarization. Here, for
the first time we point out that the electromagnetic(EM) response to
high-frequency GWs(HFGWs) would produce quasi-B-mode distribution of the
perturbative photon fluxes, and study the duality and high complementarity
between such two B-modes. Based on this quasi-B-mode in HFGWs, it is shown that
the distinguishing and observing of HFGWs from the braneworld would be quite
possible due to their large amplitude, higher frequency and very different
physical behaviors between the perturbative photon fluxes and background
photons, and the measurement of relic HFGWs may also be possible though face to
enormous challenge.Comment: 22 pages, 6 figures, research articl
Sharpness-Aware Minimization with Dynamic Reweighting
Deep neural networks are often overparameterized and may not easily achieve
model generalization. Adversarial training has shown effectiveness in improving
generalization by regularizing the change of loss on top of adversarially
chosen perturbations. The recently proposed sharpness-aware minimization (SAM)
algorithm conducts adversarial weight perturbation, encouraging the model to
converge to a flat minima. SAM finds a common adversarial weight perturbation
per-batch. Although per-instance adversarial weight perturbations are stronger
adversaries and they can potentially lead to better generalization performance,
their computational cost is very high and thus it is impossible to use
per-instance perturbations efficiently in SAM. In this paper, we tackle this
efficiency bottleneck and propose sharpness-aware minimization with dynamic
reweighting ({\delta}-SAM). Our theoretical analysis motivates that it is
possible to approach the stronger, per-instance adversarial weight
perturbations using reweighted per-batch weight perturbations. {\delta}-SAM
dynamically reweights perturbation within each batch according to the
theoretically principled weighting factors, serving as a good approximation to
per-instance perturbation. Experiments on various natural language
understanding tasks demonstrate the effectiveness of {\delta}-SAM
Vehicle Re-identification in Still Images: Application of Semi-supervised Learning and Re-ranking
Vehicle re-identification (re-ID), namely, finding exactly the same vehicle from a large number of vehicle images, remains a great challenge in computer vision. Most existing vehicle re-ID approaches follow a fully supervised learning methodology, in which sufficient labeled training data is required. However, this limits their scalability to realistic applications, due to the high cost of data labeling. In this paper, we adopted a Generative Adversarial Network (GAN) to generate unlabeled samples and enlarge the training set. A semi supervised learning scheme with the Convolutional Neural Networks (CNN) was proposed accordingly, which assigns a uniform label distribution to the unlabeled images to regularize the supervised model and improve the performance of the vehicle re-ID system. Besides, an improved re-ranking method based on the Jaccard distance and k-reciprocal nearest neighbors is proposed to optimize the initial rank list. Extensive experiments over the benchmark datasets VeR1-776, VehicleID and VehicleReID have demonstrated that the proposed method outperforms the state-of-the-art approaches for vehicle re-ID
Determine Factors of NFC Mobile Payment Continuous Adoption in Shopping Malls:Evidence From Indonesia
Near Field Communication (NFC) mobile payment systems allow users to utilize services through smartphones. There is insufficient literature exploring the adoption of NFC with payment scenarios in developing countries. This study aims to explore the influential factors of consumer adoption of NFC, taking payment behaviors through NFC in Indonesia as an example. One hundred forty-seven participants were enrolled in the 5-point Likert scale survey, and 124 valid samples were analyzed with Partial Least Squares Structural Equation Modeling (PLS-SEM). The results show that trust mediates the effect of context on consumers’ continuous intention to use NFC mobile payment. Additionally, trust mediates the effect of perceived risk on consumers’ continuous intention to use. The perceived ease of use and perceived usefulness have no effects on consumers’ continuous intention to use. The mediating effect of religiosity has not been observed in this study. The findings can enbale service providers and local governments to offer better mobile payment services
Crystal: Enhancing Blockchain Mining Transparency with Quorum Certificate
Researchers have discovered a series of theoretical attacks against Bitcoin's
Nakamoto consensus; the most damaging ones are selfish mining, double-spending,
and consistency delay attacks. These attacks have one common cause: block
withholding. This paper proposes Crystal, which leverages quorum certificates
to resist block withholding misbehavior. Crystal continuously elects committees
from miners and requires each block to have a quorum certificate, i.e., a set
of signatures issued by members of its committee. Consequently, an attacker has
to publish its blocks to obtain quorum certificates, rendering block
withholding impossible. To build Crystal, we design a novel two-round committee
election in a Sybil-resistant, unpredictable and non-interactive way, and a
reward mechanism to incentivize miners to follow the protocol. Our analysis and
evaluations show that Crystal can significantly mitigate selfish mining and
double-spending attacks. For example, in Bitcoin, an attacker with 30% of the
total computation power will succeed in double-spending attacks with a
probability of 15.6% to break the 6-confirmation rule; however, in Crystal, the
success probability for the same attacker falls to 0.62%. We provide formal
end-to-end safety proofs for Crystal, ensuring no unknown attacks will be
introduced. To the best of our knowledge, Crystal is the first protocol that
prevents selfish mining and double-spending attacks while providing safety
proof.Comment: 17 pages, 9 figure
- …