embedding performance
Recently Published Documents


TOTAL DOCUMENTS

21
(FIVE YEARS 14)

H-INDEX

2
(FIVE YEARS 2)

2022 ◽  
Vol 11 (2) ◽  
pp. 0-0

Nowadays, Reversible Data Hiding (RDH) is used extensively in information sensitive communication domains to protect the integrity of hidden data and the cover medium. However, most of the recently proposed RDH methods lack robustness. Robust RDH methods are required to protect the hidden data from security attacks at the time of communication between the sender and receiver. In this paper, we propose a Robust RDH scheme using IPVO based pairwise embedding. The proposed scheme is designed to prevent unintentional modifications caused to the secret data by JPEG compression. The cover image is decomposed into two planes namely HSB plane and LSB plane. As JPEG compression most likely modifies the LSBs of the cover image during compression, it is best not to hide the secret data into LSB planes. So, the proposed method utilizes a pairwise embedding to embed secret data into HSB plane of the cover image. High fidelity improved pixel value ordering (IPVO) based pairwise embedding ensures that the embedding performance of the proposed method is improved.


2021 ◽  
Vol 12 (06) ◽  
pp. 1-11
Author(s):  
Suresh Kannan Duraisamy ◽  
Bryce Bass ◽  
Sai Mukkavilli

In the last couple of decades, the software development process has evolved drastically, starting from Big Bang to Waterfall to Agile. The primary driver for the evolution of the software was the “Speed of Delivery” of the Software Product which has significantly accelerated from months to less than weeks and days. For IT (Information Technology) Organizations to be successful, they inevitably need a strong technology presence to roll out new software and features as quickly as possible to their customer base. The current user generation tends to use technology to maximum potential and is always striving to keep up with the new trends. The main subject is for the organizations to be ready with their Speed of Delivery strategy adapting to all technology modernization initiatives like CICD (Continuous Integration and Continuous Deployment), Agile, DevOps, and Cloud so that there are negligible customer friction and no risks to their Market shares,. The aim of this paper is to compare the performance testing in every stage of the agile model to the traditional end testing. The results of the corresponding testing phases are presented in this paper.


Author(s):  
Yiwei Song ◽  
Dongzhe Jiang ◽  
Yunhuai Liu ◽  
Zhou Qin ◽  
Chang Tan ◽  
...  

Efficient representations for spatio-temporal cellular Signaling Data (SD) are essential for many human mobility applications. Traditional representation methods are mainly designed for GPS data with high spatio-temporal continuity, and thus will suffer from poor embedding performance due to the unique Ping Pong Effect in SD. To address this issue, we explore the opportunity offered by a large number of human mobility traces and mine the inherent neighboring tower connection patterns. More specifically, we design HERMAS, a novel representation learning framework for large-scale cellular SD with three steps: (1) extract rich context information in each trajectory, adding neighboring tower information as extra knowledge in each mobility observation; (2) design a sequence encoding model to aggregate the embedding of each observation; (3) obtain the embedding for a trajectory. We evaluate the performance of HERMAS based on two human mobility applications, i.e. trajectory similarity measurement and user profiling. We conduct evaluations based on a 30-day SD dataset with 130,612 users and 2,369,267 moving trajectories. Experimental results show that (1) for the trajectory similarity measurement application, HERMAS improves the Hitting Rate (HR@10) from 15.2% to 39.2%; (2) for the user profiling application, HERMAS improves the F1-score for around 9%. More importantly, HERMAS significantly improves the computation efficiency by over 30x.


2021 ◽  
pp. 1-34
Author(s):  
Emmanuele Chersoni ◽  
Enrico Santus ◽  
Chu-Ren Huang ◽  
Alessandro Lenci

Abstract Word embeddings are vectorial semantic representations built with either counting or predicting techniques aimed at capturing shades of meaning from word co-occurrences. Since their introduction, these representations have been criticised for lacking interpretable dimensions. This property of word embeddings limits our understanding of the semantic features they actually encode. Moreover, it contributes to the “black box” nature of the tasks in which they are used, since the reasons of word embeddings performance often remain opaque to humans. In this contribution, we explore the semantic properties encoded in word embeddings by mapping them onto interpretable vectors, consisting of explicit and neurobiologically-motivated semantic features (Binder et al. 2016). Our exploration takes into account different types of embeddings, including factorized count vectors and predict models (e.g., Skip-Gram, GloVe, etc.), as well as the most recent contextualized representations (i.e., ELMo and BERT). In our analysis, we first evaluate the quality of the mapping in a retrieval task, then we shed lights on the semantic features that are better encoded in each embedding type. A large number of probing tasks is finally set to assess how the original and the mapped embeddings perform in discriminating semantic categories. For each probing task, we identify the most relevant semantic features and we show that there is a correlation between the embedding performance and how they encode those features. This study sets itself as a step forward in understanding which aspect of meaning are captured by vector spaces, by proposing a new and simple method to carve human-interpretable semantic representations from distributional vectors.


2021 ◽  
Vol 3 (1) ◽  
pp. 123-167
Author(s):  
Lars Hillebrand ◽  
David Biesner ◽  
Christian Bauckhage ◽  
Rafet Sifa

Unsupervised topic extraction is a vital step in automatically extracting concise contentual information from large text corpora. Existing topic extraction methods lack the capability of linking relations between these topics which would further help text understanding. Therefore we propose utilizing the Decomposition into Directional Components (DEDICOM) algorithm which provides a uniquely interpretable matrix factorization for symmetric and asymmetric square matrices and tensors. We constrain DEDICOM to row-stochasticity and non-negativity in order to factorize pointwise mutual information matrices and tensors of text corpora. We identify latent topic clusters and their relations within the vocabulary and simultaneously learn interpretable word embeddings. Further, we introduce multiple methods based on alternating gradient descent to efficiently train constrained DEDICOM algorithms. We evaluate the qualitative topic modeling and word embedding performance of our proposed methods on several datasets, including a novel New York Times news dataset, and demonstrate how the DEDICOM algorithm provides deeper text analysis than competing matrix factorization approaches.


Machines ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 19
Author(s):  
Zhuo Wang ◽  
Zhuang Li ◽  
Tao Wang ◽  
Bo Zhang

Large marine foundation piles are an important part of offshore structural pile foundations, and their lifting operations have always been a major problem in the construction and construction of marine structures. Based on IHC’s bilateral marine foundation pile spreader, this paper proposes a structural scheme of “internal and external clamping type variable diameter marine foundation pile spreader”. It solves the problem of poor adaptability of spreaders to foundation piles of the same specification and different pipe diameters. At the same time, this article has conducted in-depth research on the two clamping methods of friction clamping and wedge tooth embedded clamping. Through experiments, it is found that under the same lateral load, the load capacity of the wedge teeth tightening is three times that of the friction clamping. Aiming at the embedding and clamping method of the wedge teeth of the spreader, first of all, the influence of the tooth profile angle of the wedge teeth on their embedding performance was studied by the plastic mechanics slip line field theory and Abaqus simulation analysis. Subsequently, the elastic mechanics theory and Abaqus simulation analysis were used to study the stress characteristics of the wedge teeth during the lifting process, and the internal stress distribution was obtained. The article aims to provide a reference for the design of spreaders in actual projects.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-13
Author(s):  
Zhao Li ◽  
Haobo Wang ◽  
Donghui Ding ◽  
Shichang Hu ◽  
Zhen Zhang ◽  
...  

Nowadays, people have an increasing interest in fresh products such as new shoes and cosmetics. To this end, an E-commerce platform Taobao launched a fresh-item hub page on the recommender system, with which customers can freely and exclusively explore and purchase fresh items, namely, the New Tendency page. In this work, we make a first attempt to tackle the fresh-item recommendation task with two major challenges. First, a fresh-item recommendation scenario usually faces the challenge that the training data are highly deficient due to low page views. In this paper, we propose a deep interest-shifting network (DisNet), which transfers knowledge from a huge number of auxiliary data and then shifts user interests with contextual information. Furthermore, three interpretable interest-shifting operators are introduced. Second, since the items are fresh, many of them have never been exposed to users, leading to a severe cold-start problem. Though this problem can be alleviated by knowledge transfer, we further babysit these fully cold-start items by a relational meta-Id-embedding generator (RM-IdEG). Specifically, it trains the item id embeddings in a learning-to-learn manner and integrates relational information for better embedding performance. We conducted comprehensive experiments on both synthetic datasets as well as a real-world dataset. Both DisNet and RM-IdEG significantly outperform state-of-the-art approaches, respectively. Empirical results clearly verify the effectiveness of the proposed techniques, which are arguably promising and scalable in real-world applications.


Author(s):  
Manjunath Kamath K. ◽  
R. Sanjeev Kunte

Importances of reversible data hiding practices are always higher in contrast to any conventional data hiding schemes owing to its capability to generate distortion free cover media. Review of existing approaches on reversible data hiding approaches shows variable scheme mainly focussing on the embedding mechanism; however, such schemes could be furthermore improved using encoding scheme for optimal embedding performance. Therefore, the proposed manuscript discusses about a cost-effective scheme where a novel encoding scheme has been used with larger block sizes which reduces the dependencies over larger number of blocks. Further a gradient-based image registration technique is applied to ensure higher quality of the reconstructed signal over the decoding end. The study outcome shows that proposed data hiding technique is proven better than existing data hiding scheme with good balance between security and restored signal quality upon extraction of data.


Sign in / Sign up

Export Citation Format

Share Document