您当前的位置:首页 > 论文浏览

按提交时间

按机构

1. chinaXiv:201710.00001 [pdf]

Network of Recurrent Neural Networks

Wang, Chao-Ming
分类: 计算机科学 >> 自然语言理解与机器翻译

We describe a class of systems theory based neural networks called "Network Of Recurrent neural networks" (NOR), which introduces a new structure level to RNN related models. In NOR, RNNs are viewed as the high-level neurons and are used to build the high-level layers. More specifically, we propose several methodologies to design different NOR topologies according to the theory of system evolution. Then we carry experiments on three different tasks to evaluate our implementations. Experimental results show our models outperform simple RNN remarkably under the same number of parameters, and sometimes achieve even better results than GRU and LSTM.

提交时间: 2017-10-02 点击量109, 下载量54

2. chinaXiv:201709.00019 [pdf]

“一带一路”沿线国家或地区的个人主义文化地图

吴胜涛; 周阳; 朱廷劭
分类: 心理学 >> 社会心理学

目的 随着文化心理学和大数据分析技术的发展,绘制区域内不同国家或地区的文化地图、进而预测其行为价值观。 方法 利用社交媒体结合世界价值观(World Value Survey WVS)数据库建立个人主义对个性解放与社会信任的预测模型。 结果 “一带一路”沿线国家或地区在独立性、独特性这等个人主义文化指标上存在较大的变异。 局限 自主、选择、言论自由等个性解放价值观以及针对陌生人、外国人的普遍信任及则不能通过个人主义指标来预测。 结论 “一带一路”沿线国家或地区的文化是多样的,我们可以通过社交媒体计算的个人主义指标来快速预测相应国家或地区的价值观与社会信任指标。

提交时间: 2017-09-13 点击量528, 下载量139

3. chinaXiv:201708.00369 [pdf]

基于卷积神经网络的轴承故障定性诊断

单建华
分类: 机械工程 >> 机械工程其他学科

轴承定性诊断的传统方法需要复杂难懂的数学知识和高深的领域知识;基于深度置信网络的方法虽然克服了传统方法的缺点,但网络参数规模巨大,训练困难;基于时频图的卷积神经网络方法需用小波变换得到时频图。由于卷积神经网络具有强大的特征学习能力和泛化能力,提出了一种基于卷积神经网络的轴承故障定性诊断方法,直接利用一维振动信号对卷积神经网络进行训练。优势在于克服了传统方法的缺点;相比深度置信网络,网络参数少很多,训练高效;也无需小波变换得到时频图。采用西储大学和本实验室轴承数据,进行了一系列全面测试,表明本文方法能准确地定性诊断轴承故障,准确率高于其他所有方法;首次通过利用西储大学的轴承数据训练的卷积神经网络准确诊断了本实验室待测轴承的故障类型,这表明该方法能实际工程运用。

提交时间: 2017-08-29 点击量454, 下载量223

4. chinaXiv:201708.00367 [pdf]

内网IDS蜜罐型集成系统

孙韬
分类: 计算机科学 >> 信息安全

为了应对当前日益严峻的内网安全问题,我们制作了内网蜜罐集成系统,该集成系统应用第三代蜜网部署为基础,配合IDS和防火墙来构建,使用蜜网网关转移攻击流量,建立多台蜜罐服务器,能够第一时间检测并警告管理员,使应急响应满足P2DR模型的防护时间大于检测加响应时间,分析并记录攻击手段,实现了证据留存安全迅速和内网其他主机的安全。

提交时间: 2017-08-28 点击量456, 下载量345

5. chinaXiv:201706.00748 [pdf]

基于改进BP神经网络的A股投资实证研究

闫昱; 李皓辰; 王燕飞; 经玲
分类: 计算机科学 >> 计算机应用技术

量化投资一直是国内外学者关注的热点问题,针对使用BP神经网络预测股票市场的相关问题,本文在对数据进行统计学上的数据预处理后,交替采用了遗传算法和模拟退火算法优化了BP神经网络的参数,并对A股市场中的股票进行预测。在此基础上,进行了为期十年的模拟交易,最终获得了24.1%的年化收益率。

提交时间: 2017-06-22 点击量737, 下载量263

6. chinaXiv:201703.00895 [pdf]

Sharing deep generative representation for perceived image reconstruction from human brain activity

Du, Changde; Du, Changying; He, Huiguang
分类: 计算机科学 >> 计算机应用技术

Decoding human brain activities via functional magnetic resonance imaging (fMRI) has gained increasing attention in recent years. While encouraging results have been reported in brain states classification tasks, reconstructing the details of human visual experience still remains difficult. Two main challenges that hinder the development of effective models are the perplexing fMRI measurement noise and the high dimensionality of limited data instances. Existing methods generally suffer from one or both of these issues and yield dissatisfactory results. In this paper, we tackle this problem by casting the reconstruction of visual stimulus as the Bayesian inference of missing view in a multiview latent variable model. Sharing a common latent representation, our joint generative model of external stimulus and brain response is not only ``deep" in extracting nonlinear features from visual images, but also powerful in capturing correlations among voxel activities of fMRI recordings. The nonlinearity and deep structure endow our model with strong representation ability, while the correlations of voxel activities are critical for suppressing noise and improving prediction. We devise an efficient variational Bayesian method to infer the latent variables and the model parameters. To further improve the reconstruction accuracy, the latent representations of testing instances are enforced to be close to that of their neighbours from the training set via posterior regularization. Experiments on three fMRI recording datasets demonstrate that our approach can more accurately reconstruct visual stimuli.

提交时间: 2017-05-20 点击量5478, 下载量732

7. chinaXiv:201705.00836 [pdf]

基于互联网支付技术的货币自动兑换机

周志坚; 杨贵中; 刘宏杰; 汪银盘
分类: 计算机科学 >> 计算机应用技术

摘 要:随着互联网支付技术的快速发展,本文研究了一种利用微信支付技术实现自动兑换硬币功能的设备,用于解决日常生活中小面额货币的兑换问题,实现“零现金”出行。该设备具有小面额纸币兑换硬币和微信支付兑换硬币的功能。针对该设备的软硬件模块、整体布局、设备的稳定性和兑换的准确性,本文进行了相关设计和研究。实验结果表明,该设备安全稳定,能够满足日常生活中的兑换需求。

提交时间: 2017-05-15 点击量1470, 下载量249

8. chinaXiv:201703.00905 [pdf]

Applying Ricci flow to Manifold Learning

Li, Yangyang; Lu, Ruqian
分类: 计算机科学 >> 计算机软件

Traditional manifold learning algorithms often bear an assumption that the local neighborhood of any point on embedded manifold is roughly equal to the tangent space at that point without considering the curvature. The curvature indifferent way of manifold processing often makes traditional dimension reduction poorly neighborhood preserving. To overcome this drawback we propose a new algorithm called RF-ML to perform an operation on the manifold with help of Ricci flow before reducing the dimension of manifold.

提交时间: 2017-04-10 点击量464, 下载量304

9. chinaXiv:201703.00899 [pdf]

激光共聚焦显微成像数据采集系统设计

薛晓君
分类: 计算机科学 >> 计算机应用技术

激光共聚焦显微成像技术能够有效的排除非焦平面的信息,提高了光学显微成像的分辨率和对比度。针对激光共聚焦显微成像系统的点扫描成像过程,基于LabVIEW平台开发了数据采集系统,该系统不仅能够对数据进行采集,还能将数据准确的重建为图像并实时显示。数据采集系统采用生产者-消费者模型作为基础架构,通过两个同步信号分别实现了图像的帧同步和行同步,确保了重建图像的准确性。通过对生物样本进行试验,该系统能够将样本图像实时准确的显示出来,满足了整个显微成像系统的要求。

提交时间: 2017-03-28 点击量1592, 下载量368

10. chinaXiv:201703.00877 [pdf]

Optical hiding with visual cryptography

Shi, Yishi; Yang, Xiubo
分类: 物理学 >> 电磁学、光学、声学、传热、经典力学和流体动力学

Classical optical hiding methods are symmetric, being apt to realize but not secure. The security is improved in existing non-symmetric hiding techniques, yet all of them fails in convenient extractions, still not optically realized so far. Here, we propose an asymmetric optical hiding method based on visual cryptography, achieving the high security and the easy extraction at the same time. In the hiding process, we convert the secret information into a set of fabricated phase-keys, which are completely independent of each other, intensity-detected-proof, and image-covered, this complex hiding procedure leading to the high security. Correspondingly, during the extraction process, the covered phase-keys are illuminated with laser beams and then incoherent superposed to extract the hidden information directly by human visual system, without complicated optical implementations and any additional computation, resulting in the convenience of extracting. Optical experiments verify that both the high security and the easy extraction are obtainable in the visual-cryptography-based optical hiding.

提交时间: 2017-03-28 点击量1567, 下载量280

12345678910  尾页  转到  [14 页/ 138 条记录]