نتایج جستجو برای: embedding
تعداد نتایج: 73498 فیلتر نتایج به سال:
Network embedding assigns nodes in a network to lowdimensional representations and effectively preserves the network structure. Recently, a significant amount of progresses have been made toward this emerging network analysis paradigm. In this survey, we focus on categorizing and then reviewing the current development on network embedding methods, and point out its future research directions. W...
Researchers have developed a great number of embedding techniques in steganography. Matrix embedding, otherwise called the binning scheme, is one such technique that has been proven to be an efficient algorithm. Unlike conventional matrix embedding, which requires a maximum likelihood decoding algorithm to find the coset leader, this study proposes an adaptive algorithm called the linear indepe...
This paper investigates the cutting-edge techniques for word embedding, sense embedding, and our evaluation results on large-scale datasets. Word embedding refers to a kind of methods that learn a distributed dense vector for each word in a vocabulary. Traditional word embedding methods first obtain the co-occurrence matrix then perform dimension reduction with PCA. Recent methods use neural la...
The current state-of-the-art for image annotation and image retrieval tasks is obtained through deep neural networks, which combine an image representation and a text representation into a shared embedding space. In this paper we evaluate the impact of using the Full-Network embedding in this setting, replacing the original image representation in a competitive multimodal embedding generation s...
The problem of embedding arises in many machine learning applications with the assumption that there may exist a small number of variabilities which can guarantee the “semantics” of the original highdimensional data. Most of the existing embedding algorithms perform to maintain the locality-preserving property. In this study, inspired by the remarkable success of representation learning and dee...
Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bit planes. For steganalysis of PQ, we propose features extraction from the e...
One of the challenges for hydrologists is finding a new method for hydrologic classification of catchments. An appropriate classification method can be effective in many branches of hydrologic science like modeling. To deal with the complexity and nonlinearity of hydrologic processes, some researchers have proposed using the chaos theory for catchment classification. In this research, possibili...
As can be seen from the definition of extended operations on fuzzy numbers, subtraction and division of fuzzy numbers are not the inverse operations to addition and multiplication . Hence, to solve the fuzzy equations or a fuzzy system of linear equations analytically, we must use methods without using inverse operators. In this paper, a novel method to find the solutions in which 0 is not ...
a lot of research and various techniques have been devoted for finding the topologicaldescriptor wiener index, but most of them deal with only particular cases. there exist threeregular plane tessellations, composed of the same kind of regular polygons namely triangular,square, and hexagonal. using edge congestion-sum problem, we devise a method to computethe wiener index and demonstrate this m...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید