Results 31 to 40 of about 3,136,925 (183)

Anaphora Resolution Algorithm Based on Multilayer Attention Mechanism [PDF]

open access: yesJisuanji gongcheng, 2020
In the information extraction process,the nondeterministic anaphora can cause incomplete information extraction.By analyzing the only discriminate information generated by the anaphoric part,the referenced part,the surrounding information,the referenced ...
LIU Yujiang, FU Lijun, LIU Junming, Lü Pengfei
doaj   +1 more source

Keyphrase Generation Based on Deep Seq2seq Model

open access: yesIEEE Access, 2018
Keyphrase can provide highly summative information which can help us improve information utilization efficiency in the era of information overload. Though previous researches about keyphrase generation have provided some workable solutions, they generate
Yong Zhang, Weidong Xiao
doaj   +1 more source

Multiple-Attention Mechanism Network for Semantic Segmentation

open access: yesSensors, 2022
Contextual information and the dependencies between dimensions is vital in image semantic segmentation. In this paper, we propose a multiple-attention mechanism network (MANet) for semantic segmentation in a very effective and efficient way.
Dongli Wang   +5 more
doaj   +1 more source

IDS-attention: an efficient algorithm for intrusion detection systems using attention mechanism

open access: yesJournal of Big Data, 2021
Network attacks are illegal activities on digital resources within an organizational network with the express intention of compromising systems. A cyber attack can be directed by individuals, communities, states or even from an anonymous source.
FatimaEzzahra Laghrissi   +3 more
doaj   +1 more source

Attention: the mechanisms of consciousness. [PDF]

open access: yesProceedings of the National Academy of Sciences, 1994
A number of recent papers and books discuss theoretical efforts toward a scientific understanding of consciousness. Progress in imaging networks of brain areas active when people perform simple tasks may provide a useful empirical background for distinguishing conscious and unconscious information processing. Attentional networks include those involved
openaire   +2 more sources

Contextual Attention for Hand Detection in the Wild [PDF]

open access: yes, 2019
We present Hand-CNN, a novel convolutional network architecture for detecting hand masks and predicting hand orientations in unconstrained images. Hand-CNN extends MaskRCNN with a novel attention mechanism to incorporate contextual cues in the detection ...
Hoai, Minh   +4 more
core   +2 more sources

Research on detection method of unsound brewing sorghum kernel based on deep learning [PDF]

open access: yesZhongguo niangzao
In order to overcome the problems of low efficiency, low accuracy and poor repeatability existing in the quality detection of unsound sorghum kernel in the brewing industry, a novel method based on deep learning for unsound sorghum kernel determination ...
WANG Lin, CHU Yihong, OU Jinhua, YIN Guanjun, JIANG Yuanhong, CHEN Bo, SHEN Chuan, LI Yongmeng
doaj   +1 more source

Speech Emotion Recognition Using Multi-hop Attention Mechanism

open access: yes, 2019
In this paper, we are interested in exploiting textual and acoustic data of an utterance for the speech emotion classification task. The baseline approach models the information from audio and text independently using two deep neural networks (DNNs). The
Byun, Seokhyun   +3 more
core   +1 more source

Neural mechanisms of object-based attention [PDF]

open access: yesJournal of Vision, 2014
House or Face? The neural mechanisms of spatial attention are well known, unlike nonspatial attention. Baldauf and Desimone (p. 424 , published online 10 April) combined several technologies to identify a fronto-temporal network in humans that mediates nonspatial object-based ...
Baldauf, Daniel, Desimone, Robert
openaire   +3 more sources

Fooling Vision and Language Models Despite Localization and Attention Mechanism

open access: yes, 2018
Adversarial attacks are known to succeed on classifiers, but it has been an open question whether more complex vision systems are vulnerable. In this paper, we study adversarial examples for vision and language models, which incorporate natural language ...
Chen, Xinyun   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy