Academic literature on the topic 'Initialization file'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Initialization file.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Initialization file"

1

Tang, Hong Ying, Zhen Jiang Qian, and Hao Huang. "Modeling and Proof of a File System Based on Micro-Kernel." Advanced Materials Research 765-767 (September 2013): 837–40. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.837.

Full text
Abstract:
As the manager of the data stored in the disk, the security of the file system is an important aspect of the operating system. Given the high logicalness and unambiguousness of the formal methods, also the module independence of the micro-kernel, this paper abstracts a formal model from the file system implementation based on micro-kernel, and then gives the axiomatic semantics of the initialization; finally, gives the correctness assertions of file system initialization, then verify the correctness of the formal model of file system aided with Isabelle/HOL.
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Chin-Hsien, Tei-Wei Kuo, and Li-Pin Chang. "The Design of efficient initialization and crash recovery for log-based file systems over flash memory." ACM Transactions on Storage 2, no. 4 (November 2006): 449–67. http://dx.doi.org/10.1145/1210596.1210600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yang, Yan Xin, Huan Zou, and Xue Ping Zhang. "Task Download Technique Research of Ethernet Parallel System Based on Multi-DSP." Applied Mechanics and Materials 347-350 (August 2013): 1589–93. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.1589.

Full text
Abstract:
In order to accomplish the real-time simulation application of embedded Ethernet parallel system, the DSP boot mode and the loading process are researched according to the analysis of the parallel simulation system structure and the basic characteristic of BF548 loader file structure. It has proposed a multiple-load method which is a kind of download method based on initialization code. Task program can automatic download after DSP launched in this way, and the problem of complex download procedure of DSP parallel system is solved. Through the actual test, the feasibility and validity of the download method have been verified, that provide a convenient and flexible experimental method and implementation technique of parallel simulation.
APA, Harvard, Vancouver, ISO, and other styles
4

Sanni*, Rachana R., and H. S. Guruprasad. "Hospital Management using OAM [Operation Administration & Maintenance] Tool." International Journal of Innovative Technology and Exploring Engineering 10, no. 10 (August 30, 2021): 24–30. http://dx.doi.org/10.35940/ijitee.j9391.08101021.

Full text
Abstract:
This paper proposes a software tool to monitor the system configuration for Hospital Management System. The OAM tool monitors the system configurations after the user installs it into the system. The aim of this software is to monitor the system about its configurations and install the required softwares to the respective system. There are four tools in this application, Fintal, Piston, Naavi and Mapel. To install these, a technique of single file installation using batch scripting is used. Batch scripting is used to execute the installation files of softwares and the softwares are installed. These installation files of softwares will be embedded as execution commands in a single file called “windows batch file”, which should be saved with the extension as “.bat”. The installation that starts will be displayed in the command prompt to know whether the softwares are getting installed correctly. After each installation, the configuration and initialization of installed softwares will be displayed. The required softwares are to be installed. Each of these performs particular tasks that are required for the management of Hospitals. Fintal is used for overall management of Hospital. This is the most user-friendly part of OAM Tool. This handles overall administrative part of Hospitals. Piston is used for storing patient’s details. This stores the patients’ reports in detailed manner of each test the patient has undergone. Naavi is used for storing Laboratory details. The tests of each patient are stored here. And the last one, i.e., Mapel which is used for storing pharmaceuticals details (Medicines). It stores the details of medicines such as from which pharmaceuticals the medicines are purchased. The license of the hospital is also stored in this part of OAM Tool. All these together form an OAM Tool. This tool also manages other required softwares like, MySQL, ODBC drivers, etc. The management of Hospitals is very important as there is a need to maintain the patient details. This technique of installation is proposed in this paper to make the installation from hardware to remote installation such as, giving the access to the system in which the tool needs to be installed and to save the time of installation process.
APA, Harvard, Vancouver, ISO, and other styles
5

Baek, Sung Hoon, and Ki-Woong Park. "A Durable Hybrid RAM Disk with a Rapid Resilience for Sustainable IoT Devices." Sensors 20, no. 8 (April 11, 2020): 2159. http://dx.doi.org/10.3390/s20082159.

Full text
Abstract:
Flash-based storage is considered to be a de facto storage module for sustainable Internet of things (IoT) platforms under a harsh environment due to its relatively fast speed and operational stability compared to disk storage. Although their performance is considerably faster than disk-based mechanical storage devices, the read and write latency still could not catch up with that of Random-access memory (RAM). Therefore, RAM could be used as storage devices or systems for time-critical IoT applications. Despite such advantages of RAM, a RAM-based storage system has limitations in its use for sustainable IoT devices due to its nature of volatile storage. As a remedy to this problem, this paper presents a durable hybrid RAM disk enhanced with a new read interface. The proposed durable hybrid RAM disk is designed for sustainable IoT devices that require not only high read/write performance but also data durability. It includes two performance improvement schemes: rapid resilience with a fast initialization and direct byte read (DBR). The rapid resilience with a fast initialization shortens the long booting time required to initialize the durable hybrid RAM disk. The new read interface, DBR, enables the durable hybrid RAM disk to bypass the disk cache, which is an overhead in RAM-based storages. DBR performs byte–range I/O, whereas direct I/O requires block-range I/O; therefore, it provides a more efficient interface than direct I/O. The presented schemes and device were implemented in the Linux kernel. Experimental evaluations were performed using various benchmarks at the block level till the file level. In workloads where reads and writes were mixed, the durable hybrid RAM disk showed 15 times better performance than that of Solid-state drive (SSD) itself.
APA, Harvard, Vancouver, ISO, and other styles
6

Rosen, C., U. Jeppsson, and P. A. Vanrolleghem. "Towards a common benchmark for long-term process control and monitoring performance evaluation." Water Science and Technology 50, no. 11 (December 1, 2004): 41–49. http://dx.doi.org/10.2166/wst.2004.0669.

Full text
Abstract:
The COST/IWA benchmark simulation model has been available for seven years. Its primary purpose has been to create a platform for control strategy benchmarking of biological wastewater treatment processes. The fact that the benchmark has resulted in more than 100 publications, not only in Europe but also worldwide, demonstrates the interest for such a tool in the research community. In this paper, an extension of the benchmark simulation model no. 1 (BSM1) is proposed. It aims at facilitating evaluation of two closely related operational tasks: long-term control strategy performance and process monitoring performance. The motivation for the extension is that these two tasks typically act on longer time scales. The extension proposed here consists of 1) prolonging the evaluation period to one year (including influent files), 2) specifying time varying process parameters and 3) including sensor and actuator failures. The prolonged evaluation period is necessary to obtain a relevant and realistic assessment of the effects of such disturbances. Also, a prolonged evaluation period allows for a number of long-term control actions/handles that cannot be evaluated in a realistic fashion in the one week BSM1 evaluation period. In the paper, models for influent file design, parameter changes and sensor failures, initialization procedure and evaluation criteria are discussed. Important remaining topics, for which consensus is required, are identified. The potential of a long-term benchmark is illustrated with an example of process monitoring algorithm benchmarking.
APA, Harvard, Vancouver, ISO, and other styles
7

LIU, NING, JING FU, CHRISTOPHER D. CAROTHERS, ONKAR SAHNI, KENNETH E. JANSEN, and MARK S. SHEPHARD. "MASSIVELY PARALLEL I/O FOR PARTITIONED SOLVER SYSTEMS." Parallel Processing Letters 20, no. 04 (December 2010): 377–95. http://dx.doi.org/10.1142/s0129626410000302.

Full text
Abstract:
This paper investigates I/O approaches for massively parallel partitioned solver systems. Typically, such systems have synchronized "loops" and write data in a well defined block I/O format consisting of a header and data portion. Our target use for such a parallel I/O subsystem is checkpoint-restart where writing is by far the most common operation and reading typically only happens during either initialization or during a restart operation because of a system failure. We compare four parallel I/O strategies: POSIX File Per Processor (1PFPP), "Poor-Man's" Parallel I/O (PMPIO), a synchronized parallel I/O (syncIO), and a "reduced blocking" strategy (rbIO). Performance tests executed on the Blue Gene/P at Argonne National Laboratory using real CFD solver data from PHASTA (an unstructured grid finite element Navier-Stokes solver) show that the syncIO strategy can achieve a read bandwidth of 47.4 GB/sec and a write bandwidth of 27.5 GB/sec using 128K processors. The "reduced-blocking" rbIO strategy achieves an actual writing performance of 17.8 GB/sec and the perceived writing performance is 166 TB/sec on Blue Gene/P using 128K processors.
APA, Harvard, Vancouver, ISO, and other styles
8

Cho, Jae Hyuk, Yunhee Kang, and Young B. Park. "Secure Delivery Scheme of Common Data Model for Decentralized Cloud Platforms." Applied Sciences 10, no. 20 (October 13, 2020): 7134. http://dx.doi.org/10.3390/app10207134.

Full text
Abstract:
The Common Data Model (CDM) is being used to deal with problems caused by the various electronic medical record structures in the distributed hospital information system. The concept of CDM is emerging as a collaborative method of exchanging data from each hospital in the same format and conducting various clinical studies based on shared data. The baseline of a CDM system is centralized with an infrastructure typically controlled by a single entity with full authority. The characteristics of this centralized system can pose serious security issues. Therefore, the proposed SC-CDM system is designed as a platform for distributed ledger and provides data with a high level of confidentiality, security, and scalability. This framework provides a reference model that supports multiple channels, using secure CDM as an encryption method. The data confidentiality of CDM is guaranteed by asymmetric and symmetric protocols. Delivering CDM is protected by a symmetric key signed by the CDM creator and maintains lightweight distributed ledger transactions on Inter Planetary File System (IPFS), which acts as a file share. To deliver an encrypted CDM on the SC-CDM platform, the CDM is encrypted with a block cipher by a random symmetric key and Initialization Vector (IV). The symmetric key protocol is used for the fast encryption of large-capacity data. The SC-CDM is implemented the repository with IPFS for storing the encrypted CDM, in which symmetric key, two hash values, and IV are shared through blockchain. Data confidentiality of SC-CDM is guaranteed by only registered users accessing the data. In conclusion, the SC-CDM is the first approach to demultiplexing with the data confidentiality proof based on asymmetric key cryptography. We analyze and verify the security of SC-CDM by comparing qualitative factors and performance with existing CDM. Moreover, we adopt a byte-level processing method with encryption to ensure efficiency while handling a large CDM.
APA, Harvard, Vancouver, ISO, and other styles
9

Willighagen, Lars G. "Citation.js: a format-independent, modular bibliography tool for the browser and command line." PeerJ Computer Science 5 (August 12, 2019): e214. http://dx.doi.org/10.7717/peerj-cs.214.

Full text
Abstract:
Background Given the vast number of standards and formats for bibliographical data, any program working with bibliographies and citations has to be able to interpret such data. This paper describes the development of Citation.js (https://citation.js.org/), a tool to parse and format according to those standards. The program follows modern guidelines for software in general and JavaScript in specific, such as version control, source code analysis, integration testing and semantic versioning. Results The result is an extensible tool that has already seen adaption in a variety of sources and use cases: as part of a server-side page generator of a publishing platform, as part of a local extensible document generator, and as part of an in-browser converter of extracted references. Use cases range from transforming a list of DOIs or Wikidata identifiers into a BibTeX file on the command line, to displaying RIS references on a webpage with added Altmetric badges to generating ”How to cite this” sections on a blog. The accuracy of conversions is currently 27% for properties and 60% for types on average and a typical initialization takes 120 ms in browsers and 1 s with Node.js on the command line. Conclusions Citation.js is a library supporting various formats of bibliographic information in a broad selection of use cases and environments. Given the support for plugins, more formats can be added with relative ease.
APA, Harvard, Vancouver, ISO, and other styles
10

Ndichu, Samuel, Sylvester McOyowo, Henry Okoyo, and Cyrus Wekesa. "A Remote Access Security Model based on Vulnerability Management." International Journal of Information Technology and Computer Science 12, no. 5 (October 8, 2020): 38–51. http://dx.doi.org/10.5815/ijitcs.2020.05.03.

Full text
Abstract:
Information security threats exploit vulnerabilities in communication networks. Remote access vulnerabilities are evident from the point of communication initialization following the communication channel to data or resources being accessed. These threats differ depending on the type of device used to procure remote access. One kind of these remote access devices can be considered as safe as the organization probably issues it to provide for remote access. The other type is risky and unsafe, as they are beyond the organization’s control and monitoring. The myriad of devices is, however, a necessary evil, be it employees on public networks like cyber cafes, wireless networks, vendors support, or telecommuting. Virtual Private Network (VPN) securely connects a remote user or device to an internal or private network using the internet and other public networks. However, this conventional remote access security approach has several vulnerabilities, which can take advantage of encryption. The significant threats are malware, botnets, and Distributed Denial of Service (DDoS). Because of the nature of a VPN, encryption will prevent traditional security devices such as a firewall, Intrusion Detection System (IDS), and antivirus software from detecting compromised traffic. These vulnerabilities have been exploited over time by attackers using evasive techniques to avoid detection leading to costly security breaches and compromises. We highlight numerous shortcomings for several conventional approaches to remote access security. We then adopt network tiers to facilitate vulnerability management (VM) in remote access domains. We perform regular traffic simulation using Network Security Simulator (NeSSi2) to set bandwidth baseline and use this as a benchmark to investigate malware spreading capabilities and DDoS attacks by continuous flooding in remote access. Finally, we propose a novel approach to remote access security by passive learning of packet capture file features using machine learning and classification using a classifier model.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Initialization file"

1

Boehler, Michael David. "Transient Aerothermodynamics of Flow Initialization for a Flat Plate Film Cooling Experiment in a Medium Duration Blowdown Wind Tunnel Facility." The Ohio State University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=osu1284767673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chvátal, Michal. "Řízení dodávky vody v rodinném domě." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442453.

Full text
Abstract:
The diploma thesis deals with the design and implementation of the system that will control the water supply for the family house and its garden. The system aslo allows you to store a history that can be viewed via the web interface. The web interface also allows you to set system parameters and monitor the current status.
APA, Harvard, Vancouver, ISO, and other styles
3

Burkholder, Benjamin J. "On the spatial assessment of forest fire smoke exposure and its health effects, part II: CALMET initialization methodology." 2009. http://hdl.handle.net/2429/13645.

Full text
Abstract:
This document provides an introduction to the meteorological modeling done by Benjamin Burkholder for Sarah Henderson’s thesis research on the forest fire smoke exposure and its health impacts in British Columbia.
APA, Harvard, Vancouver, ISO, and other styles
4

Burkholder, Benjamin J. "On the spatial assessment of forest fire smoke exposure and its health effects, part I: Initialization of the CALMET meteorological model." 2009. http://hdl.handle.net/2429/13646.

Full text
Abstract:
This document provides an introduction to the meteorological modeling done by Benjamin Burkholder for Sarah Henderson’s thesis research on the forest fire smoke exposure and its health impacts in British Columbia.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Initialization file"

1

Kreines, David C. Oracle Initialization Parameters: Pocket Reference. Beijing: O'Reilly, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Initialization file"

1

Janecek, Andreas, and Ying Tan. "Swarm Intelligence for Non-Negative Matrix Factorization." In Recent Algorithms and Applications in Swarm Intelligence Research, 168–92. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2479-5.ch009.

Full text
Abstract:
The Non-negative Matrix Factorization (NMF) is a special low-rank approximation which allows for an additive parts-based and interpretable representation of the data. This article presents efforts to improve the convergence, approximation quality, and classification accuracy of NMF using five different meta-heuristics based on swarm intelligence. Several properties of the NMF objective function motivate the utilization of meta-heuristics: this function is non-convex, discontinuous, and may possess many local minima. The proposed optimization strategies are two-fold: On the one hand, a new initialization strategy for NMF is presented in order to initialize the NMF factors prior to the factorization; on the other hand, an iterative update strategy is proposed, which improves the accuracy per runtime for the multiplicative update NMF algorithm. The success of the proposed optimization strategies are shown by applying them on synthetic data and data sets coming from the areas of spam filtering/email classification, and evaluate them also in their application context. Experimental results show that both optimization strategies are able to improve NMF in terms of faster convergence, lower approximation error, and better classification accuracy. Especially the initialization strategy leads to significant reductions of the runtime per accuracy ratio for both, the NMF approximation as well as the classification results achieved with NMF.
APA, Harvard, Vancouver, ISO, and other styles
2

Janecek, Andreas, and Ying Tan. "Swarm Intelligence for Dimensionality Reduction." In Emerging Research on Swarm Intelligence and Algorithm Optimization, 285–309. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6328-2.ch013.

Full text
Abstract:
Low-rank approximations allow for compact representations of data with reduced storage and runtime requirements and reduced redundancy and noise. The Non-Negative Matrix Factorization (NMF) is a special low-rank approximation that allows for additive parts-based, interpretable representation of the data. Various properties of NMF are similar to Swarm Intelligence (SI) methods: indeed, most NMF objective functions and most SI fitness functions are non-convex, discontinuous, and may possess many local minima. This chapter summarizes efforts on improving convergence, approximation quality, and classification accuracy of NMF using five different meta-heuristics based on SI and evolutionary computation. The authors present (1) new initialization strategies for NMF, and (2) an iterative update strategy for NMF. The applicability of the approach is illustrated on data sets coming from the areas of spam filtering and email classification. Experimental results show that both optimization strategies are able to improve NMF in terms of faster convergence, lower approximation error, and/or better classification accuracy.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Initialization file"

1

Wu, Chin-Hsien, Tei-Wei Kuo, and Li-Pin Chang. "Efficient initialization and crash recovery for log-based file systems over flash memory." In the 2006 ACM symposium. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1141277.1141486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Young Jun Cho and Jae Wook Jeon. "Design of an efficient initialization method of a log-based file system with flash memory." In 2008 6th IEEE International Conference on Industrial Informatics (INDIN). IEEE, 2008. http://dx.doi.org/10.1109/indin.2008.4618363.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Srivastava, Abhishek, Tom O’Dell, and Istvan Boszormenyi. "Impact of Shallow Void Corrosion on HDD Initialization Failures." In ASME-JSME 2018 Joint International Conference on Information Storage and Processing Systems and Micromechatronics for Information and Precision Equipment. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/isps-mipe2018-8583.

Full text
Abstract:
This paper investigates how corrosion growth that originates from shallow film voids on thin film sputtered magnetic media can impact the final HDD system performance. The impact of shallow void corrosion [1] in HDD system can be both on its behavior during initialization i.e. servo write formatting and initial defect mapping, and on its long term reliability. One of the main concerns for HDD reliability due to media is the occurrence of a condition called metallic smear. Metallic smear is a contamination of the head-pole area that causes an unstable fly height condition. Metallic smear is possibly caused by media corrosion and therefore void corrosion is a logical concern. However, our study shows that shallow void corrosion is not associated with metallic smear risk and does not contribute to HDD initialization failures.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Wenjie, Zeyu Sun, Qihao Zhu, Ge Li, Shaowei Cai, Yingfei Xiong, and Lu Zhang. "NLocalSAT: Boosting Local Search with Solution Prediction." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. California: International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/164.

Full text
Abstract:
The Boolean satisfiability problem (SAT) is a famous NP-complete problem in computer science. An effective way for solving a satisfiable SAT problem is the stochastic local search (SLS). However, in this method, the initialization is assigned in a random manner, which impacts the effectiveness of SLS solvers. To address this problem, we propose NLocalSAT. NLocalSAT combines SLS with a solution prediction model, which boosts SLS by changing initialization assignments with a neural network. We evaluated NLocalSAT on five SLS solvers (CCAnr, Sparrow, CPSparrow, YalSAT, and probSAT) with instances in the random track of SAT Competition 2018. The experimental results show that solvers with NLocalSAT achieve 27% ~ 62% improvement over the original SLS solvers.
APA, Harvard, Vancouver, ISO, and other styles
5

Sudowe, Patrick, and Bastian Leibe. "PatchIt: Self-Supervised Network Weight Initialization for Fine-grained Recognition." In British Machine Vision Conference 2016. British Machine Vision Association, 2016. http://dx.doi.org/10.5244/c.30.75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sekaj, Ivan, and Michal Oravec. "Selected population characteristics of fine-grained parallel genetic algorithms with re-initialization." In the first ACM/SIGEVO Summit. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1543834.1543980.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhou, Xin, Tulga Ersal, Jeffrey L. Stein, and Dennis S. Bernstein. "Battery Health Diagnostics Using Retrospective-Cost Subsystem Identification: Sensitivity to Noise and Initialization Errors." In ASME 2013 Dynamic Systems and Control Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/dscc2013-3953.

Full text
Abstract:
Health management of Li-ion batteries requires knowledge of certain battery internal dynamics (e.g., lithium consumption and film growth at the solid-electrolyte interface) whose inputs and outputs are not directly measurable with noninvasive methods. Therefore, identification of those dynamics can be classified as an inaccessible subsystem identification problem. To address this problem, the retrospective-cost subsystem identification (RCSI) method is adopted in this paper. Specifically, a simulation-based study is presented that represents the battery using an electrochemistry-based battery charge/discharge model of Doyle, Fuller, and Newman augmented with a battery-health model by Ramadass. The solid electrolyte interface (SEI) film growth portion of the battery-health model is defined as the inaccessible subsystem to be identified using RCSI. First, it is verified that RCSI with a first-order subsystem structure can accurately estimate the film growth when noise or modeling errors are ignored. Parameter convergence issues are highlighted. Second, allowable input and output noise levels for desirable film growth tracking performance are determined by studying the relationship between voltage change and film growth in the truth model. The performance of RCSI with measurement noise is illustrated. The results show that RCSI can identify the film growth within 1.5% when the output measurement noise level is comparable to the change in output voltage between successive cycles due to film growth, or when the input measurement noise is comparable to the difference in current that results in a difference in voltage that is the same as the voltage change between successive cycles. Finally, the sensitivity of the performance of RSCI to initial condition errors in the battery charge/discharge model is investigated. The results show that when the initial conditions have an error of 1%, the identified results change by 7%. These results will help with selecting the appropriate sensors for the experiments with the hardware.
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Dong-Dong, Wei Wang, Wei Gao, and Zhi-Hua Zhou. "Tri-net for Semi-Supervised Deep Learning." In Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/278.

Full text
Abstract:
Deep neural networks have witnessed great successes in various real applications, but it requires a large number of labeled data for training. In this paper, we propose tri-net, a deep neural network which is able to use massive unlabeled data to help learning with limited labeled data. We consider model initialization, diversity augmentation and pseudo-label editing simultaneously. In our work, we utilize output smearing to initialize modules, use fine-tuning on labeled data to augment diversity and eliminate unstable pseudo-labels to alleviate the influence of suspicious pseudo-labeled data. Experiments show that our method achieves the best performance in comparison with state-of-the-art semi-supervised deep learning methods. In particular, it achieves 8.30% error rate on CIFAR-10 by using only 4000 labeled examples.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhu, Yaohui, Chenlong Liu, and Shuqiang Jiang. "Multi-attention Meta Learning for Few-shot Fine-grained Image Recognition." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. California: International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/152.

Full text
Abstract:
The goal of few-shot image recognition is to distinguish different categories with only one or a few training samples. Previous works of few-shot learning mainly work on general object images. And current solutions usually learn a global image representation from training tasks to adapt novel tasks. However, fine-gained categories are distinguished by subtle and local parts, which could not be captured by global representations effectively. This may hinder existing few-shot learning approaches from dealing with fine-gained categories well. In this work, we propose a multi-attention meta-learning (MattML) method for few-shot fine-grained image recognition (FSFGIR). Instead of using only base learner for general feature learning, the proposed meta-learning method uses attention mechanisms of the base learner and task learner to capture discriminative parts of images. The base learner is equipped with two convolutional block attention modules (CBAM) and a classifier. The two CBAM can learn diverse and informative parts. And the initial weights of classifier are attended by the task learner, which gives the classifier a task-related sensitive initialization. For adaptation, the gradient-based meta-learning approach is employed by updating the parameters of two CBAM and the attended classifier, which facilitates the updated base learner to adaptively focus on discriminative parts. We experimentally analyze the different components of our method, and experimental results on four benchmark datasets demonstrate the effectiveness and superiority of our method.
APA, Harvard, Vancouver, ISO, and other styles
10

Surmont, Florian, and Damien Coache. "Investigation on the Shooting Method Ability to Solve Different Mooring Lines Boundary Condition Types." In ASME 2018 37th International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/omae2018-77563.

Full text
Abstract:
The study of undersea cables and mooring lines statics remains an unavoidable subject of simulation in offshore field for either steady-state analysis or dynamic simulation initialization. Whether the study concerns mooring systems pinned both at seabed and floating platform, cables towed by a moving underwater system or when special links such as stiffeners are needed, the ability to model every combination is a key point. To do so the authors propose to investigate the use of the shooting method to solve the two point boundary value problem (TPBVP) associated with Dirichlet, Robin or mixed boundary conditions representing respectively, displacement, force and force/displacement boundary conditions. 3D nonlinear static string calculations are confronted to a semi-analytic formulation established from the catenary closed form equations. The comparisons are performed on various pairs of boundary conditions developed in five configurations.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography