Information Extraction refers to the process of parsing through unstructured data and extracting meaningful information into editable and structured data formats. There are two common sub-tasks of information extracti...
详细信息
Lung cancer is one of the most deadly and persistent diseases in the world today, making early identification of this disease crucial. This research focuses on the integration of cutting-edge deep learning technologie...
详细信息
In the era of centralized clouds, multi-cloud, and edge computing, adaptable observability is essential to efficiently manage the growing volume of metrics data. Observability Volume Manager (OVM) addresses the comple...
详细信息
Existing motion intent recognition systems in lower limb rehabilitation robots primarily rely on the fusion of multiple sensor features. Such systems capture the motion characteristics of healthy volunteers during spe...
详细信息
ISBN:
(纸本)9798350352900;9798350352894
Existing motion intent recognition systems in lower limb rehabilitation robots primarily rely on the fusion of multiple sensor features. Such systems capture the motion characteristics of healthy volunteers during specific m ovements a nd t hen process the data using machine learning algorithms to accurately recognize human motion events, such as forward and backward movements. We address the complexity and inaccuracies of current intent recognition systems by synthesizing feedback from rehabilitation physicians and patients and adopting modular design principles to develop an integrated human motion intent recognition system for lower limb rehabilitation robots. The system utilizes dual physical sensors to collect data on the movement characteristics of the patient's waist, abdomen, and shoulders, which are then classified using the Transformer-LSTM algorithm. The dataset employed for training and testing the algorithm was gathered from a tertiary care hospital, focusing on the movement characteristics of patients with functional hemiplegia of the lower extremities. Clinical trial results demonstrated that the Transformer-LSTM algorithm achieved an average classification accuracy of 97.54% in recognizing human lower limb movement events, compared to 87.48% with the LSTM algorithm. This lower limb rehabilitation robot also significantly enhances patient motivation and comfort during training.
This paper presents certain results obtained in the domain of applying Membrane computing models in the modeling and designing of Multi-Agent systems for decision making. The presented results highlight the method of ...
详细信息
ISBN:
(纸本)9781665426053
This paper presents certain results obtained in the domain of applying Membrane computing models in the modeling and designing of Multi-Agent systems for decision making. The presented results highlight the method of presenting the topology of Multi-Agent systems and the mode of its formal description in order to allow their automatic implementation in Software products or Hardware architectures. The JSON format, which allows the structuring of code according to the topology of Membrane computing model, is used for the formal description of Membrane computing models. The functioning model of living cells is at the basis of Membrane computing. A cell is associated with a computing system that contains input/output ports, the knowledge base consisting of the set of data and Methods of processing them, and a processor.
As renewable energy sources are becoming more integrated into the power grid, ensuring system reliability is crucial. A unique defect detection method for renewable energy systems leveraging the Internet of Things (Io...
详细信息
This article describes how quantum systems can be used to replicate complex physical occurrences, with emphasis on the use of new quantum algorithms and special data sets. First, let's talk about how quantum compu...
详细信息
Operational profile (OP) and reliability testing is vital to ensure the reliability of artificial intelligence (AI) systems. This paper presents the AIOP (AI-oriented Operational Profile) method, which enhances reliab...
详细信息
The proceedings contain 22 papers. The topics discussed include: sampling in cloud benchmarking: a critical review and methodological guidelines;enhancing machine learning performance in dynamic cloud environments wit...
ISBN:
(纸本)9798331507589
The proceedings contain 22 papers. The topics discussed include: sampling in cloud benchmarking: a critical review and methodological guidelines;enhancing machine learning performance in dynamic cloud environments with auto-adaptive models;optimal distribution of ML models over edge for applications with high input frequency;Ataru: a lightweight VMM+Runtime for low latency serverless functions;blockchain-based framework for stock market operations: IPOs, trading, and dividend distribution;evaluating fine-tuned BERT-based language models for web API recommendation;enhancing security in EV charging systems: a hybrid detection and mitigation approach;and SW forecaster: an intelligentdata-driven approach for water usage demand forecasting.
The initial stage of assessing the cybersecurity of artificial intelligence (AI) systems and tools for cyber-physical systems is the collecting, processing and integrating of vulnerability data from relevant and relia...
The initial stage of assessing the cybersecurity of artificial intelligence (AI) systems and tools for cyber-physical systems is the collecting, processing and integrating of vulnerability data from relevant and reliable information sources using Big data tools. The article provides a classification of sources of information about vulnerabilities of AI systems. The possibilities of automatic scanning of these sources using software scanners are analyzed. The analysis methodology and data structures are proposed, and the necessary set of data for further storing and analyzing is selected. Algorithms for direct collection of vulnerability data from various sources are developed. The directions of further research on the development of algorithms and software tools for aggregation, filtering, processing and integration of multisource data on vulnerabilities of AI systems are substantiated.
暂无评论