In our paper, we present an innovative educational assessment system that attempts to overcome the limitations of traditional educational evaluation methods by applying machine learning, artificial intelligence, fuzzy...
详细信息
ISBN:
(数字)9798331502461
ISBN:
(纸本)9798331502478
In our paper, we present an innovative educational assessment system that attempts to overcome the limitations of traditional educational evaluation methods by applying machine learning, artificial intelligence, fuzzy logic, and advanced mathematical techniques. This system can provide a more objective and personalized assessment of students’ knowledge. Current examination systems in educational institutions are outdated and do not meet modern societal and technological requirements. A central element of the system is the application of fuzzy logic, which allows for handling uncertainties in knowledge assessment. Using the FP-growth algorithm and the fuzzy analytical hierarchy process (AHP) aids in optimizing the evaluation process and enables a more profound analysis of students’ performance. During the system's development, we aim to adaptively manage the difficulty level of questions, taking into account students’ prior performance and individual capabilities. The study highlights the security risks and efficiency issues of current “manual” question compilation methods. The new system aims to minimize these risks while improving the quality of education and reducing the workload of educators.
The purpose of this study is to explore the motion incremental speed technology based on infrared feature capture and CFD numerical simulation, through the sensor, image processing and analysis algorithms, etc. On the...
详细信息
ISBN:
(数字)9798350389579
ISBN:
(纸本)9798350389586
The purpose of this study is to explore the motion incremental speed technology based on infrared feature capture and CFD numerical simulation, through the sensor, image processing and analysis algorithms, etc. On the basis of exploring the target's motion characteristics, combined with the Chancellor's theory of ballistic trajectory, and real-time capture of the target's thermal feature information is to achieve accurate target tracking and motion trajectory adjustment. Firstly, this paper adopts the image processing and analysis algorithm, and uses the normal distribution model to process the infrared data, so as to construct the target motion model. Secondly, CFD numerical simulation is used to analyse mechanisms such as motion boost guidance in order to provide more accurate target tracking and trajectory correction schemes. Finally, the motion region of the updraft is predicted by spherical averaging of the fluctuation equation. The results show that the infrared feature capture technique is able to maintain efficient motion track correction and motion speed-up capability based on real-time data processing in dynamic environments.
Visible Light Communication (VLC) is an emerging technology that utilizes LED lighting to transmit data through modulated light intensity. The concept of VLC is based on simple principles. LED bulbs are modulated at h...
详细信息
ISBN:
(数字)9798331521691
ISBN:
(纸本)9798331521707
Visible Light Communication (VLC) is an emerging technology that utilizes LED lighting to transmit data through modulated light intensity. The concept of VLC is based on simple principles. LED bulbs are modulated at high frequencies that are invisible to the human eye. Fluctuations in light intensity are detected by photodetectors, such as photodiodes, which then decode the transmitted data. This paper aims to reduce the interference that occurs at the user terminals. Data services are allocated to users according to channel conditions. To achieve a better performance rate by reducing interference and improving SINR performance, the proposed approach is using the Successive Interference Cancellation (SIC) technique. Comparative simulations are performed for the conventional approach and the proposed approach. The improved performance of the system is noted in the proposed approach. The main aim of this paper is to improve system performance and reduce complexity by limiting interference among users. This increases the efficiency of the system.
This paper proposes an innovative landscape resource change detection algorithm based on multi-sensor fusion. The algorithm integrates multiple data sources such as remote sensing images, ground meteorological data an...
详细信息
ISBN:
(数字)9798350389579
ISBN:
(纸本)9798350389586
This paper proposes an innovative landscape resource change detection algorithm based on multi-sensor fusion. The algorithm integrates multiple data sources such as remote sensing images, ground meteorological data and climate data, uses data fusion technology to improve monitoring accuracy, and combines spatiotemporal filtering algorithm to accurately detect landscape changes. This paper selects a nature reserve as the experimental area, collects multi-source data sets including remote sensing images, meteorological data and ground sensor data, and detects changes in landscape resources through the algorithm. Compared with the traditional method, the detection accuracy of the proposed algorithm is improved by 12.6%, especially when dealing with changes under complex environmental conditions, it shows strong robustness. In addition, the real-time performance of the algorithm has also been optimized, which can adapt to large-scale, complex and changeable monitoring tasks. The multi-sensor fusion algorithm proposed has significant advantages over the traditional single sensor method in terms of accuracy, stability and real-time performance through experiments.
This paper presents a comprehensive approach to solving the security-constrained unit commitment with alternating current power flows (SCUC-ACPF) problem in contemporary power systems. We introduce algorithms that dec...
详细信息
ISBN:
(数字)9798331541125
ISBN:
(纸本)9798331541132
This paper presents a comprehensive approach to solving the security-constrained unit commitment with alternating current power flows (SCUC-ACPF) problem in contemporary power systems. We introduce algorithms that decompose the problem into subproblems suitable for specialized solvers, so that the large-scale mixed-integer nonlinear program-ming SCUC-ACPF problem can be solved. In case studies, we validate the efficiency and effectiveness of our algorithms on synthetic and industry-scale power system networks.
Pre-training a language model and then fine-tuning it has shown to be an efficient and effective technique for a wide range of code intelligence tasks, such as code generation, code summarization, and vulnerability de...
详细信息
ISBN:
(数字)9798331535100
ISBN:
(纸本)9798331535117
Pre-training a language model and then fine-tuning it has shown to be an efficient and effective technique for a wide range of code intelligence tasks, such as code generation, code summarization, and vulnerability detection. However, pre-training language models on a large-scale code corpus is compu-tationally expensive. Fortunately, many off-the-shelf Pre-trained Code Models (PCMs), such as CodeBERT, CodeT5, CodeGen, and Code Llama, have been released publicly. These models acquire general code understanding and generation capability during pre-training, which enhances their performance on downstream code intelligence tasks. With an increasing number of these public pre-trained models, selecting the most suitable one to reuse for a specific task is essential. In this paper, we systematically investigate the reusability of PCMs. We first explore three intuitive model selection methods that select by size, training data, or brute-force fine-tuning. Experimental results show that these straightforward techniques either perform poorly or suffer high costs. Motivated by these findings, we explore learning-based model selection strategies that utilize pre-trained models without altering their parameters. Specifically, we train proxy models to gauge the performance of pre-trained models, and measure the distribution deviation between a model's latent features and the task's labels, using their closeness as an indicator of model transferability. We conduct experiments on 100 widely-used open-source PCMs for code intelligence tasks, with sizes ranging from 42.5 million to 3 billion parameters. The results demonstrate that learning-based selection methods reduce selection time to 100 seconds, compared to 2,700 hours with brute-force fine-tuning, with less than 6% performance degradation across related tasks.
The landscape of the communication system is undergoing a rapid evolution, emphasizing the need for intelligence, efficiency, and adaptability to enable cloud computing, Internet-of-Everything, and cyber-physical syst...
详细信息
ISBN:
(数字)9798331531935
ISBN:
(纸本)9798331531942
The landscape of the communication system is undergoing a rapid evolution, emphasizing the need for intelligence, efficiency, and adaptability to enable cloud computing, Internet-of-Everything, and cyber-physical systems. With the rapidly growing complexities and interconnectivities of the systems, assurance of security and privacy is of paramount importance. The inherent nature of blockchain technology is its immutability, decentralization, anonymity, and transparency. It has the potential to establish trust between distributed networks through secure access management, robust authentication, improved integrity, confidentiality, and optimized resource allocation. Implementation of blockchain technology in 6G communication systems is likely to introduce dramatic innovations, enabling digital economy growth and enhancing societal functioning and connectivity. This article delves into the history of the evolution of mobile communications from 1G to 6G, the significance of blockchain technology in 6G, and the latest advances in terahertz antennas that can make an immense contribution to the field of 6G technology.
The WAPI protocol has been widely used in power systems because of its excellent identity authentication mechanism, which effectively improves the reliability of data transmission in wireless local area networks (WLAN...
详细信息
ISBN:
(数字)9798331529482
ISBN:
(纸本)9798331529499
The WAPI protocol has been widely used in power systems because of its excellent identity authentication mechanism, which effectively improves the reliability of data transmission in wireless local area networks (WLANs). However, the RTS/CTS mechanism in ieee 802.11, the underlying protocol of WAPI, has security risks, and an attacker can realize DoS attacks by flooding RTS or forging RTS frames with oversized Duration to occupy channel resources. To address the above issues, an improved RTS/CTS mechanism for power system WLANs is proposed, which defends against RTS/CTS-oriented DoS attacks by introducing RTS/CTS lead frames and broadcast frames. The performance of the improved RTS/CTS mechanism is simulated and verified by the packet loss rate, throughput and transmission delay indexes. The results show that the improved RTS/CTS mechanism is able to effectively resist the RTS/CTS flooding attack and the oversized Duration attack, and improves the network security under the premise of guaranteeing the network throughput and communication delay.
This work proposes a $200-\text{GHz}$ signal source for sub-THz biomedical imaging applications. The signal source integrates a fundamental voltage-controlled oscillator (VCO), a power amplifier (PA), and a frequency ...
详细信息
ISBN:
(数字)9798331510473
ISBN:
(纸本)9798331510480
This work proposes a $200-\text{GHz}$ signal source for sub-THz biomedical imaging applications. The signal source integrates a fundamental voltage-controlled oscillator (VCO), a power amplifier (PA), and a frequency doubler. Its architecture is optimized for a wide tuning range and high output power. The PA amplifies the $100-\text{GHz}$ signal generated by the VCO, providing sufficient power to drive the frequency doubler, which then multiplies the input frequency to produce the desired $\mathbf{2 0 0 - G H z}$ output. Implemented in a $40-\text{nm}$ CMOS technology, the proposed signal source delivers an output power of -0.3 dBm at 181.4 GHz with a tuning range of 8.5 %. The signal source only consumes 172 mW from a $0.9-\mathrm{V}$ supply.
A detailed comparative analysis of various machine learning models for predictive maintenance in industrial robotic systems is conducted. The focus is on constructing accurate models to forecast industrial robot break...
详细信息
ISBN:
(数字)9798350357509
ISBN:
(纸本)9798350357516
A detailed comparative analysis of various machine learning models for predictive maintenance in industrial robotic systems is conducted. The focus is on constructing accurate models to forecast industrial robot breakdowns, enabling timely repairs, and reducing downtime. Data from industrial robots is gathered, feature engineering is performed, and multiple machine learning models are analyzed using the Silhouette Score. The goal is to identify the most effective model for predictive maintenance, aligning with the need for optimal system performance.
暂无评论