Recent advances in brain-computer interface (BCI) technology, particularly based on generative adversarial networks (GAN), have shown great promise for improving decoding performance for BCI. Within the realm of BCI, ...
详细信息
ISBN:
(纸本)9798350309430
Recent advances in brain-computer interface (BCI) technology, particularly based on generative adversarial networks (GAN), have shown great promise for improving decoding performance for BCI. Within the realm of BCI, GANs find application in addressing many areas. They serve as a valuable tool for data augmentation, which can solve the challenge of limited data availability, and synthesis, effectively expanding the dataset and creating novel data formats, thus enhancing the robustness and adaptability of BCI systems. Research in speech-related paradigms has significantly expanded, with a critical impact on the advancement of assistive technologies and communication support for individuals with speech impairments. In this study, GANs were investigated, particularly for the BCI field, and applied to generate text from EEG signals. The GANs could generalize all subjects and decode unseen words, indicating its ability to capture underlying speech patterns consistent across different individuals. The method has practical applications in neural signal-based speech recognition systems and communication aids for individuals with speech difficulties.
The primary objective of this research is to classify school-based email correspondence into two distinct categories: General Inquiry Type and Verification Type. Email labeling is accomplished through the utilization ...
详细信息
To solve the problems that existing knowledge graph extraction methods in the field of pests and diseases require a large amount of annotated data, and the trained model has limited scalability and versatility, this p...
详细信息
To identify fires occurring in complex environments faster and locate the flames more accurately, the synthesized data enhancement methods are proposed, then a self-built flame dataset is constructed, and a flame reco...
详细信息
The proceedings contain 26 papers. The special focus in this conference is on Big Data Management and Service. The topics include: FAITH: A Fast, Accurate, and Lightweight Database-Agnostic Learned Cost Model;fas...
ISBN:
(纸本)9789819609130
The proceedings contain 26 papers. The special focus in this conference is on Big Data Management and Service. The topics include: FAITH: A Fast, Accurate, and Lightweight Database-Agnostic Learned Cost Model;fast Approximate Temporal Butterfly Counting on Bipartite Graphs via Edge Sampling;Financial-ICS: Identifying Peer Firms via LongBERT from 10K Reports;establishing a Decentralized Diamond Quality Management System: Advancing Towards Global Standardization;co-estimation of Data Types and Their Positional Distribution;Enhancing Load Forecasting with VAE-GAN-based Data Cleaning for Electric Vehicle Charging Loads;audio-Guided Visual Knowledge Representation;boundary Point Detection Combining Gravity and Outlier Detection Methods;A Meta-learning Approach for Category-Aware Sequential Recommendation on POIs;automatic Post-editing of Speech Recognition System Output Using Large Language Models;comparative Analysis with Multiple Large-Scale Language Models for Automatic Generation of Funny Dialogues;effectiveness of the Programmed Visual Contents Comparison Method for Two Phase Collaborative Learning in computer Programming Education: A Case Study;generating Achievement Relationship Graph Between Actions for Alternative Solution Recommendation;generating News Headline Containing Specific Person Name;Investigating Evidence in Sentence Similarity Using MASK in BERT;acceleration of Synopsis Construction for Bounded Approximate Query Processing;Query Expansion in Food Review Search with Synonymous Phrase Generation by LLM;Question Answer Summary Generation from Unstructured Texts by Using LLMs;Real Estate Information Exploration in VR with LoD Control by Physical Distance;voices of Asynchronous Learning Students: Revealing Learning Characteristics Through Vocabulary Analysis of Notes Tagged in Videos;review Search Interface based on Search Result Summarization Using Large Language Model;yes-No Flowchart Generation for Interactive Exploration of Personalized Health Improve
The accuracy of Automatic Speech Recognition (ASR) systems is influenced by the quality and context of speech signals, particularly in telephonic environments prone to errors like channel drops and noise, leading to h...
详细信息
The coordinated parallel driving of autonomous vehicles in formation not only optimizes road space utilization but also enhances road efficiency, contributing to the reduction of traffic congestion. Hence, it is neces...
详细信息
ISBN:
(纸本)9798350370058;9798350370164
The coordinated parallel driving of autonomous vehicles in formation not only optimizes road space utilization but also enhances road efficiency, contributing to the reduction of traffic congestion. Hence, it is necessary to impose diverse constraints on the vehicle to ensure its adherence to the intended trajectory. The constraints of mechanical systems are generally categorized into equality constraints and inequality constraints. This paper adopts a constraint-following methodology by leveraging the generalized Udwadia-Kalaba equation to design the self-driving vehicle formation system, considering both equality and inequality constraints within the system. Simulation experiments demonstrate that the method is not only simple and effective but also has good applicability in swarm systems.
Attribute-based encryption (ABE) and homomorphic overlays to develop a secure and fine-grained access control system for safeguarding patient lab results in cloud-based healthcare. The system effectively addresses the...
详细信息
ISBN:
(纸本)9798331539894;9798331539887
Attribute-based encryption (ABE) and homomorphic overlays to develop a secure and fine-grained access control system for safeguarding patient lab results in cloud-based healthcare. The system effectively addresses the critical need to balance data privacy and authorized data analysis within the cloud environment. In healthcare, fine-grained access control is paramount for protecting sensitive patient information, an aspect often overlooked by traditional methods. This paper proposes a system that overcomes this challenge by leveraging ABE to enable attribute-based access control, ensuring that only authorized users possessing specific attributes can decrypt patient data. Furthermore, homomorphic overlays allow for computations on encrypted data, empowering authorized users to perform analyses without requiring access to the underlying information. This innovative approach promotes data privacy while permitting authorized data analysis within the cloud.
This paper uses the iFly D6 six-rotor electric UAV which is equipped with iCam Q5Plus camera to obtain the image of the test area by oblique photography. The real 3D model of the test area is obtained by indoor proces...
详细信息
With the advent of the big data era, the amount of audio data is rapidly increasing. In order to effectively utilize this information, we urgently need an efficient method for retrieving speech information. This paper...
详细信息
ISBN:
(纸本)9798350386783;9798350386776
With the advent of the big data era, the amount of audio data is rapidly increasing. In order to effectively utilize this information, we urgently need an efficient method for retrieving speech information. This paper proposes a speech retrieval technology based on index fusion and pseudo correlation feedback to address the issue of insufficient accuracy in existing speech retrieval techniques. On the basis of multiple systems, inverted indexes are introduced for speech retrieval, and the keyword inverted index table is fused. This not only obtains the complementarity of detection systems, but also improves retrieval efficiency;Then calculate the similarity between the speech segments sorted for the first retrieval and the pseudo correlated and uncorrelated sets, and correspondingly reorder the return list for the first retrieval. By effectively utilizing the information hidden in the pseudo feedback document, optimize the sorting results and improve the retrieval accuracy.
暂无评论