Measuring the distance between words has many applications in natural language processing. By using the conceptual distance using the thesaurus dictionary, it is possible to obtain a distance scale different from the ...
详细信息
ISBN:
(纸本)9781665499248
Measuring the distance between words has many applications in natural language processing. By using the conceptual distance using the thesaurus dictionary, it is possible to obtain a distance scale different from the word similarity using the cosine similarity. However, the distance cannot be measured except for the words listed in the thesaurus dictionary. To solve the problem, this study aims to estimate the conceptual distance between unknown words using machine learning. Through some experiments, the conceptual distance of an unknown word could be estimated with the same level of accuracy as that of a known word.
The prevalence of elderly individuals and children becoming lost is becoming increasingly acute. To address this pressing societal issue, we have developed an Anti-Lost Smart Button and Supervision Platform specifical...
详细信息
ISBN:
(纸本)9798331540050;9798331540043
The prevalence of elderly individuals and children becoming lost is becoming increasingly acute. To address this pressing societal issue, we have developed an Anti-Lost Smart Button and Supervision Platform specifically designed for these vulnerable demographics, employing electronic fencing technology. This system integrates a smart button with a corresponding supervision platform, utilizing data obtained from the Beidou satellite navigation module, a 5G communication module, and various sensors embedded within the smart button to facilitate data transmission.
Circular Economy (CE) is a model with a concrete action plan covering the whole life cycle of a product, from production and consumption to waste management (WM). Information technologies considerably contribute to th...
详细信息
ISBN:
(纸本)9798350369458;9798350369441
Circular Economy (CE) is a model with a concrete action plan covering the whole life cycle of a product, from production and consumption to waste management (WM). Information technologies considerably contribute to the transition towards CE, e.g., waste tracking using Internet of Things (IoT). This will cause the businesses and organizations to confront a large diversity of data (i.e. waste amount, types, locations, etc.). The generated data is often stored and processed through manual or semi-manual methods by each business or organization. However, an automated method which can also interpret and integrate the diverse data in WM fields across different organizations is still in its infancy. Often, such data is not organized and falls short of reaching its full potential in facilitating coordinated management and enabling Circular Economy initiatives. In this paper, we aim to address this need through automated interpretation and integration of municipal waste data by applying semantic data modeling. Our approach proposes to capture the semantical description of entities in the WM process and their relations, which can appear between waste producers, authorities and consumers. Then, the obtained semantic model will facilitate and automate the required interpretation and integration of waste data, both for intra- and inter-organization scenarios. We realize intelligent semantic-based searching using natural language processing and large language models.
In nowadays the new achievements in microelectronics and mechatronics and increase in the complexity of control issues and theirs size forced the creation of more complex control and automation systems. On the other h...
详细信息
Software applications and workloads, especially within the domains of Cloud computing and large-scale AI model training, exert considerable demand on computing resources, thus contributing significantly to the overall...
详细信息
ISBN:
(纸本)9798350368543;9798350368536
Software applications and workloads, especially within the domains of Cloud computing and large-scale AI model training, exert considerable demand on computing resources, thus contributing significantly to the overall energy footprint of the IT industry. In this paper, we present an in-depth analysis of certain software coding practices that can play a substantial role in increasing the application's overall energy consumption, primarily stemming from the suboptimal utilization of computing resources. Our study encompasses a thorough investigation of 16 distinct code smells and other coding malpractices across 31 real-world open-source applications written in Java and Python. Through our research, we provide compelling evidence that various common refactoring techniques, typically employed to rectify specific code smells, can unintentionally escalate the application's energy consumption. We illustrate that a discerning and strategic approach to code smell refactoring can yield substantial energy savings. For selective refactorings, this yields a reduction of up to 13.1% of energy consumption and 5.1% of carbon emissions per workload on average. These findings underscore the potential of selective and intelligent refactoring to substantially increase energy efficiency of Cloud software systems.
This paper studies the numerical analysis of the optimization of the synchronization misalignment scheduling algorithm under the shared cloud computing environment. First, the user submitted job is initialized, and th...
详细信息
This paper investigates the efficiency of autonomous indoor exploration utilizing simulation testing environments in Gazebo. Two exploration methods, Floodfill algorithm and Frontier-based algorithm, using the 2D LiDA...
详细信息
ISBN:
(纸本)9798331517939;9788993215380
This paper investigates the efficiency of autonomous indoor exploration utilizing simulation testing environments in Gazebo. Two exploration methods, Floodfill algorithm and Frontier-based algorithm, using the 2D LiDAR sensor are compared. The Floodfill algorithm employs a systematic traversal approach, while the Frontier-based method dynamically detects and navigates towards frontiers. Results indicate that the Frontier-based approach outperforms Floodfill Algorithm in terms of efficiency and map completeness, particularly in complex environments. The study underscores the importance of the Frontier-based strategy for autonomous indoor exploration and paves the way for enhanced robotic applications in diverse domains.
Reinforcement learning (RL) has recently gained significant attention as a dynamic method for controlling traffic signals based on the real-time traffic flow. However, previous studies paid little attention to the coe...
详细信息
ISBN:
(纸本)9798350399462
Reinforcement learning (RL) has recently gained significant attention as a dynamic method for controlling traffic signals based on the real-time traffic flow. However, previous studies paid little attention to the coefficients of the reward function, and there has been limited research investigating the effect of the railway information. To address these research gaps, this study investigates the RL-based traffic signal control considering the railway information. To achieve this, the SUMO (Simulation of Urban Mobility) software was used to establish an intelligent transportation system (ITS) field consisting of two signalized intersections and two railway crossings. Two RL algorithms, namely PPO and DQN, were employed to establish the RL-SOMO model for simulation experiments under given traffic conditions. Simulation results demonstrate that the proposed RL-based traffic signal control method performs significantly better compared to the fixed control method, which indicates the promising application of RL-based traffic control in real traffic flow control.
There exists a plethora of online transaction processing (OLTP) applications, such as banking and inventory management. Database management systems (DBMS) use concurrency control mechanisms to manage OLTP transactions...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
There exists a plethora of online transaction processing (OLTP) applications, such as banking and inventory management. Database management systems (DBMS) use concurrency control mechanisms to manage OLTP transactions and their conflicts simultaneously. We introduce a DBMS attack, namely default isolation level manipulation (DILM), and investigate the security problem related to the malicious alteration of the default isolation level and suggest precautions and a technique to alleviate its effects. We assume an attacker with administrative privileges who can observe traffic and subsequently alter isolation levels, and we discuss the potential consequences of concurrency-related attacks. The algorithm is able to detect all the anomalies according to its objective function with a high accuracy rate.
This paper presents a nanopositioner driven by a hybrid reluctance actuator (HRA), where the mover integrates a permanent magnet to generate a bias flux linearizing the actuation force. An advantage of the configurati...
详细信息
ISBN:
(纸本)9798350355376;9798350355369
This paper presents a nanopositioner driven by a hybrid reluctance actuator (HRA), where the mover integrates a permanent magnet to generate a bias flux linearizing the actuation force. An advantage of the configuration is that no parasitic force occurs theoretically, unlike conventional HRAs. For validation, the actuation force and the parasitic force are measured by setting the coil current to 0A and 0.2 A. The results show that the actuation force for positioning significantly varies between 0N and 54 N, dependent on the mover position. In contrast, the parasitic force varies in a small range between -0.11N and 1.3 N, successfully demonstrating the effectiveness of the presented nanopositioner. To further investigate the achievable performance of the nanopositioner, cascade control with a position loop and a flux loop is designed for a control bandwidth of 212 Hz, and point-to-point motion of 1mm is successfully demonstrated with a motion resolution of 4.4nm at a static point.
暂无评论