Fracture-vuggy carbonate reservoir has a unique reservoir structure. It is difficult to form effective seepage channels when natural fractures are not developed, resulting in low natural productivity of oil Wells. the...
详细信息
Mental health issues affect a significant portion of the world's population and can result in debilitating and life-threatening outcomes. To address this increasingly pressing healthcare challenge, there is a need...
详细信息
ISBN:
(纸本)9781450384612
Mental health issues affect a significant portion of the world's population and can result in debilitating and life-threatening outcomes. To address this increasingly pressing healthcare challenge, there is a need to research novel approaches for early detection and prevention. Toward this, ubiquitous systems can play a central role in revealing and tracking clinically relevant behaviors, contexts, and symptoms. Further, such systems can passively detect relapse onset and enable the opportune delivery of effective intervention strategies. However, despite their clear potential, the uptake of ubiquitous technologies into clinical mental healthcare is slow, and a number of challenges still face the overall efficacy of such technology based solutions. the goal of this workshop is to bring together researchers interested in identifying, articulating, and addressing such issues and opportunities. Following the success of this workshop for the last five years, we aim to continue facilitating the UbiComp community in developing a holistic approach for sensing and intervention in the context of mental health.
the proceedings contain 72 papers. the special focus in this conference is on Frontiers of Intelligent computing: theory and Applications. the topics include: An Efficient Privacy-Preserving Search Technique for Encry...
ISBN:
(纸本)9789813291850
the proceedings contain 72 papers. the special focus in this conference is on Frontiers of Intelligent computing: theory and Applications. the topics include: An Efficient Privacy-Preserving Search Technique for Encrypted Cloud Data;optimal Path Selection in Wireless Sensor Networks Using Enhanced Spatial Reusability;Application of Classical Codes over GF(4) on Quantum Error Correction Codes;Improved GLIM in Multiple-Input Multiple-Output OFDM VLC;design and Implementation of an IoT-Based Water Purifier System Enabling Predictive Maintenance;grey Wolf Optimized Task Scheduling Algorithm in Cloud computing;adaptive Feature Selection and Classification Using Optimization Technique;how to Fairly Allocate Indivisible Resources Among Agents Having Lexicographic Subadditive Utilities;a Novel Approach of Ontology-Based Activity Segmentation and Recognition Using Pattern Discovery in Multi-resident Homes;colorectal Cancer Diagnosis with Complex Fuzzy Inference System;a Machine Learning Approach for Hot Topic Detection in News;a Proposal of Expert System Using Deep Learning Neural Networks and Fuzzy Rules for Diagnosing Heart Disease;Development of the Rules for Model Transformation with OCL Integration in UWE;nonintrusive Load Monitoring algorithms: A Comparative Study;craftQuest—Mobile App for Collecting Craft Village Data;tracking Big5 Traits Based on Mobile User Log Data;prediction of Factors Associated withthe Dropout Rates of Primary to High School Students in India Using Data Mining Tools;domain-Specific Versus General-Purpose Word Representations in Sentiment Analysis for Deep Learning Models;improvement of Machine Learning Method by Combining Flow Text and Layout Text in Extracting Information from Scanned Healthcare Documents;assessing the Learning Difficulty of Text-Based Learning Materials;watermark by Learning Non-saliency.
Current wireless communications use the microwave band as its medium. Present-day wireless network makes use of the majority of the available spectrum. the word innovative Full-Duplex (FD) as well as the use Getting N...
Current wireless communications use the microwave band as its medium. Present-day wireless network makes use of the majority of the available spectrum. the word innovative Full-Duplex (FD) as well as the use Getting NOMA sharing scheme called Reflecting In-Band Full-Duplex (R-IBFD) is suggested in which piece in order to advance technology and meet the requirements of better utilizing these natural assets. In order to meet the needs of smart cities for 6th Generations (6thG or 6G), the suggested R-IBFD offers efsfective use of airwaves with superior system characteristics, including Concealment Outage Potential (SOP), efficiency, communication percentage, and secrets capacity. the suggested method aims to address the need for innovative algorithms which foster better transformation and usher with a digital shift in business specifications for 6G. Addressing suggested R-IBFD within this research primarily responds to the phenomenon of interference between channels related security issues. Most interference from co-channels experienced by In-Band Full-Duplex type devices experience among their individual communicating and reception antennas is greater. the use of R-IBFD lessens the impact of this disturbance and helps to secure a necessary transmission infrastructure. Using the aid of SOP creation, formulas, and modeling outcome, simulation, the rise of concealment capability and interaction using R-IBFD are explored for an improved comprehension of its contributions. Among of the many evaluation technologies being utilized to increase the concealing capabilities is an artificial algorithm based on genes.
this study investigates the application of Reinforce-ment Learning (RL) for estimating the Worst-Case Execution Time (WCET) of real-time robotic algorithms, crucial for ensuring reliable robotic navigation and interac...
详细信息
ISBN:
(数字)9798331504830
ISBN:
(纸本)9798331515621
this study investigates the application of Reinforce-ment Learning (RL) for estimating the Worst-Case Execution Time (WCET) of real-time robotic algorithms, crucial for ensuring reliable robotic navigation and interaction. the research eval-uates these computational techniques through two industrial case studies: (1) collision detection among two mobile cylinders and a stationary box; and (2) a six-degree-of-freedom (6-DOF) robotic model executing complex tasks. By leveraging RL, the study explores extensive input spaces to identify scenarios approaching the WCET within a controlled simulation environment. through an experimental evaluation, we compare RL against Genetic algorithms (GA) and random search approaches. the results demonstrate that RL outperforms both GA and random search. this research highlights the potential of RL to provide more accurate and reliable W CET estimations, thereby enhancing the safety and efficiency of real-time robotic systems.
the proceedings contain 63 papers. the topics discussed include: performance benchmarking of visual human tracking algorithms for UAVs;community detection at scale: a comparison study among Apache spark and Neo4j;secu...
ISBN:
(纸本)9781450398541
the proceedings contain 63 papers. the topics discussed include: performance benchmarking of visual human tracking algorithms for UAVs;community detection at scale: a comparison study among Apache spark and Neo4j;security operations center in education: building an educational environment for attack and defense scenarios;smart business processing in industry 4.0;a survey on vulnerability prediction using GNNs;design for smart home devices: an exploratory eye-tracking study;intelligent emergency evacuation systems for buildings;better solutions for the thesis defense timetabling problem using a three-phase approach;self-adaptive privacy in cloud computing: an overview under an interdisciplinary spectrum;evaluation of the relationship between the smart packaging technology and disability in Greece;an exact based approach for the post enrollment course timetabling problem;and a neuro-symbolic approach for fault diagnosis in smart power grids.
the proceedings contain 20 papers. the special focus in this conference is on Material Science and Smart Materials. the topics include: Structural analysis of sputtered sc(X)al(1-x)n layers for sensor applications;eff...
ISBN:
(纸本)9783035715774
the proceedings contain 20 papers. the special focus in this conference is on Material Science and Smart Materials. the topics include: Structural analysis of sputtered sc(X)al(1-x)n layers for sensor applications;effect of electron beam irradiation on the rheological properties and phase transition temperature of poly(N-vinylcaprolactam);mechanical and microstructural analysis of an ultra-flexible nano-silver paste sintered joint;effect of perforations on resonant modes of flat circular plates;isomorphous substitutions in luminescent materials based on scvo4;monitoring of extracellular matrix protein conformations in the presence of biomimetic bone tissue regeneration scaffolds;fluorite-like neodymium molybdates doped with lead;novel composite membranes based on polyaniline /ionic liquids for pem fuel cells applications;preparation and properties of co/fe multilayers and cofe alloy films for application in magnetic field sensors;analysis of thermoelastic damping of functionally graded material micro plate based on the mindlin plate theory;three-disperse magnetorheological fluids based on ferrofluids: Induced modification of sedimentation by addition of nanoparticles;performance evaluation of a novel hydrophobic membrane used in a desalination system: A comparison between static and moving configurations;correlating structure and electrical properties in rotary swaged al/cu clad composites;effect of swaging temperature on deformation behaviour of w93ni6co1 tungsten heavy alloy;the photoelectric behavior and antimicrobial effect of titanium dioxide deposition for dental implants;kinetics study of the digestion of magnesium chloride dihydrate in a molten salt electrolyte;material based fault detection methods for pv systems.
the paper considers the privacy-preserving and communication constraints for multi-agent systems. Firstly, a lightweight, decentralized, time-varying transformation method is introduced to prevent information leakage ...
the paper considers the privacy-preserving and communication constraints for multi-agent systems. Firstly, a lightweight, decentralized, time-varying transformation method is introduced to prevent information leakage during information exchange between agents. this approach requires less computation and is compatible withsystems with limited computing resources. Secondly, the paper proposes an event-triggered mechanism that considers both privacy-preserving and communication constraints to avoid continuous updates of the privacy-preserving controller. By using intermittent communication mode, this approach effectively reduces computing and communication resources compared to traditional time-triggered methods. Overall, these methods offer efficient solutions for privacy and communication challenges in multi-agent systems. the finite-time privacy-preserving control protocol is validated through numerical simulation examples to demonstrate its effectiveness.
the proceedings contain 39 papers. the special focus in this conference is on Parallel and Distributed computing. the topics include: A makespan lower bound for the tiled cholesky factorization based on ALAP schedule;...
ISBN:
(纸本)9783030576745
the proceedings contain 39 papers. the special focus in this conference is on Parallel and Distributed computing. the topics include: A makespan lower bound for the tiled cholesky factorization based on ALAP schedule;preface;skipping non-essential instructions makes data-dependence profiling faster;Optimal GPU-CPU offloading strategies for deep neural network training;improving mapping for sparse direct solvers: A trade-off between data locality and load balancing;modelling standard and randomized slimmed folded clos networks;ompMemOpt: Optimized memory movement for heterogeneous computing;Accelerating deep learning inference with cross-layer data reuse on GPUs;Distributed fine-grained traffic speed prediction for large-scale transportation networks based on automatic LSTM customization and sharing;Optimizing FFT-based convolution on ARMv8 multi-core CPUs;maximizing I/O bandwidth for reverse time migration on heterogeneous large-scale systems;TorqueDB: Distributed querying of time-series data from edge-local storage;data-centric distributed computing on networks of mobile devices;a toolchain to verify the parallelization of OmpSs-2 applications;WPSP: A multi-correlated weighted policy for VM selection and migration for cloud computing;LCP-aware parallel string sorting;Mobile RAM and shape formation by programmable particles;approximation algorithm for estimating distances in distributed virtual environments;on the power of randomization in distributed algorithms in dynamic networks with adaptive adversaries;3D coded SUMMA: Communication-efficient and robust parallel matrix multiplication;managing failures in task-based parallel workflows in distributed computing environments;accelerating nested data parallelism: Preserving regularity;using dynamic broadcasts to improve task-based runtime performances;a compression-based design for higher throughput in a lock-free hash map;NV-PhTM: An efficient phase-based transactional system for non-volatile memory.
暂无评论