Attention is the brain's mechanism for selectively processing specific stimuli while filtering out irrelevant information. Characterizing changes in attention following long-term interventions (such as transcrania...
详细信息
This paper is designed to provide a comprehensive overview of the latest developments in fault tolerance methods for cloud computing. Maintaining high availability and reliability of cloud environments requires fault ...
详细信息
Classification of flora data is a high complexity problem due to the similarity of plants. Identification and determination of plant species is a task that most of the general public is unable to do and it can be a ch...
详细信息
This paper introduces an innovative image compression and encryption algorithm that leverages the genetic algorithm (GA), compressive sensing (CS), and a newly developed hyperchaotic map. In this algorithm, the GA is ...
详细信息
Cross-resolution person re-identification(CR-ReID) seeks to overcome the challenge of retrieving and matching specific person images across cameras with varying resolutions. Numerous existing studies utilize establish...
详细信息
The growing demand for efficient energy storage solutions has sparked increased interest in precise battery voltage prediction. In this study the Long Short-Term Memory networks, are applied in the time series forecas...
详细信息
作者:
Ding, LichaoZhao, JingLu, KaiHao, Zenghao
Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China
Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks
Shandong Fundamental Research Center for Computer Science Jinan China
Knowledge graphs (KGs) provide a structured representation of the real world through entity-relation triples. However, current KGs are often incomplete, typically containing only a small fraction of all possible facts...
详细信息
In most electricity theft detection schemes, consumers' power consumption data is directly input into the detection center. Although it is valid in detecting the theft of consumers, the privacy of all consumers is...
详细信息
The evolution of different techniques for exploring cerebral activity and the development of signal processing and analysis methods have enabled a better understanding of the dynamic cerebral mechanisms in favor of fi...
详细信息
This paper introduces XNL-CNN, an extended version of the previously introduced, compact NL-CNN model. While the NL-CNN was designed with typical Tiny-ML constraints in order to make possible integration of various AI...
详细信息
暂无评论