In the following contribution, a method is introduced that integrates domain expert-centric ontology design with the Cross-Industry Standard Process for Data Mining (CRISP-DM). This approach aims to efficiently build ...
详细信息
Image dehazing is a challenging task in image enhancement. Due to the widespread presence of haze, it obscures scenes leading to loss of image features, and consequently, failure of visual tasks. To address this issue...
详细信息
Spiking Neural Networks (SNNs) are known for brain-inspired architecture and low power consumption. Leveraging bio-compatibility and self-attention mechanism, Spiking Transformers become the most promising SNN archite...
详细信息
Potential malicious cyber-attacks to power systems which are connected to a wide range of stakeholders from the top to tail will impose significant societal risks and *** timely detection and defense are of crucial im...
详细信息
Potential malicious cyber-attacks to power systems which are connected to a wide range of stakeholders from the top to tail will impose significant societal risks and *** timely detection and defense are of crucial importance for safe and reliable operation of cyber-physical power systems(CPPSs).This paper presents a comprehensive review of some of the latest attack detection and defense ***,the vulnerabilities brought by some new information and communication technologies(ICTs)are analyzed,and their impacts on the security of CPPSs are *** malicious cyber-attacks on cyber and physical layers are then analyzed within CPPSs framework,and their features and negative impacts are ***,two current mainstream attack detection methods including state estimation based and machine learning based methods are analyzed,and their benefits and drawbacks are ***,two current mainstream attack defense methods including active defense and passive defense methods are comprehensively ***,the trends and challenges in attack detection and defense strategies in CPPSs are provided.
In recent times, there has been a notable surge in the exploration of studying human body movements through the utilization of inertial measurement units that can be worn. This trend stems from its substantial impact ...
详细信息
In the process of industrial measurement, the phenomenon of water mist appearing in front of the camera lens due to cold environment can cause fogging of the captured image and greatly interfere with the measurement p...
详细信息
Gesture recognition has diverse application prospects in the field of human-computer ***,gesture recognition devices based on strain sensors have achieved remarkable results,among which liquid metal materials have con...
详细信息
Gesture recognition has diverse application prospects in the field of human-computer ***,gesture recognition devices based on strain sensors have achieved remarkable results,among which liquid metal materials have considerable advantages due to their high tensile strength and *** improve the detection sensitivity of liquid metal strain sensors,a sawtooth-enhanced bending sensor is proposed in this *** with the results from previous studies,the bending sensor shows enhanced resistance *** addition,combined with machine learning algorithms,a gesture recognition glove based on the sawtooth-enhanced bending sensor is also fabricated in this study,and various gestures are accurately *** the fields of human-computer interaction,wearable sensing,and medical health,the sawtooth-enhanced bending sensor shows great potential and can have wide application prospects.
Dear Editor, This letter focuses on the finite-time synchronization(FTS) of neutral-type complex networks with intermittent couplings. Different from most of the existing references concerning neutral-type systems,a d...
详细信息
Dear Editor, This letter focuses on the finite-time synchronization(FTS) of neutral-type complex networks with intermittent couplings. Different from most of the existing references concerning neutral-type systems,a delay-independent dynamical event-triggering controller is considered, operating the same way as the intermittent coupling and excluding the Zeno behavior naturally.
Data analysis tasks aim to provide insightful analysis for given data by incorporating background knowledge of the represented phenomenon, which in turn supports decision-making. While existing large language models(L...
详细信息
Data analysis tasks aim to provide insightful analysis for given data by incorporating background knowledge of the represented phenomenon, which in turn supports decision-making. While existing large language models(LLMs) can describe data trends, they still lag behind human data analysts in terms of integrating external knowledge and in-depth data analysis. Therefore, we propose a multi-agent data analysis framework based on LLMs. The framework decomposes the data analysis task into subtasks by employing three different agents. By empowering agents with the ability to utilize data search tools, the framework enables them to search for arbitrary relevant knowledge during the analysis process, leading to more insightful analysis. Moreover, to enhance the quality of the analysis results, we propose a multi-stage iterative optimization method that iteratively performs data analysis to form more in-depth conclusions. To validate the performance of our framework, we apply it to three real-world problems in the research development of higher education in China data. Experimental results demonstrate that our approach can achieve more insightful data analysis results compared to directly using LLMs alone.
Human Activity Recognition (HAR) using radar sensors offers significant advantages due to their ability to operate in varying lighting conditions and through obstacles, preserving privacy. This paper proposes a novel ...
详细信息
暂无评论