This paper introduces a Sliding Mode Observer (SMO) based Finite Control Set Model Predictive Control (FCSMPC) strategy. A digital model of the system, implemented in Matlab/Simulink, is utilized to verify the effecti...
详细信息
In this paper, we investigate lossy source coding based on a soft-decision based belief propagation guided decimation (BPGD) algorithm for low-density generator matrix (LDGM) codes, called soft-hard BPGD. For this alg...
详细信息
The wave functions and permitted energy levels of quantum systems, which characterize the probability distributions and particle behaviors, are able to be determined via the time-independent Schrodinger equation. Our ...
详细信息
In the future, increasing amount of flexibility is needed to fulfill the management needs of renewables and electric vehicles (EV) -based power systems. This paper presents a novel adaptive and coordinated management ...
详细信息
Recent years have witnessed the increasing popularity of mobile and networking devices,as well as social networking sites,where users engage in a variety of activities in the cyberspace on a daily and real-time *** su...
详细信息
Recent years have witnessed the increasing popularity of mobile and networking devices,as well as social networking sites,where users engage in a variety of activities in the cyberspace on a daily and real-time *** such systems provide tremendous convenience and enjoyment for users,malicious usages,such as bullying,cruelty,extremism,and toxicity behaviors,also grow noticeably,and impose significant threats to individuals and *** this paper,we review computational approaches for cyberbullying and cyberviolence detection,in order to understand two major factors:1)What are the defining features of online bullying users,and 2)How to detect cyberbullying and *** achieve the goal,we propose a user-activities-content(UAC)triangular view,which defines that users in the cyberspace are centered around the UAC triangle to carry out activities and generate ***,we categorize cyberbully features into three main categories:1)User centered features,2)Content centered features,and 3)Activity centered *** that,we review methods for cyberbully detection,by taking supervised,unsupervised,transfer learning,and deep learning,etc.,into *** UAC centered view provides a coherent and complete summary about features and characteristics of online users(their activities),approaches to detect bullying users(and malicious content),and helps defend cyberspace from bullying and toxicity.
Assistive mobile applications play a pivotal role for visually impaired individuals worldwide. These applications often face challenges in currency recognition due to varying perspectives, inconsistent illumination, a...
详细信息
As vehicular edge computing and networks (VECONs) emerge, Internet of vehicles (IoVs) is gaining significant advantages. To provide users with dependable services, VECONs need to offer efficient and secure task offloa...
详细信息
The Bradley-Terry-Luce (BTL) model is one of the most widely used models for ranking a set of items given data about pairwise comparisons among them. While several studies in the literature have attempted to empirical...
Surrogate-assisted evolutionary algorithms (SAEAs) have achieved effective performance in solving complex data-driven optimization problems. In the Internet of Things environment, the data of many problems are collect...
详细信息
Recently, the Internet of Things (IoT) technology has made tremendous progress, and it is beginning to enter many areas of social life, such as autonomous driving, medical care, etc. Due to the massive data in IoT, de...
详细信息
暂无评论