The paper deals with a new algorithm for controlling a multi-phase buck DC-DC converter. The principle of its control is explained in detail using a flowchart. It is based on the continuous change of the converter top...
详细信息
This paper proposed Scalability in Autoencoder-based Orthogonal Frequency Division Multiplexing(OFDM) communication system. In the previous research, only the comparison between IEEE802.11a and Autoencoder by the conv...
详细信息
A key challenge in visible-infrared person re-identification (V-I ReID) is training a backbone model capable of effectively addressing the significant discrepancies across modalities. State-of-the-art methods that gen...
详细信息
Long-term air pollution forecasting is essential for making public policies and issuing warnings. This will reduce the impact of pollution on the environment and human health. This research focuses on achieving long-t...
Long-term air pollution forecasting is essential for making public policies and issuing warnings. This will reduce the impact of pollution on the environment and human health. This research focuses on achieving long-term forecasting of air pollution attributes $(PM 2.5, PM_{10}, SO_{2}$, $NO_{2}, CO$, and $O_{3})$ by providing minimal historical data as input to the model. The best-performing models in this research produced between a 1% increase in RMSE for certain pollutants to a 50% decrease in RMSE for other air pollution attributes (except $CO)$ compared to the initial research on compositional learning, while being able to forecast the trend and seasonality accurately for more than one year into the future. The training time for each pollution attribute model dropped to 4 seconds compared to 1800 seconds in the case of the compositional learning method. This paper also delves into the challenges with long-term forecasting for the Beijing air quality dataset and discusses approaches to overcome these challenges.
This paper discusses intelligent constellation generation based on autoencoder communication system. In previous studies, the amplitude was set to fluctuate between r=0.0 and 1.0. However, when checking the generated ...
详细信息
ISBN:
(纸本)9798350305142
This paper discusses intelligent constellation generation based on autoencoder communication system. In previous studies, the amplitude was set to fluctuate between r=0.0 and 1.0. However, when checking the generated constellation, distortion was confirmed instead of the conventional symbol arrangement. Therefore, in this paper, it compares the case where the amplitude is constant, the case where the average amplitude within a Minibatch is 1, and the case where the average amplitude is 1 for Interval time. The communication standard used in this research is IEEE 802.11a, assuming wireless Local Area Network (LAN) specifications. The IEEE 802.11a standard has an Fast Fourier Transform (FFT) length of 64, a subcarrier number of 52, and Quadrature Phase Shift Keying (QPSK) and 16 Quadrature Amplitude Modulation (QAM), modulation methods. A guard interval of 800 ns is added and the symbol length is 4000 ns. First, a simulation was performed under the condition that the amplitude was kept constant. QPSK with 4 symbols, constant amplitude model is rounded more than previous research result. 16QAM with 16 symbols is arranged regularly like lined up on a line. Second, the simulation was performed under the condition that the average amplitude within the minibatch was set to 1. QPSK with 4 symbols, appears to rotate clockwise. 16QAM with 16 symbols has a more uniform symbol placement than previous research result. Third, a simulation was performed under the condition that the average amplitude within Interval time was set to 1. QPSK with 4 symbols, is the closest to square among QPSK output results so far. The direction is slightly tilted, but if it can be rotated a little more, it may be possible to reproduce the same symbol arrangement as before. 16QAM with 16 symbols, the symbol arrangement is biased as a whole. However, it can be seen that are arranged in line on the line, perhaps due to regularity. As future work, in addition to the conditions set this time, it will exa
Machine Learning (ML) models integrated into future 6G network architectures are anticipated to address the demanding task of Anomaly Detection (AD) at the Radio Access Network (RAN). A challenging but essential aspec...
详细信息
High blood pressure is one of the major causes of cardiovascular diseases, renal failure, and even sudden death. To avoid developing these health issues, it is important to consistently monitor blood pressure levels. ...
High blood pressure is one of the major causes of cardiovascular diseases, renal failure, and even sudden death. To avoid developing these health issues, it is important to consistently monitor blood pressure levels. Monitoring blood pressure levels regularly allows people to observe changes in their blood pressure measurements and contact their healthcare providers for guidance if needed. The aim of this paper is designing and developing a mobile application that can assist individuals to better understand the changes in their blood pressure levels by introducing a novel approach to visualizing blood pressure data and managing missing data. Employing a user-centered design approach, we designed and developed an app. To complete this study, we conducted a literature review to identify key design requirements for such apps and then, designed our low-fidelity prototype based on these design requirements. Next, we consulted with two experts to obtain their feedback on the content, presentation, and usability of our initial low-fidelity prototype. Based on these experts' feedback we designed our mid-fidelity and high-fidelity prototype. Eventually, we conducted a user evaluation study to evaluate our high-fidelity prototype. The results demonstrated this app provides a clear visual representation of blood pressure measurements over time.
The increasing popularity of cloud-based platforms has led to the emergence of two prominent open-source solutions: OpenStack and Kubernetes. OpenStack facilitates computing and networking resources through virtual ma...
The increasing popularity of cloud-based platforms has led to the emergence of two prominent open-source solutions: OpenStack and Kubernetes. OpenStack facilitates computing and networking resources through virtual machine instances, while Kubernetes excels in container orchestration, managing containerized workloads and services. This paper explores the implementation of Service Function Chaining (SFC) using a combination of virtual machines in OpenStack and containers in Kubernetes. The primary focus of our study is to analyze the performance of containers within the context of chain deployment in Kubernetes. Our experimentation reveals compelling insights into container bootup times, showcasing their efficiency when compared to virtual machines. Additionally, we meticulously evaluate the impact of integrating SFC-related interfaces into pods forming a chain, particularly assessing CPU, memory, and bandwidth utilization. Our findings underline the advantages of utilizing containers in SFC deployment scenarios and shed light on the potential overhead that arises during interface integration.
With the development of digitalization and digital transformation processes, there is a concern of consolidating strategic control methods based on the balanced scorecard (BSC), data envelopment analysis (DEA) and log...
详细信息
In today's environment, a reliable and effective technique for identifying spam reviews is essential if you want to purchase things online without being taken advantage of. There are possibilities for publishing r...
详细信息
In today's environment, a reliable and effective technique for identifying spam reviews is essential if you want to purchase things online without being taken advantage of. There are possibilities for publishing reviews in many internet locations, which opens the door for sponsored or deceptive fake reviews. These fabricated evaluations may mislead the general audience and leave them unsure of whether or not to believe them. The issue of spam review finding has been solved by the introduction of prominent deep literacy methods. The focus of recent research has been on supervised literacy practices that contain labelled data, which is inadequate for online review. This initiative aims to expose any dishonest textbook reviews. To do this, we've used both labelled and unlabeled data and suggested deep learning techniques for spam review detection, including Multi-Layer Perceptron (MLP), Convolutional Neural Networks (CNN), and a Long Short-Term Memory (LSTM) variation of Recurrent Neural Networks (RNN). We also used standard machine learning classifiers to identify spam reviews, including Naive Bayes (NB), K Nearest Neighbor (KNN), and Support Vector Machine (SVM). Finally, we compared the effectiveness of traditional and deep literacy classifiers. We'll use deep literacy classifiers to boost the finesse and efficiency.
暂无评论