The ModelWriter platform provides a generic framework for automated traceability analysis. In this paper, we demonstrate how this framework can be used to trace the consistency and completeness of technical documents ...
详细信息
Urban air is frequently contaminated with CO, CO2, VOC, HCHO, PM 2.5, and PM 10. Rural regions are at a lower risk than those near roads and industrial areas that produce emissions. Air pollutants negatively affect it...
Urban air is frequently contaminated with CO, CO2, VOC, HCHO, PM 2.5, and PM 10. Rural regions are at a lower risk than those near roads and industrial areas that produce emissions. Air pollutants negatively affect its inhabitants' health, particularly the respiratory system. Most people will spend more time indoors, requiring a method for monitoring indoor air quality (IAQ). Urban communities need IAQ monitoring instruments as an early warning system for their health. This research seeks to produce inexpensive IAQ that can be utilized by all levels of society, particularly urban communities. This research utilizes a qualitative, design-thinking-based methodology. The research diverged from Empatize, which asserts that urban communities require a method for determining the local air quality. Moreover, it is determined at the define stage that IAQ monitoring, which includes a data log feature, is still comparatively expensive, so a solution is developed at the ideate stage. Creating a prototype is the next step in realizing the specified solution. In this investigation, they decided to use IAQ monitoring, which is relatively inexpensive but lacks log data storage. The author uses the ESP32-cam microcontroller to capture the screen display device, and the resulting image is sent to a telegram and processed with optical character recognition (OCR) to generate a data log. The results of prototype testing are utilized for prototype development.
Aiming at the problem of poor task versatility in the strategy learning of complex tasks and cannot be generalized to obstacle environments, a method for robots learning from demonstration based on Dynamic Movement Pr...
详细信息
As the mobile Internet is developing rapidly, people who use cell phones to access the Internet dominate, and the mobile Internet has changed the development environment of online public opinion and made online public...
详细信息
As the mobile Internet is developing rapidly, people who use cell phones to access the Internet dominate, and the mobile Internet has changed the development environment of online public opinion and made online public opinion events spread more widely. In the online environment, any kind of public issues may become a trigger for the generation of public opinion and thus need to be controlled for network supervision. The method in this paper can identify entities from the event texts obtained from mobile Today's Headlines, People's Daily, etc., and informatize security of public opinion in event instances, thus strengthening network supervision and control in mobile, and providing sufficient support for national security event management. In this paper, we present a SW-BiLSTM-CRF model, as well as a model combining the RoBERTa pre-trained model with the classical neural network BiLSTM model. Our experiments show that this approach provided achieves quite good results on Chinese emergency corpus, with accuracy and F1 values of 87.21% and 78.78%, respectively.
Malware scanning of an app market is expected to be scalable and effective. However, existing approaches use syntax-based features that can be evaded by transformation attacks or semantic-based features which are usua...
详细信息
5G technology is constrained by its higher frequency band and smaller coverage area, which leads to the need for operators to use technologies such as small cell base stations to increase the density of base station d...
详细信息
ISBN:
(纸本)9781665432078
5G technology is constrained by its higher frequency band and smaller coverage area, which leads to the need for operators to use technologies such as small cell base stations to increase the density of base station deployment to ensure signal coverage quality, which leads to more enormous construction costs. Therefore, it is urgent to find a safe and reliable solution that can use the existing public network to realize small cell base stations with automatic access. Based on this demand, we summarize various existing small cell base station automatic access technology solutions and their advantages and disadvantages while combing the characteristics of blockchain technology and its application solutions in similar scenarios. And then, we propose a new blockchain-based base station automatic access solution and implements the system in a practical scenario. In our solution, we innovatively introduce blockchain as an intermediate manager for small base stations and core networks, which solves traditional solutions requiring customized equipment while ensuring safety and reliability. It reduces costs and improves efficiency, but some problems are brought by the “decentralization” of blockchain waiting to be solved.
Computational music research plays a critical role in advancing music production, distribution, and understanding across various musical styles in the world. Despite the immense cultural and religious significance, th...
详细信息
The Coronavirus disease 2019 (COVID-19) has rapidly spread all over the world since its first report in December 2019 and thoracic computed tomography (CT) has become one of the main tools for its diagnosis. In recent...
详细信息
In insulating liquid,a conductive particle becomes charged through the interaction with a conductor exposed to an applied ***,it migrates in the action of both electric field and fluid and causes the enhancement of lo...
详细信息
In insulating liquid,a conductive particle becomes charged through the interaction with a conductor exposed to an applied ***,it migrates in the action of both electric field and fluid and causes the enhancement of local field when it is in proximity of the conductor with opposite *** enhancement will lead to partial discharge(PD)and may even ignite full gap breakdown in special *** study reviews comprehensive researches relevant to these *** the first place,several theoretical methods about how to obtain the charges held by a conductive particle with known potential are introduced,so are experimental ***,forces acting on the charged particle in liquid are classified,and its migration characteristics,as well as influential factors,are ***,PD and breakdown mechanisms of liquid initiated by conductive particles are *** latter involves two cases:electric-field enhancement when the particle concentration is low and bridging phenomenon when it is *** last,two important,but frequently ignored factors,*** barrier and oil flow,are highlighted,and the authors’suggestions for future work are put forward.
In this paper, continuous-time noncooperative games in networks of double-integrator agents are explored. The existing methods require that agents communicate with their neighbors in real time. In this paper, we propo...
详细信息
暂无评论