Existing graph neural network (GNN) based recommendation models depend highly on initial node features and graph structures. Most prior studies do not support the use of additional information on user-item interaction...
详细信息
This research is aimed to develop and evaluate an Electronic Human Resource Management (E-HRM) system called WorkEv to assist in monitoring and improving employee's performance. The application was developed based...
详细信息
In this paper, we consider multi-view video and audio streaming using MPEG-DASH, which enables to transmit video tailored to the network conditions over HTTP communication. This paper uses HTTP/2 instead of HTTP/1.1, ...
详细信息
ISBN:
(数字)9798350353983
ISBN:
(纸本)9798350353990
In this paper, we consider multi-view video and audio streaming using MPEG-DASH, which enables to transmit video tailored to the network conditions over HTTP communication. This paper uses HTTP/2 instead of HTTP/1.1, which the authors previously used. HTTP/2 manages a series of request-response exchanges called a stream, which is assigned a unique stream ID. We perform a subjective experiment under various network conditions to evaluate application-level QoS and QoE. From the evaluation results, we investigate the effect of the HTTP/2 stream on the video and audio quality of the users in the multi-view video transmission scenario.
This paper compares video and audio QoE of OFDMA multi-user transmission and reliable groupcast over wireless LAN. We assume video and audio transmission to several terminals simultaneously. As a reliable groupcast me...
详细信息
ISBN:
(数字)9798350364866
ISBN:
(纸本)9798350364873
This paper compares video and audio QoE of OFDMA multi-user transmission and reliable groupcast over wireless LAN. We assume video and audio transmission to several terminals simultaneously. As a reliable groupcast method, we employ Unsolicited Retry, a technique of IEEE 802.11aa GroupCast with Retries. We utilize IEEE 802.11ax for OFDMA transmission. We evaluate application-level QoS by computer simulation. We then assess QoE through a subjective experiment with video and audio streams generated by the output timing obtained from the simulation. We notice that each method has a situation to be applied appropriately.
High-precision cylindrical parts are critical components across various industries including aerospace, automotive, and manufacturing. Since these parts play a pivotal role in the performance and safety of the systems...
详细信息
This paper considers multi-view video and audio transmission on ICN (Information-Centric Networking)/CCN (Content-Centric Networking). Routers in ICN/CCN can cache content. Besides, the capacity of routers' caches...
详细信息
ISBN:
(数字)9798350374537
ISBN:
(纸本)9798350374544
This paper considers multi-view video and audio transmission on ICN (Information-Centric Networking)/CCN (Content-Centric Networking). Routers in ICN/CCN can cache content. Besides, the capacity of routers' caches is finite, so various cache control schemes have been proposed to improve cache efficiency. This paper presents and evaluates a new and suitable control scheme for multi-view video and audio transmission. For this purpose, we construct a network environment with Cefore. We assess application-level QoS (Quality of Service) and QoE (Quality of Experience). We then show the effectiveness of the proposed control scheme.
The scarcity of annotated medical images is a major bottleneck in developing learning models for medical image analysis. Hence, recent studies have focused on pretrained models with fewer annotation requirements that ...
详细信息
Several challenges have emerged as a result of the rapid spread of Covid-19 in Indonesia. To combat the pandemic, the government has also issued general guidelines for avoiding/limiting direct contact with common peop...
详细信息
With the development of information technology,malware threats to the industrial system have become an emergent issue,since various industrial infrastructures have been deeply integrated into our modern works and *** ...
详细信息
With the development of information technology,malware threats to the industrial system have become an emergent issue,since various industrial infrastructures have been deeply integrated into our modern works and *** identify and classify new malware variants,different types of deep learning models have been widely explored ***,sufficient data is usually required to achieve a well-trained deep learning classifier with satisfactory generalization ***,in current practical applications,an ample supply of data is absent in most specific industrial malware detection *** learning as an effective approach can be used to alleviate the influence of the small sample size *** addition,it can also reuse the knowledge from pretrained models,which is beneficial to the real-time requirement in industrial malware *** this paper,we investigate the transferable features learned by a 1D-convolutional network and evaluate our proposed methods on 6 transfer learning *** experiment results show that 1D-convolutional architecture is effective to learn transferable features for malware classification,and indicate that transferring the first 2 layers of our proposed 1D-convolutional network is the most efficient way to reuse the learned features.
The attention mechanism is one of the key enablers which have positioned transformer models as the state-of-the-art models in Natural Language Processing. By having the attention mechanism, the first version (vanilla)...
详细信息
暂无评论