The agriculture industry's production and food quality have been impacted by plant leaf diseases in recent years. Hence, it is vital to have a system that can automatically identify and diagnose diseases at an ini...
详细信息
Referring Video Object Segmentation (RVOS) aims to segment specific objects in videos based on the provided natural language descriptions. As a new supervised visual learning task, achieving RVOS for a given scene req...
详细信息
Breast cancer poses a significant global threat, highlighting the urgent need for early detection to reduce mortality rates. Researchers are working to minimize the occurrence of false positives and false negatives, t...
详细信息
Semantic communication has emerged as a promising solution to meet the growing demand for efficient data transmission in the information age. Unlike traditional communication methods that focus on transmitting raw dat...
详细信息
Artificial Intelligence of Things (AIoT) is an emerging frontier based on the deep fusion of Internet of Things (IoT) and Artificial Intelligence (AI) technologies. The fundamental goal of AIoT is to establish a self-...
详细信息
Artificial Intelligence of Things (AIoT) is an emerging frontier based on the deep fusion of Internet of Things (IoT) and Artificial Intelligence (AI) technologies. The fundamental goal of AIoT is to establish a self-organizing, self-learning, self-adaptive, and continuous-evolving AIoT system by orchestrating intelligent connections among Humans, Machines, and IoT devices. Although advanced deep learning techniques enhance the efficient data processing and intelligent analysis of complex IoT data, they still suffer from notable challenges when deployed to practical AIoT applications, such as constrained resources, dynamic environments, and diverse task requirements. Knowledge transfer, a popular and promising area in machine learning, is an effective method to enhance learning performance by avoiding the exorbitant costs associated with data recollection and model retraining. Notably, although there are already some valuable and impressive surveys on transfer learning, these surveys introduce approaches in a relatively isolated way and lack the recent advances of various knowledge transfer techniques for AIoT field. This survey endeavors to introduce a new concept of knowledge transfer, referred to as Crowd Knowledge Transfer (CrowdTransfer), which aims to transfer prior knowledge learned from a crowd of agents to reduce the training cost and as well as improve the performance of the model in real-world complicated scenarios. Particularly, we present four transfer modes from the perspective of crowd intelligence, including derivation, sharing, evolution and fusion modes. Building upon conventional transfer learning methods, we further delve into advanced crowd knowledge transfer models from three perspectives for various AIoT applications: intra-agent knowledge transfer, centralized inter-agent knowledge transfer, and decentralized inter-agent knowledge transfer. Furthermore, we explore some applications of AIoT areas, such as human activity recognition, urban comp
作者:
Zjavka, LadislavDepartment of Computer Science
Faculty of Electrical Engineering and Computer Science VŠB-Technical University of Ostrava 17. Listopadu 15/2172 Ostrava Czech Republic
Photovoltaic (PV) power is generated by two common types of solar components that are primarily affected by fluctuations and development in cloud structures as a result of uncertain and chaotic processes. Local PV for...
详细信息
Photovoltaic (PV) power is generated by two common types of solar components that are primarily affected by fluctuations and development in cloud structures as a result of uncertain and chaotic processes. Local PV forecasting is unavoidable in supply and load planning necessary in integration of smart systems into electrical grids. Intra- or day-ahead modelling of weather patterns based on Artificial Intelligence (AI) allows one to refine available 24 h. cloudiness forecast or predict PV production at a particular plant location during the day. AI usually gets an adequate prediction quality in shorter-level horizons, using the historical meteo- and PV record series as compared to Numerical Weather Prediction (NWP) systems. NWP models are produced every 6 h to simulate grid motion of local cloudiness, which is additionally delayed and usually scaled in a rough less operational applicability. Differential Neural Network (DNN) is based on a newly developed neurocomputing strategy that allows the representation of complex weather patterns analogous to NWP. DNN parses the n-variable linear Partial Differential Equation (PDE), which describes the ground-level patterns, into sub-PDE modules of a determined order at each node. Their derivatives are substituted by the Laplace transforms and solved using adapted inverse operations of Operation Calculus (OC). DNN fuses OC mathematics with neural computing in evolution 2-input node structures to form sum modules of selected PDEs added step-by-step to the expanded composite model. The AI multi- 1…9-h and one-stage 24-h models were evolved using spatio-temporal data in the preidentified daily learning sequences according to the applied input–output data delay to predict the Clear Sky Index (CSI). The prediction results of both statistical schemes were evaluated to assess the performance of the AI models. Intraday models obtain slightly better prediction accuracy in average errors compared to those applied in the second-day-ahead
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are vital in facilitating end-user communication ***,the security of Android systems has been challenged by the sensitive data involved,leading to vulnerabilities in mobile devices used in 5G *** vulnerabilities expose mobile devices to cyber-attacks,primarily resulting from security ***-permission apps in Android can exploit these channels to access sensitive information,including user identities,login credentials,and geolocation *** such attack leverages"zero-permission"sensors like accelerometers and gyroscopes,enabling attackers to gather information about the smartphone's *** underscores the importance of fortifying mobile devices against potential future *** research focuses on a new recurrent neural network prediction model,which has proved highly effective for detecting side-channel attacks in mobile devices in 5G *** conducted state-of-the-art comparative studies to validate our experimental *** results demonstrate that even a small amount of training data can accurately recognize 37.5%of previously unseen user-typed ***,our tap detection mechanism achieves a 92%accuracy rate,a crucial factor for text *** findings have significant practical implications,as they reinforce mobile device security in 5G networks,enhancing user privacy,and data protection.
In this paper, we investigate the acceptance of students in learning activities using the social web site, the interactions among participants, and the effect of knowledge sharing and construction. In brief, the socia...
详细信息
Clausius was the first to coin the term 'entropy' roughly 160 years ago. Since then, many scholars from several scientific fields have continued to enhance, develop, and interpret the data. This study describe...
详细信息
In recent years, academics have placed a high value on multi-modal emotion identification, as well as extensive research has been conducted in the areas of video, text, voice, and physical signal emotion detection. Th...
详细信息
暂无评论