The problem of achieving performance-guaranteed finite-time exact tracking for uncertain strict-feedback nonlinear systems with unknown control directions is addressed. A novel logic switching mechanism with monitorin...
详细信息
In maritime emergency response operations, autonomous underwater vehicles (AUVs) can perform underwater search and transmit emergency data in real-time. To collect the sensed data from AUVs across the water-air interf...
详细信息
In hyperspectral remote sensing imagery, pixel interactions within defined spatial extents result in the mixing of adjacent pixels. Additionally, the high similarity of adjacent spectra leads to information redundancy...
详细信息
In this opinion piece, we question the efficacy of students conducting systematic reviews (SRs) at the very start of their PhDs, especially now that we are riding, or drowning in, the Generative AI wave. How would the...
Purpose: This paper is focused on the role of ChatGPT an artificial intelligence (AI) language model in the area of sports trauma. Sports trauma represents some significant concerns due to its prevalence and impacts. ...
详细信息
Restoring the patient's occlusal function of broken teeth is a challenging task since tooth texture is very complex, a slight deviation may affect the patient's chewing function and temporomandibular joint fun...
详细信息
Determining the critical factors affecting antenatal visits will greatly contribute to reducing maternal and infant mortality. This study, thus attempted to construct a cluster-based predictive model to determine the ...
详细信息
False news spreads quickly due to the extensive distribution of incorrect or misleading information across digital channels, which is a global problem. This bias undermines the credibility of information, promotes the...
详细信息
Most supervised methods for relation extraction(RE) involve time-consuming human annotation. Distant supervision for RE is an efficient method to obtain large corpora that contains thousands of instances and various r...
详细信息
Most supervised methods for relation extraction(RE) involve time-consuming human annotation. Distant supervision for RE is an efficient method to obtain large corpora that contains thousands of instances and various relations. However, the existing approaches rely heavily on knowledge bases(e.g., Freebase), thereby introducing data noise. Various relations and noisy labeling instances make the issue difficult to solve. In this study, we propose a model based on a piecewise convolution neural network with adversarial training. Inspired by generative adversarial networks, we adopt a heuristic algorithm to identify noisy datasets and apply adversarial training to RE. Experiments on the extended dataset of SemEval-2010 Task 8 show that our model can obtain more accurate training data for RE and significantly outperforms several competitive baseline models. Our model has an F1 score of 89.61%.
In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity *** has led to the development and commercialization of Digital Twi...
详细信息
In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity *** has led to the development and commercialization of Digital Twin(DT)*** widespread adoption of DT has resulted in a new network paradigm called Digital Twin Networks(DTNs),which orchestrate through the networks of ubiquitous DTs and their corresponding physical *** create virtual twins of physical objects via DT technology and realize the co-evolution between physical and virtual spaces through data processing,computing,and DT *** high volume of user data and the ubiquitous communication systems in DTNs come with their own set of *** most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data ***,currently,there is not enough literature that focuses on privacy and security issues in DTN *** this survey,we first provide a clear idea of the components of DTNs and the common metrics used in literature to assess their ***,we offer a standard network model that applies to most DTN applications to provide a better understanding of DTN’s complex and interleaved communications and the respective *** then shed light on the common applications where DTNs have been adapted heavily and the privacy and security issues arising from the *** also provide different privacy and security countermeasures to address the previously mentioned issues in DTNs and list some state-of-the-art tools to mitigate the ***,we provide some open research issues and problems in the field of DTN privacy and security.
暂无评论