Automatic analysis of actions in sports training can provide useful feedback for athletes. Fencing is one of the sports disciplines in which the correct technique for performing actions is very important. For any prac...
详细信息
Effective monitoring of water quality remains a problem, in real-time contamination detection and prediction. Despite advancements in the sector, many existing approaches continue to rely on labor-intensive laboratory...
详细信息
Modular conversational systems heavily rely on the performance of their natural language understanding (NLU) and natural language generation (NLG) components. NLU focuses on extracting core semantic concepts from inpu...
详细信息
The self-cascade(SC) method is an effective technique for chaos enhancement and complexity increasing in chaos ***, the controllable self-cascade(CSC) method allows for more accurate control of Lyapunov exponents of t...
详细信息
The self-cascade(SC) method is an effective technique for chaos enhancement and complexity increasing in chaos ***, the controllable self-cascade(CSC) method allows for more accurate control of Lyapunov exponents of the discrete map. In this work, the SC and CSC systems of the original map are derived, which enhance the chaotic performance while preserving the fundamental dynamical characteristics of the original map. Higher Lyapunov exponent of chaotic sequences corresponding to higher frequency are obtained in SC and CSC systems. Meanwhile, the Lyapunov exponent could be linearly controlled with greater flexibility in the CSC system. The verification of the numerical simulation and theoretical analysis is carried out based on the platform of CH32.
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature of Twitter makes cyberspace prominent (usually accessed via the dark web). The work used the datasets and considered the Scrape Twitter Data (Tweets) in Python using the SN-Scrape module and Twitter 4j API in JAVA to extract social data based on hashtags, which is used to select and access tweets for dataset design from a profile on the Twitter platform based on locations, keywords, and hashtags. The experiments contain two datasets. The first dataset has over 1700 tweets with a focus on location as a keypoint (hacking-for-fun data, cyber-violence data, and vulnerability injector data), whereas the second dataset only comprises 370 tweets with a focus on reposting of tweet status as a keypoint. The method used is focused on a new system model for analysing Twitter data and detecting terrorist attacks. The weights of susceptible keywords are found using a ternary search by the Aho-Corasick algorithm (ACA) for conducting signature and pattern matching. The result represents the ACA used to perform signature matching for assigning weights to extracted words of tweet. ML is used to evaluate Twitter data for classifying patterns and determining the behaviour to identify if a person is a terrorist. SVM (Support Vector Machine) proved to be a more accurate classifier for predicting terrorist attacks compared to other classifiers (KNN- K-Nearest Neighbour and NB-Naïve Bayes). The 1st dataset shows the KNN-Acc. -98.38% and SVM Accuracy as 98.85%, whereas the 2nd dataset shows the KNN-Acc. -91.68% and SVM Accuracy as 93.97%. The proposed work concludes that the generated weights are classified (cyber-violence, vulnerability injector, and hacking-for-fun) for further feature classification. Machine learning (ML) [KNN and SVM] is used to predict the occurrence and
As wafer circuit width shrinks down to less than ten nanometers in recent years,stringent quality control in the wafer manufacturing process is increasingly *** to the coupling of neighboring cluster tools and coordin...
详细信息
As wafer circuit width shrinks down to less than ten nanometers in recent years,stringent quality control in the wafer manufacturing process is increasingly *** to the coupling of neighboring cluster tools and coordination of multiple robots in a multi-cluster tool,wafer production scheduling becomes rather *** a wafer is processed,due to high-temperature chemical reactions in a chamber,the robot should be controlled to take it out of the processing chamber at the right *** order to ensure the uniformity of integrated circuits on wafers,it is highly desirable to make the differences in wafer post-processing time among the individual tools in a multicluster tool as small as *** achieve this goal,for the first time,this work aims to find an optimal schedule for a dual-arm multi-cluster tool to regulate the wafer post-processing *** do so,we propose polynomial-time algorithms to find an optimal schedule,which can achieve the highest throughput,and minimize the total post-processing time of the processing *** propose a linear program model and another algorithm to balance the differences in the post-processing time between any pair of adjacent cluster *** industrial examples are given to illustrate the application and effectiveness of the proposed method.
Blockchain technology has the characteristics of non-tampering and forgery, traceability, and so on, which have good application advantages for the storage of multimedia data. So we propose a novel method using matrix...
详细信息
A maximal photon number entangled state,namely NOON state,can be adopted for sensing with a quantum *** this work,we designed silicon quantum photonic chips containing two types of Mach-Zehnder interferometerswherein ...
详细信息
A maximal photon number entangled state,namely NOON state,can be adopted for sensing with a quantum *** this work,we designed silicon quantum photonic chips containing two types of Mach-Zehnder interferometerswherein the two-photon NOON state,sensing element for temperature or humidity,is *** with classicallight or single photon case,two-photon NOON state sensing shows a solid enhancement in the sensing resolution *** the first demonstration of on-chip quantum photonic sensing,it reveals the advantages of photonic chips forhigh integration density,small-size,stability for multiple-parameter sensing serviceability.A higher sensing precision isexpected to beat the standard quantum limit with a higher photon number NOON state.
The upsurge in urbanization is depleting natural resources due to the wide usage of aggregates in construction, posing a menace to further progress. If the contemporary state persists, it becomes a threat for further ...
详细信息
Predicting crop disease on the image obtained from the affected crop has been a potential research topic. In this research, the Localise Search Optimisation Algorithm (LSOA) enabled deep Convolutional Neural Network (...
详细信息
暂无评论