Despite significant advances in abstract summarization models based on pretrained language models, an unresolved issue is that the generated summaries are not always faithful to the input documents, meaning they are p...
详细信息
Previous studies on text-image sentiment analysis mostly involved simple text feature extraction and image feature extraction, followed by their fusion to obtain the final sentiment polarity. However, these approaches...
详细信息
In order to improve the detection performance of traditional single-source remote sensing image ship detection methods in terms of anti-interference capability and multi-scale targets. We develop an improved algorithm...
详细信息
To address the problem of low transmission rate of information embedded in radar waveforms, an integrated orthogonal frequency division multiplexing-index modulation (OFDM-IM) lidar-communication system is proposed. A...
详细信息
In our research, we obtained resting-state functional magnetic resonance imaging (rs-fMRI) data from 23 newly diagnosed, drug-free Major Depressive Disorder (MDD) patients and 20 age- and sex-matched healthy controls ...
详细信息
This paper investigates the multi-Unmanned Aerial Vehicle(UAV)-assisted wireless-powered Mobile Edge Computing(MEC)system,where UAVs provide computation and powering services to mobile *** aim to maximize the number o...
详细信息
This paper investigates the multi-Unmanned Aerial Vehicle(UAV)-assisted wireless-powered Mobile Edge Computing(MEC)system,where UAVs provide computation and powering services to mobile *** aim to maximize the number of completed computation tasks by jointly optimizing the offloading decisions of all terminals and the trajectory planning of all *** action space of the system is extremely large and grows exponentially with the number of *** this case,single-agent learning will require an overlarge neural network,resulting in insufficient ***,the offloading decisions and trajectory planning are two subproblems performed by different executants,providing an opportunity for *** thus adopt the idea of decomposition and propose a 2-Tiered Multi-agent Soft Actor-Critic(2T-MSAC)algorithm,decomposing a single neural network into multiple small-scale *** the first tier,a single agent is used for offloading decisions,and an online pretrained model based on imitation learning is specially designed to accelerate the training process of this *** the second tier,UAVs utilize multiple agents to plan their *** agent exerts its influence on the parameter update of other agents through actions and rewards,thereby achieving joint *** results demonstrate that the proposed algorithm can be applied to scenarios with various location distributions of terminals,outperforming existing benchmarks that perform well only in specific *** particular,2T-MSAC increases the number of completed tasks by 45.5%in the scenario with uneven terminal ***,the pretrained model based on imitation learning reduces the convergence time of 2T-MSAC by 58.2%.
Simple linear models are even more competitive in forecasting tasks than some well-designed models, such as transformer-based models;meanwhile, deep models, particularly multi-layer perceptrons, can outperform linear ...
详细信息
Named Entity Recognition (NER) plays a crucial role in Chinese Natural Language Processing, particularly in medical texts containing numerous nested entities. Existing NER techniques often rely on Bidirectional Long S...
详细信息
Highways serve as vital connectors between cities, yet they often suffer from traffic congestion as the population continues to grow. Various intelligent frameworks or models for traffic status prediction have been em...
详细信息
Highways serve as vital connectors between cities, yet they often suffer from traffic congestion as the population continues to grow. Various intelligent frameworks or models for traffic status prediction have been employed in the Intelligent Transport System (ITS) to provide services for convenient and safe traveling, effective traffic management, and smart signal control. Most of these frameworks typically involve learning processes that utilize learning algorithms and requires training data. For highway traffic, the Greenshields model offers a practical relationship among vehicle speeds, traffic flows, and traffic density, which can serve as fundamental knowledge for developing intelligent traffic management systems. This paper proposes a fuzzy logic system based on the Greenshields model as the knowledge base for quickly predicting highway traffic congestion without extensive preparing data. Our system operates in two modes: jam and non-jam modes. In each model, the two inputs of vehicle speed and traffic flow are processed respectively with specified membership functions for effective fuzzification. The set of rules and conditions guided by the Greenshields theory is governed by the inference mechanism, which makes decisions according to the input field. Subsequently, the defuzzification process converts the fuzzy sets obtained by the inference engine into a congestion level as the output. To validate the accuracy of our system, a polynomial regression model utilizing realistic data from roadside equipment on the Sun Yat-Sen Highway in Taiwan is established for comparison. Comparing the observed data points from the polynomial regression model with the outputs obtained from our system using the same inputs, both predicting outputs are found to be consistent, affirming the practical feasibility of the proposed system. Moreover, our proposed scheme is adaptable to suit diverse road conditions without extensive training data and possesses a short memory to perform
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature of Twitter makes cyberspace prominent (usually accessed via the dark web). The work used the datasets and considered the Scrape Twitter Data (Tweets) in Python using the SN-Scrape module and Twitter 4j API in JAVA to extract social data based on hashtags, which is used to select and access tweets for dataset design from a profile on the Twitter platform based on locations, keywords, and hashtags. The experiments contain two datasets. The first dataset has over 1700 tweets with a focus on location as a keypoint (hacking-for-fun data, cyber-violence data, and vulnerability injector data), whereas the second dataset only comprises 370 tweets with a focus on reposting of tweet status as a keypoint. The method used is focused on a new system model for analysing Twitter data and detecting terrorist attacks. The weights of susceptible keywords are found using a ternary search by the Aho-Corasick algorithm (ACA) for conducting signature and pattern matching. The result represents the ACA used to perform signature matching for assigning weights to extracted words of tweet. ML is used to evaluate Twitter data for classifying patterns and determining the behaviour to identify if a person is a terrorist. SVM (Support Vector Machine) proved to be a more accurate classifier for predicting terrorist attacks compared to other classifiers (KNN- K-Nearest Neighbour and NB-Naïve Bayes). The 1st dataset shows the KNN-Acc. -98.38% and SVM Accuracy as 98.85%, whereas the 2nd dataset shows the KNN-Acc. -91.68% and SVM Accuracy as 93.97%. The proposed work concludes that the generated weights are classified (cyber-violence, vulnerability injector, and hacking-for-fun) for further feature classification. Machine learning (ML) [KNN and SVM] is used to predict the occurrence and
暂无评论