Non-orthogonal multiple access (NOMA) enables multiple users to share the same frequency band, and simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) provides 360-degree full-spac...
详细信息
Internet of Things (IoT) consists of a wide variety of devices with limited power sources. Due to the adhered reason, energy consumption is considered as one of the major challenges in the IoT environment. In this res...
详细信息
The paper discusses the problem of creating an autonomous SCARA robot that can precisely carry out pick-and-place operations in unstructured settings. The suggested method combines computer vision and deep learning al...
详细信息
ISBN:
(数字)9798331527549
ISBN:
(纸本)9798331527556
The paper discusses the problem of creating an autonomous SCARA robot that can precisely carry out pick-and-place operations in unstructured settings. The suggested method combines computer vision and deep learning algorithms to provide accurate 6D pose estimation and reliable object detection. Combining YOLOv8 for object detection, hand-eye calibration for precise transformation to robot coordinates, and Principal Component Analysis (PCA) for orientation estimation within the generated point cloud, a novel method for estimating object pose is presented. Monocular depth estimation techniques are used to extract depth information from RGB images to create point clouds. The results demonstrate the potential of combining advanced algorithms with user-friendly design for robotics automation, showing notable gains in pose estimation accuracy and task execution efficiency.
To take unit commitment (UC) decisions under uncertain net load, most studies utilize a stochastic UC (SUC) model that adopts a one-size-fits-all representation of uncertainty. Disregarding contextual information such...
详细信息
To take unit commitment (UC) decisions under uncertain net load, most studies utilize a stochastic UC (SUC) model that adopts a one-size-fits-all representation of uncertainty. Disregarding contextual information such as weather forecasts and temporal information, these models are typically plagued by a poor out-of-sample performance. To effectively exploit contextual information, in this paper, we formulate a conditional SUC problem that is solved given a covariate observation. The presented problem relies on the true conditional distribution of net load and so cannot be solved in practice. To approximate its solution, we put forward a predictive prescription framework, which leverages a machine learning model to derive weights that are used in solving a reweighted sample average approximation problem. In contrast with existing predictive prescription frameworks, we manipulate the weights that the learning model delivers based on the specific dataset, present a method to select pertinent covariates, and tune the hyperparameters of the framework based on the out-of-sample cost of its policies. We conduct extensive numerical studies, which lay out the relative merits of the framework vis-à-vis various benchmarks.
Full-marathon and Half-marathon distances are categorized as road running. Full-marathon running is becoming increasingly popular, and Half-marathon is increasing worldwide in both sexes and all age groups. Some aspec...
详细信息
ISBN:
(数字)9798331505530
ISBN:
(纸本)9798331505547
Full-marathon and Half-marathon distances are categorized as road running. Full-marathon running is becoming increasingly popular, and Half-marathon is increasing worldwide in both sexes and all age groups. Some aspects might relate to Full-marathon and Half-marathon running performance during training and races. Technology also plays an essential role in supporting runners and running races. Technology like artificial intelligence (AI) now supports the running athlete, not only predicting performance and results. It can also be used later to help the coach generate training programs for the athlete. This research aimed to find many aspects of marathons and performance and analyze them to see if artificial intelligence could later support them. It used secondary data and a systematic literature review proposed by Kitchenham. Out of the 58 articles, 21 of them (36.21%) received a score of 1 from Q1. Additionally, 19 articles (32.76%) received a score of 1 from both Q2 and Q3. Among the 58 articles, 9 (15.52%) received a total score of 3, with all three Q1, Q2, and Q3 scores being 1. This indicates that artificial intelligence will likely support the content of these nine articles. Several factors were also discovered to be connected to marathons and athletic performance. These findings suggested that additional investigation into marathons and performance, later backed by artificial intelligence, remained pertinent and essential.
In both academia and industry, the usage of fake certificates has led to misjudging learners and workers. Moreover, the digital form of certificate has made this problem more critical, especially in the educational sy...
详细信息
Doctors prescribe drugs for the patient with the objective of curing the patient. Some drugs cannot be consumed together since doing so may cause negative effects. This can be avoided by knowing the effects caused by ...
Doctors prescribe drugs for the patient with the objective of curing the patient. Some drugs cannot be consumed together since doing so may cause negative effects. This can be avoided by knowing the effects caused by consuming combinations of drugs. However, for complex cases of a patient, it can be difficult to decide the best combination of drugs. Therefore, automatic drug recommendation method was used to recommend drugs with minimal negative effects. It is performed by using a deep learning model which is trained on drug data. A graph called drug-drug interaction (DDI) is used to represent the drugs and effects of consuming one drug with other drugs. Additionally, information about the combination of drugs prescribed in the past for a patient is also important for drug recommendation. It can also be represented as a graph called drug concurrence relation (DCR). The DDI and DCR graphs can be input to the deep learning model through an encoding process. In this paper, we propose a graph encoding-enhanced transformer (GEET) to recommend drugs. The DDI and DCR graphs are encoded by using Graph Attention Network (GAT). The graph encoding model has multi-head attention, which makes the GEET model aware of the most important DDI and DCR from the graphs. Additionally, the encoding outputs are combined, and activation function and normalization methods are used to improve the performance. The model has been evaluated on the publicly available MIMIC-III dataset and has the best results on F1, Jaccard and PRAUC scores compared to the models proposed by the existing related research papers.
In the context of smart cities, it is necessary to record and analyse crowd mobility for various reasons, such as providing efficient public services and preventing accidents. However, recording and tracking individu...
详细信息
For the prediction of deep myometrial invasion (DMI) in endometrial cancer (EC), this study proposes an ensemble learning method which combines deep learning (DL) and improved Bayesian extreme learning machine (BELM)....
详细信息
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp...
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comprehensive overview of data poisoning including attack techniques, adversary incentives, impacts on security and reliability, detection methods, defenses, and key research gaps. We examine label flipping, instance injection, backdoors, and other attack categories that enable malicious outcomes ranging from IP theft to accidents in autonomous systems. Promising detection approaches include statistical tests, robust learning, and forensics. However, significant challenges remain in translating academic defenses like adversarial training and sanitization into practical tools ready for operational use. With safety and trustworthiness at stake, more research on benchmarking evaluations, adaptive attacks, fundamental tradeoffs, and real-world deployment of defenses is urgently needed. Understanding vulnerabilities and developing resilient machine learning pipelines will only grow in importance as data integrity is fundamental to developing safe artificial intelligence.
暂无评论