Electroencephalography (EEG) is pivotal in monitoring and analysing cerebral activity across diverse domains, including medical diagnostics, cognitive neuroscience, and brain-computer interfaces. However, the inherent...
详细信息
To identify if novel/unfamiliar keyboard layouts like OPTI can outperform QWERTY, lengthy training through longitudinal studies is typically required. To reduce this logistical bottleneck, a popular approach in the li...
详细信息
With the rapid development of information technology,IoT devices play a huge role in physiological health data *** exponential growth of medical data requires us to reasonably allocate storage space for cloud servers ...
详细信息
With the rapid development of information technology,IoT devices play a huge role in physiological health data *** exponential growth of medical data requires us to reasonably allocate storage space for cloud servers and edge *** storage capacity of edge nodes close to users is *** should store hotspot data in edge nodes as much as possible,so as to ensure response timeliness and access hit rate;However,the current scheme cannot guarantee that every sub-message in a complete data stored by the edge node meets the requirements of hot data;How to complete the detection and deletion of redundant data in edge nodes under the premise of protecting user privacy and data dynamic integrity has become a challenging *** paper proposes a redundant data detection method that meets the privacy protection *** scanning the cipher text,it is determined whether each sub-message of the data in the edge node meets the requirements of the hot *** has the same effect as zero-knowledge proof,and it will not reveal the privacy of *** addition,for redundant sub-data that does not meet the requirements of hot data,our paper proposes a redundant data deletion scheme that meets the dynamic integrity of the *** use Content Extraction Signature(CES)to generate the remaining hot data signature after the redundant data is *** feasibility of the scheme is proved through safety analysis and efficiency analysis.
The brain-computer interface (BCI) and eye-tracking technologies can potentially improve the learning environment in education. Cognitive BCIs can give a deep knowledge of brain functioning, enabling the creation of m...
详细信息
The disruptive technology provided by large-scale pre-trained language models (LLMs) such as ChatGPT or GPT-4 has received significant attention in several application domains, often with an emphasis on high-level opp...
ISBN:
(纸本)9798350369663
The disruptive technology provided by large-scale pre-trained language models (LLMs) such as ChatGPT or GPT-4 has received significant attention in several application domains, often with an emphasis on high-level opportunities and concerns. This paper is the first examination regarding the use of LLMs for scientific simulations. We focus on four modeling and simulation tasks, each time assessing the expected benefits and limitations of LLMs while providing practical guidance for modelers regarding the steps involved. The first task is devoted to explaining the structure of a conceptual model to promote the engagement of participants in the modeling process. The second task focuses on summarizing simulation outputs, so that model users can identify a preferred scenario. The third task seeks to broaden accessibility to simulation platforms by conveying the insights of simulation visualizations via text. Finally, the last task evokes the possibility of explaining simulation errors and providing guidance to resolve them.
Determining the position of a User Terminal (UT) with a high degree of accuracy is crucial for enabling a plethora of emerging applications, such as immersive remote presence, holographic teleportation, connected robo...
详细信息
ISBN:
(数字)9798350317886
ISBN:
(纸本)9798350317893
Determining the position of a User Terminal (UT) with a high degree of accuracy is crucial for enabling a plethora of emerging applications, such as immersive remote presence, holographic teleportation, connected robotics, augmented reality (AR). Such accuracy will require the incorporation of Terahertz (THz) frequency bands into 6G mobile networks. In this context, we propose an approach which combines the Angle of Departure (AoD) technique with THz localization for localizing UTs in 6G mobile networks. The simulation environment is set up by using NYUSIM 4.0. Results are expressed in terms of localization errors, and show that the mean localization error is very small, indicating that the estimated positions from the simulation is close to the real positions for a given trajectory.
Because of a phenomenon known as the 'curs e of dimensionality,' standard machine learning algorithms have difficulty dealing with high-dimensional data. There are more possible examples in the data space as t...
详细信息
The latest breakthroughs in large language models (LLM) have empowered software development tools, such as ChatGPT, to aid developers in complex tasks. Developers use ChatGPT to write code, review code changes, and ev...
详细信息
ISBN:
(数字)9798400705878
ISBN:
(纸本)9798350363982
The latest breakthroughs in large language models (LLM) have empowered software development tools, such as ChatGPT, to aid developers in complex tasks. Developers use ChatGPT to write code, review code changes, and even debug their programs. In these interactions, ChatGPT often recommends code snippets that depend on external libraries. However, code from libraries changes over time, invalidating a once-correct code snippet and making it difficult to reuse recommended *** this study, we analyze DevGPT, a dataset of more than 4,000 Developer-ChatGPT interactions, to understand the role of library versions in code-related conversations. We quantify how often library version constraints are mentioned in code-related conversations and when ChatGPT recommends the installation of specific libraries. Our findings show that, albeit to constantly recommend and analyze code with external dependencies, library version constraints only appear in 9% of the conversations. In the majority of conversations, the version constraints are prompted by users (as opposed to being specified by ChatGPT) as a method for receiving better quality responses. Moreover, we study how library version constraints are used in the conversation through qualitative methods, identifying several potential problems that warrant further research.
Piwi-interacting RNAs (piRNAs) function as critical regulators, safeguarding genome stability through mechanisms like transposable element repression and gene stability maintenance, while also being associated with va...
详细信息
With extensive research and development in blockchain technology, the concern about scalability, security, and decentralization is still evident. Blockchain trilemma describes that it is realistically impossible to si...
详细信息
ISBN:
(数字)9798350351637
ISBN:
(纸本)9798350351644
With extensive research and development in blockchain technology, the concern about scalability, security, and decentralization is still evident. Blockchain trilemma describes that it is realistically impossible to simultaneously achieve a high level of decentralization, security, and scalability. However, new developments in the sector of blockchain are making progress in simultaneous achievement of these three aspects. Layer 1 blockchain is the base level of blockchain network architecture. It includes blockchain networks like Bitcoin, Ethereum, etc. However, the Layer 1 blockchain network faces scalability issues. Layer 2 blockchain is a network built on top of Layer 1 blockchain to help eliminate scalability issues. This paper presents a comparative analysis of Layer 1 and Layer 2 blockchain networks and different approaches to solving the blockchain trilemma in Layer 1 and Layer 2 blockchain networks. From the study, we found that Layer 2 blockchain networks are easier and faster to implement.
暂无评论