The IEEE Std. 1687 (IJTAG) provides a more efficient and flexible mechanism to access embedded instruments in complex system-on-chips (SoC). Embedded instruments are mainly used for testing, debugging, diagnosing, and...
详细信息
In this paper, we explore the performance of an opportunistic network forwarding algorithm, namely Power and Interest Aware PeopleRank (PIPeR) in a subway mobility environment. PIPeR is known to perform well according...
详细信息
ISBN:
(数字)9798350387445
ISBN:
(纸本)9798350387452
In this paper, we explore the performance of an opportunistic network forwarding algorithm, namely Power and Interest Aware PeopleRank (PIPeR) in a subway mobility environment. PIPeR is known to perform well according to known metrics in delivering data taking into consideration both the interest in the disseminated data, along with power conservation. The algorithm was only tested however using pedestrian mobility models. Subway mobility is a candidate for many other useful cases for opportunistic content dissemination such as that of armed conflicts where civilian populations live in subway environments for safety without fixed network infrastructure. In this work, we implement and evaluate the PIPeR algorithm in a subway model using the AnyLogic simulator. Our results show a significant increase in the f-measure by 61% and decrease in the delay by 41% in comparison to the pedestrian mobility environment. In addition to that, we pinpoint some areas of interest where content dissemination happens vigorously yet at the expense of some increase in cost and power consumption, which we subsequently alleviate by using a particular hibernation model that decreases the power consumption by 43 % at the expense of only 6% reduction in delivery ratio.
The p proposed article a new reversible privacy-preserving data hiding approach for medical imaging. Our method uses a Denoising Autoencoder (DAE) to successfully incorporate sensitive information inside medical image...
详细信息
In recent years, the application of radiofrequency identification technology in smart access control systems has become a trend. Users only need to take out the RFID electronic key and approach the sensor of the gate ...
详细信息
Online cooking instructions including ingredient lists and cooking methods are now widely available due to the proliferation of recipe sharing websites. Finding novel and complex patterns in such vast, ambiguous categ...
详细信息
ISBN:
(数字)9798350384369
ISBN:
(纸本)9798350384376
Online cooking instructions including ingredient lists and cooking methods are now widely available due to the proliferation of recipe sharing websites. Finding novel and complex patterns in such vast, ambiguous categorical data sets is a crucial task. Conventional clustering analysis algorithms frequently fail to address the uncertainty surrounding the exact value of features found in these categorical data sets. Thus to aid in decision-making, rough set based clustering is frequently used. This study aims to identify the optimal clustering feature from the recipe data that will result in the grouping of related food products by applying the rough purity notion. The recipe data has been regarded as a categorical valued information system in this instance, and information theoretic attribute purity is taken into account using the rough purity technique.
In an era marked by digital expansion, discriminatory speech remains a widespread concern, exerting significant societal implications. This study presents an overview of discriminatory speech detection techniques and ...
详细信息
ISBN:
(数字)9798350371314
ISBN:
(纸本)9798350371321
In an era marked by digital expansion, discriminatory speech remains a widespread concern, exerting significant societal implications. This study presents an overview of discriminatory speech detection techniques and explores the complexities involved in identifying discriminatory speech by utilizing a variety of datasets from various fields. The importance of preprocessing methods and feature engineering is next examined, opening the door for more in-dept. study. Furthermore, the paper delves into traditional Machine Learning (ML) algorithms and state-of-the-art Deep Learning (DL) models along with a crucial component of using graph-based structures with Natural Language Processing (NLP) techniques and the use of graphs to extract contextual information. Using both graphs and NLP algorithms enhances the identification process by uncovering contextual connections within textual data.
Graph classification is a hot topic of machine learning for graph-structured data, and it is also a very potential and valuable research. However, the difficulty of graph classification is challenging and special, whi...
Graph classification is a hot topic of machine learning for graph-structured data, and it is also a very potential and valuable research. However, the difficulty of graph classification is challenging and special, which is quite different from the normal classification problems. One of the most difficult points of graph classification is that the numbers of vertex neighbors in graphs are usually variable, which makes the number of weights uncertain and ambiguous. Recent work such like the graph attention network apply the transformer on the graph neural network. However, the learned attentions cannot strictly reveal the importance of each part of graph, which makes the model less explainable. Moreover, for small datasets, it performs less effectively because of the excessive parameters. In order to overcome these difficulties, we propose a lightweight model with an edge weighting function based on the probability distributions of node pair features learned by the Gaussian mixture model. Although the proposed framework is simple, the experimental results shows its effectiveness on small datasets.
The prediction of solar storms from real-time satellites data is an essential to protect various aviation, power, and communication infrastructures. For this reason, current research interest is focusing on creating s...
详细信息
Spiking Neural Networks (SNNs) have recently been used as a computational model for applications such as deep learning, image recognition and machine learning. Similar to the biological brain, SNN neurons depend on th...
详细信息
ISBN:
(数字)9798350372977
ISBN:
(纸本)9798350372984
Spiking Neural Networks (SNNs) have recently been used as a computational model for applications such as deep learning, image recognition and machine learning. Similar to the biological brain, SNN neurons depend on the membrane level to fire an output. If the level exceeds a specified threshold, the neuron sends an output to activate next neurons. This leads to an unbalanced workload among the neurons. The dynamically-changing membrane level is stored inside a neuron. In hardware, this storage can be implemented as a register or on-chip memory, which determines the amount of consumed resources and, in turns, affects the network scalability. SNN accelerators have recently been implemented on UltraScale FPGAs devices for high-performance purposes. On-chip memories on these devices are classified as distributed memory, Block RAMs (BRAMs) and Ultra RAMs (URAMs). In this paper, we explored the impact of using different on-chip memories to store the membrane level of SNN neurons. We implemented a parameterizable SpIking Neural networK (SINK) accelerator where the network capacity and weight_width are parameters. SINK has the ability to run in four different modes based on the memory type. We ran SINK on UltraScale Zyncl04 FPGA device and measure the utilization of the hardware resources (LUTs), registers, memory, power consumption and performance. The results show that URAM can be the best fit to store the membrane level, since it used 30%, 11 % and 2% less LUTs, Regs, and power 2% respectively comparing with BRAM and distributed memory
Named Entity Recognition (NER) has traditionally been a key task in natural language processing (NLP), aiming to identify and extract important terms from unstructured text data. However, a notable challenge for conte...
详细信息
Named Entity Recognition (NER) has traditionally been a key task in natural language processing (NLP), aiming to identify and extract important terms from unstructured text data. However, a notable challenge for contemporary deep-learning NER models has been identifying discontinuous entities, which are often fragmented within the text. To date, methods to address Discontinuous Named Entity Recognition (DNER) have not been explored using ensemble learning to the best of our knowledge. Furthermore, the rise of large language models (LLMs, such as ChatGPT) in recent years has shown significant effectiveness across many NLP tasks. Most existing approaches, however, have primarily utilized ChatGPT as a problem-solving tool rather than exploring its potential as an integrative element within ensemble learning algorithms. In this study, we investigated the integration of ChatGPT as an arbitrator within an ensemble method, aiming to enhance performance on DNER tasks. Our method combines five state-of-the-art (SOTA) NER models with ChatGPT using custom prompt engineering to assess the robustness and generalization capabilities of the ensemble algorithm. We conducted experiments on three benchmark medical datasets, comparing our method against the five SOTA models, individual applications of GPT-3.5 and GPT-4, and a voting ensemble method. The results indicate that our proposed fusion of ChatGPT with the ensemble learning algorithm outperforms the SOTA results in the CADEC, ShARe13, and ShARe14 datasets, achieving improvements in F1-score of approximately 1.13%, 0.54%, and 0.67%, respectively. Compared to the voting ensemble method, our approach achieved improvements of about 0.63%, 0.32%, and 0.09%. Furthermore, compared to GPT-3.5 and GPT-4, our average results were approximately 7.42%, 0.89%, and 0.54% higher. The results demonstrate the effectiveness of our proposed fusion method of ChatGPT and ensemble algorithms, showcasing its potential to enhance NLP applications in
暂无评论