Causal Structure Discovery (CSD) is the task of learning the set of underlying causal relationships from observational data. Due to their computational scalability and flexibility, a recently developed class of CSD me...
详细信息
A new class of monolithically-integrated and high-quality factor (Q) 3D bandpass filters (BPF) is reported. The proposed filter concept is based on compact high-Q quarter-spherical resonators that are significantly sm...
详细信息
Quantum computers are gaining importance in various applications like quantum machine learning and quantum signal processing. These applications face significant challenges in loading classical datasets into quantum m...
详细信息
ISBN:
(数字)9798331541378
ISBN:
(纸本)9798331541385
Quantum computers are gaining importance in various applications like quantum machine learning and quantum signal processing. These applications face significant challenges in loading classical datasets into quantum memory. With numerous algorithms available and multiple quality attributes to consider, comparing data loading methods is complex. Our objective is to compare (in a structured manner) various algorithms for loading classical datasets into quantum memory (by converting statevectors to circuits). We evaluate state preparation algorithms based on five key attributes: circuit dept., qubit count, classical runtime, statevector representation (dense or sparse), and circuit alterability. We use the Pareto set as a multi-objective optimization tool to identify algorithms with the best combination of properties. To improve comprehension and speed up comparisons, we also visually compare three metrics (namely, circuit dept., qubit count, and classical runtime). We compare seven algorithms for dense statevector conversion and six for sparse statevector conversion. Our analysis reduces the initial set of algorithms to two dense and two sparse groups, highlighting inherent trade-offs. This comparison methodology offers a structured approach for selecting algorithms based on specific needs. Researchers and practitioners can use it to help select data-loading algorithms for various quantum computing tasks.
In this paper, we examine the cybersecurity vulnerability assessment method of medical software. Medical software processes patient sensitive data and is linked to various medical devices and systems in real time. Due...
详细信息
ISBN:
(数字)9798331510756
ISBN:
(纸本)9798331510763
In this paper, we examine the cybersecurity vulnerability assessment method of medical software. Medical software processes patient sensitive data and is linked to various medical devices and systems in real time. Due to these characteristics, medical software is highly likely to be exposed to various cybersecurity threats such as ransomware, data leakage, and medical device hacking. Based on the international standard IEC TS 60601-4-5, we propose threat modeling, vulnerability scanning, and penetration testing as a methodology for assessing the security vulnerabilities of medical software. Through this, we can identify security vulnerabilities in advance and prepare measures to respond quickly. We can prevent security threats and improve the safety of medical software through response strategies such as security patches and updates, network separation, data encryption, and security education. In conclusion, strengthening the security of medical software is essential to maintain patient safety and the reliability of the medical system, and systematic security assessment and continuous response are required.
This Article's aim is to analyse the wireless communication in Cybersecurity. The topic of this paper provides readers with a better grasp of the safety guidelines and measures that are currently on the market, as...
详细信息
The current use of fossil fuels as a major source of energy on a global scale has had a negative impact on the environment in terms of pollution and global warming. There is currently a paradigm shift to the utilizati...
The current use of fossil fuels as a major source of energy on a global scale has had a negative impact on the environment in terms of pollution and global warming. There is currently a paradigm shift to the utilization of renewable energy sources such as solar and wind power. However, the challenge is that these options are inherently intermittent and expensive to install. Data from these sources can be used as input to algorithms to optimize the operation of microgrids to provide energy to both residential and commercial buildings. A key component to enhance the performance of a microgrid is a battery energy storage system (BESS). Our goal is to design an algorithm to optimize battery operation. The objective of this paper is to predict the solar irradiance to provide input to battery operation optimization. We investigate the comparative performances of different strategies. The accuracy of five popular machine learning algorithms are estimated, namely Random Forest (RF), Extreme Gradient Boosting (XGBoost), Support Vector Regression (SVR), Kernel ridge regression (KRR), and Linear Regression. Voting, stacking, and bagging ensemble methods are utilized to further enhance the accuracy. Our results show stacking to outperform the other methods. Our experiment produced better predictions than other work using the same dataset.
Sentiment analysis which involves identifying emotions in the text is a widely studied topic of natural language processing. Many researchers focus on social media content like posts, tweets and reviews for their stud...
Sentiment analysis which involves identifying emotions in the text is a widely studied topic of natural language processing. Many researchers focus on social media content like posts, tweets and reviews for their studies. In this paper, a large number of data from comments about serials on social media and internet forums in Banglish is collected and analyzed. We use NLP techniques to do the sentiment analysis of the comments. This study explores how different kinds of serials have impacted society and concentrates on how they have influenced the creation of Banglish comments. This study aims to conduct a sentiment analysis of Banglish comments generated in response to different genres of serials and to analyze their potential societal implications. Along with Long Short-Term Memory (LSTM), we use several machine-learning algorithms such as Logistic Regression (LR), Multinomial Naive Bayes (MNB), Gaussian Naive Bayes, Decision Tree (DT), AdaBoost, Random Forest (RF) and Support Vector Machine (SVM) to create this model. The SVM gives the highest accuracy among all of the machine learning algorithms.
This study introduces a deep learning-based method for classifying brain tumors using a pre-trained VGG19 convolutional neural network (CNN). By leveraging transfer learning, we adapted the VGG19 model with custom ful...
详细信息
Monkeypox is a contagious viral infection caused by the monkeypox virus (Mpoxvirus). Characterized by skin lesions, fever, respiratory difficulties, swollen lymph nodes, and neurological complications, MPX can be fata...
详细信息
Facebook, Instagram and Twitter serve as influential social media platforms for individuals where they express and share their thoughts, skills, knowledge and talents with a broad audience. However, these platforms ar...
详细信息
ISBN:
(数字)9798331507213
ISBN:
(纸本)9798331507220
Facebook, Instagram and Twitter serve as influential social media platforms for individuals where they express and share their thoughts, skills, knowledge and talents with a broad audience. However, these platforms are also used to disseminate offensive content including trolling and content that targets a person’s gender, religion, or race. When women become the targets of such content, it is often manifests as misogyny. In recent years, the growing prevalence of racial and verbal abuse directed at women on social media has drawn considerable attention to the issue of online misogyny and women based offending, by making the automatic detection of such offensive content an urgent priority. Moreover, many researchers have addressed misogyny detection in high resource languages i.e., English, Italian, Arabic, Hindi, and more, tackling this issue in low resource language like Roman Urdu presents a significant challenge. In this paper, a framework is proposed for detection of misogynistic content from Roman Urdu tweets. This paper leverages well known transformer models such as BERT, RoBERTa, GPT-2, and XLNet to train and evaluate misogyny detection performance. The research findings reveal that RoBERTa surpasses the other models in misogyny detection, by achieving the highest accuracy, precision, F1-score and recall i.e., 90.87%, 90%, 89%, and 91%, respectively.
暂无评论