In this paper,we innovatively associate the mutual information with the frame error rate(FER)performance and propose novel quantized decoders for polar *** on the optimal quantizer of binary-input discrete memoryless ...
详细信息
In this paper,we innovatively associate the mutual information with the frame error rate(FER)performance and propose novel quantized decoders for polar *** on the optimal quantizer of binary-input discrete memoryless channels(BDMCs),the proposed decoders quantize the virtual subchannels of polar codes to maximize mutual information(MMI)between source bits and quantized *** nested structure of polar codes ensures that the MMI quantization can be implemented stage by *** results show that the proposed MMI decoders with 4 quantization bits outperform the existing nonuniform quantized decoders that minimize mean-squared error(MMSE)with 4 quantization bits,and yield even better performance than uniform MMI quantized decoders with 5 quantization ***,the proposed 5-bit quantized MMI decoders approach the floating-point decoders with negligible performance loss.
Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of software engineering theo...
Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of software engineering theories and methodologies [2]. Instead of replacing existing software modules implemented by symbolic logic, incorporating FMs' capabilities to build software systems requires entirely new modules that leverage the unique capabilities of ***, while FMs excel at handling uncertainty, recognizing patterns, and processing unstructured data, we need new engineering theories that support the paradigm shift from explicitly programming and maintaining user-defined symbolic logic to creating rich, expressive requirements that FMs can accurately perceive and implement.
Lung cancer is considered one of the most dangerous cancers, with a 5-year survival rate, ranking the disease among the top three deadliest cancers globally. Effectively combating lung cancer requires early detection ...
详细信息
Lung cancer is considered one of the most dangerous cancers, with a 5-year survival rate, ranking the disease among the top three deadliest cancers globally. Effectively combating lung cancer requires early detection for timely targeted interventions. However, ensuring early detection poses a major challenge, giving rise to innovative approaches. The emergence of artificial intelligence offers revolutionary solutions for predicting cancer. While marking a significant healthcare shift, the imperative to enhance artificial intelligence models remains a focus, particularly in precision medicine. This study introduces a hybrid deep learning model, incorporating Convolutional Neural Networks (CNN) and Bidirectional Long Short-Term Memory Networks (BiLSTM), designed for lung cancer detection from patients' medical notes. Comparative analysis with the MIMIC IV dataset reveals the model's superiority, achieving an MCC of 96.2% with an Accuracy of 98.1%, and outperforming LSTM and BioBERT with an MCC of 93.5 %, an accuracy of 97.0% and MCC of 95.5 with an accuracy of 98.0% respectively. Another comprehensive comparison was conducted with state-of-the-art results using the Yelp Review Polarity dataset. Remarkably, our model significantly outperforms the compared models, showcasing its superior performance and potential impact in the field. This research signifies a significant stride toward precise and early lung cancer detection, emphasizing the ongoing necessity for Artificial Intelligence model refinement in precision medicine. Authors
Accurately detecting traffic anomalies becomes increasingly crucial in network management. Algorithms that model the traffic data as a matrix suffers from low detection accuracy, while the work using the tensor model ...
详细信息
Pseudolites(PLs) are ground-based satellites, providing users with navigation ***, implementation of the PL system leads to the near-far problem. In this paper, we proposed an improved navigation PL signal structure o...
详细信息
Pseudolites(PLs) are ground-based satellites, providing users with navigation ***, implementation of the PL system leads to the near-far problem. In this paper, we proposed an improved navigation PL signal structure of combing Kasami sequences and the pulsing scheme to mitigate the near-far effect. The pulse modulation method is adopted to ensure that the PLs transmit signals at different timeslots and reduce the PL signals' mutual interference. Additionally,we employ the small set of Kasami sequences with good cross-correlation properties to improve the anti-interference ability. A simulation test based on software is carried out to evaluate the performance of the proposed signal. The simulation proves that the improved PL signal has an impulsive power spectral density, makes it a feasible solution to mitigate the near-far effect, and performs better in the capture.
Mobile Ad hoc Network (MANET) is broadly applicable in various sectors within a short amount of time, which is connected to mobile developments. However, the communication in the MANET faces several issues like synchr...
详细信息
This paper presents a novel approach known as Neutrosophic Fuzzy Power Management (NFPM) aimed at addressing the critical challenge of uncertain energy availability in Energy Harvesting Sensor Networks (EHWSNs). The m...
详细信息
Link prediction in complex networks is a fundamental problem with applications in diverse domains, from social networks to biological systems. Traditional approaches often struggle to capture intricate relationships i...
详细信息
Wearable devices for arrhythmia diagnosis are battery-powered and require improved power efficiency. In our previous study, we applied approximate computing, which is effective for power reduction, to QRS identificati...
详细信息
The exponential increase in IoT device usage has spawned numerous cyberspace *** devices,sensors,and actuators bridge the gap between physical processes and the cyber network in a cyber-physical system(CPS).Cyber-phys...
详细信息
The exponential increase in IoT device usage has spawned numerous cyberspace *** devices,sensors,and actuators bridge the gap between physical processes and the cyber network in a cyber-physical system(CPS).Cyber-physical system is a complex system from a security perspective due to the heterogeneous nature of its components and the fact that IoT devices can serve as an entry point for *** adversaries design their attack strategies on systems to gain an advantage at a relatively lower cost,whereas abusive adversaries initiate an attack to inflict maximum damage without regard to cost or *** this paper,a sensor spoofing attack is modelled as a malicious adversary attempting to cause system failure by interfering with the feedback control *** is accomplished by feeding spoofed sensor values to the controller and issuing erroneous commands to the *** on a Simulink-simulated linear CPS support the proof of concept for the proposed abusive ideology,demonstrating three attack *** impact of the evaluations stresses the importance of testing the CPS security against adversaries with abusive settings for preventing ***,the research concludes by highlighting the limitations of the proposed work,followed by recommendations for the future.
暂无评论