Heuristic algorithms are used to solve complex computational problems quickly in various computer applications. Such algorithms use heuristic functions that rank the search alternatives instead of a full enumeration o...
详细信息
We study the optimal scheduling of graph states in measurement-based quantum computation, establishing an equivalence between measurement schedules and path decompositions of graphs. We define the spatial cost of a me...
详细信息
In this paper, a novel chatbot for risk reduction as an aid during machinery design is presented. The general workflow of the chatbot involves the identification of the hazard described by the user using a neural netw...
In this paper, a novel chatbot for risk reduction as an aid during machinery design is presented. The general workflow of the chatbot involves the identification of the hazard described by the user using a neural network model followed by an interactive dialog based conversation, in which the risk reduction measures are outlined. A prototype implementation of the chatbot presents the steps to generate and pre-process the training data for Artificial Intelligence (AI) based models. Different neural network models are trained and evaluated for the proposed risk reduction chatbot. A comparative study is presented by employing an in-depth qualitative and quantitative evaluation. The work presented in this paper shows significant promise in ensuring safety awareness, thereby aiding in implementing functional safety in the early stages of machinery design and development.
Due to its importance in studying people’s thoughts on various Web 2.0 services, emotion classification is a critical undertaking. Most existing research is focused on the English language, with little work on low-re...
详细信息
ISBN:
(数字)9798331540012
ISBN:
(纸本)9798331540029
Due to its importance in studying people’s thoughts on various Web 2.0 services, emotion classification is a critical undertaking. Most existing research is focused on the English language, with little work on low-resource languages. Though sentiment analysis, particularly emotion classification in English, has received increasing attention in recent years, little study has been done in the context of Bangla, one of the world’s most widely spoken languages. In this research, we propose a complete set of approaches for identifying and extracting emotions from Bangla texts. We provide a Bangla emotion classifier for six classes, i.e., anger, disgust, fear, joy, sadness, and surprise, from Bangla words using transformer-based models, which exhibit phenomenal results in recent days, especially for high-resource languages. The Unified Bangla Multi-class Emotion Corpus (UBMEC) is used to assess the performance of our models. UBMEC is created by combining two previously released manually labelled datasets of Bangla comments on six emotion classes with fresh manually labelled Bangla comments created by us. The corpus dataset and code we used in this work are publicly available.
The cuckoo search algorithm (CSA) is a natureinspired metaheuristic algorithm based on the parasitic behaviour of the cuckoo species, and it has received much attention for solving optimization problems. Nevertheless,...
详细信息
Recent years have witnessed the proliferation of Internet of Things(IoT),in which billions of devices are connected to the Internet,generating an overwhelming amount of *** is challenging and infeasible to transfer an...
详细信息
Recent years have witnessed the proliferation of Internet of Things(IoT),in which billions of devices are connected to the Internet,generating an overwhelming amount of *** is challenging and infeasible to transfer and process trillions and zillions of bytes using the current cloud-device architecture.
We present a software library for the commutation of Pauli operators through quantum Clifford circuits, which is called Pauli tracking. Tracking Pauli operators allows one to reduce the number of Pauli gates that must...
详细信息
Human beings have gone through stages that have made significant contributions to their lives with technological developments. One of the most important of these close to the present day is the introduction of IoTs, a...
Human beings have gone through stages that have made significant contributions to their lives with technological developments. One of the most important of these close to the present day is the introduction of IoTs, and IIoTs into our lives with the industry 4.0 process. From smart homes to smart grids, we are faced with a world that is getting smarter in every aspect of our lives. In this cyber environment where our data, including our personal data, is transferred to the virtual environment, the biggest threat is the attacks that can be made on this existing environment. The biggest methods used by attackers are to exploit the vulnerabilities that the existing system brings in addition to the old vulnerabilities. With the IoT process, there have been very important developments, and all operations can be carried out remotely via mobile phone or computer, such as checking the missing needs in the refrigerator, washing, drying clothes, and even in the most advanced dimension, reducing the temperature if it is too high, or increasing it if it is low, without people coming to their homes, and with these renovations, new types of threads become part of our lives. With this study we focus on one of more dangerous part of these attacks, False Data Injection (FDI), and Men in the Middle (MitM) attacks. With this study we detected MitM, and FDI attacks with success rate of %95 percent.
In this work, we investigate the joint secrecy and latency performance of a multi-user backscatter communication (BC)-enabled vehicular network in the presence of a passive eavesdropper. Specifically, a number of vehi...
详细信息
The use of Artificial Intelligence (AI) in machinery functional safety can enhance efficiency and accuracy by automating tasks previously carried out by humans. This paper presents an experimental evaluation of Neural...
The use of Artificial Intelligence (AI) in machinery functional safety can enhance efficiency and accuracy by automating tasks previously carried out by humans. This paper presents an experimental evaluation of Neural Network (NN) models for hazard identification in machinery functional safety. The systematic study includes own implementations of NN models using open source building blocks and the use of an open source conversational AI framework with various pipeline configurations. The paper provides a comparative analysis of the qualitative and quantitative parameters for the models and configurations.
暂无评论