In this paper, a novel chatbot for risk reduction as an aid during machinery design is presented. The general workflow of the chatbot involves the identification of the hazard described by the user using a neural netw...
In this paper, a novel chatbot for risk reduction as an aid during machinery design is presented. The general workflow of the chatbot involves the identification of the hazard described by the user using a neural network model followed by an interactive dialog based conversation, in which the risk reduction measures are outlined. A prototype implementation of the chatbot presents the steps to generate and pre-process the training data for Artificial Intelligence (AI) based models. Different neural network models are trained and evaluated for the proposed risk reduction chatbot. A comparative study is presented by employing an in-depth qualitative and quantitative evaluation. The work presented in this paper shows significant promise in ensuring safety awareness, thereby aiding in implementing functional safety in the early stages of machinery design and development.
The cuckoo search algorithm (CSA) is a natureinspired metaheuristic algorithm based on the parasitic behaviour of the cuckoo species, and it has received much attention for solving optimization problems. Nevertheless,...
详细信息
Due to its importance in studying people’s thoughts on various Web 2.0 services, emotion classification is a critical undertaking. Most existing research is focused on the English language, with little work on low-re...
详细信息
ISBN:
(数字)9798331540012
ISBN:
(纸本)9798331540029
Due to its importance in studying people’s thoughts on various Web 2.0 services, emotion classification is a critical undertaking. Most existing research is focused on the English language, with little work on low-resource languages. Though sentiment analysis, particularly emotion classification in English, has received increasing attention in recent years, little study has been done in the context of Bangla, one of the world’s most widely spoken languages. In this research, we propose a complete set of approaches for identifying and extracting emotions from Bangla texts. We provide a Bangla emotion classifier for six classes, i.e., anger, disgust, fear, joy, sadness, and surprise, from Bangla words using transformer-based models, which exhibit phenomenal results in recent days, especially for high-resource languages. The Unified Bangla Multi-class Emotion Corpus (UBMEC) is used to assess the performance of our models. UBMEC is created by combining two previously released manually labelled datasets of Bangla comments on six emotion classes with fresh manually labelled Bangla comments created by us. The corpus dataset and code we used in this work are publicly available.
We present a software library for the commutation of Pauli operators through quantum Clifford circuits, which is called Pauli tracking. Tracking Pauli operators allows one to reduce the number of Pauli gates that must...
详细信息
Recent years have witnessed the proliferation of Internet of Things(IoT),in which billions of devices are connected to the Internet,generating an overwhelming amount of *** is challenging and infeasible to transfer an...
详细信息
Recent years have witnessed the proliferation of Internet of Things(IoT),in which billions of devices are connected to the Internet,generating an overwhelming amount of *** is challenging and infeasible to transfer and process trillions and zillions of bytes using the current cloud-device architecture.
Human beings have gone through stages that have made significant contributions to their lives with technological developments. One of the most important of these close to the present day is the introduction of IoTs, a...
Human beings have gone through stages that have made significant contributions to their lives with technological developments. One of the most important of these close to the present day is the introduction of IoTs, and IIoTs into our lives with the industry 4.0 process. From smart homes to smart grids, we are faced with a world that is getting smarter in every aspect of our lives. In this cyber environment where our data, including our personal data, is transferred to the virtual environment, the biggest threat is the attacks that can be made on this existing environment. The biggest methods used by attackers are to exploit the vulnerabilities that the existing system brings in addition to the old vulnerabilities. With the IoT process, there have been very important developments, and all operations can be carried out remotely via mobile phone or computer, such as checking the missing needs in the refrigerator, washing, drying clothes, and even in the most advanced dimension, reducing the temperature if it is too high, or increasing it if it is low, without people coming to their homes, and with these renovations, new types of threads become part of our lives. With this study we focus on one of more dangerous part of these attacks, False Data Injection (FDI), and Men in the Middle (MitM) attacks. With this study we detected MitM, and FDI attacks with success rate of %95 percent.
In this work, we investigate the joint secrecy and latency performance of a multi-user backscatter communication (BC)-enabled vehicular network in the presence of a passive eavesdropper. Specifically, a number of vehi...
详细信息
The use of Artificial Intelligence (AI) in machinery functional safety can enhance efficiency and accuracy by automating tasks previously carried out by humans. This paper presents an experimental evaluation of Neural...
The use of Artificial Intelligence (AI) in machinery functional safety can enhance efficiency and accuracy by automating tasks previously carried out by humans. This paper presents an experimental evaluation of Neural Network (NN) models for hazard identification in machinery functional safety. The systematic study includes own implementations of NN models using open source building blocks and the use of an open source conversational AI framework with various pipeline configurations. The paper provides a comparative analysis of the qualitative and quantitative parameters for the models and configurations.
Internet of Softwarized Things (IoST) is a promising and dynamic programmable technology that has the capability to interconnect sensor devices with an objective to share the accumulated data in the network without th...
详细信息
Spiking Neural Network (SNN) provides an irreplaceable mechanism for series prediction, particularly in scenarios where time and computing resources are both critical, exhibiting superiority over other deep learning m...
详细信息
Spiking Neural Network (SNN) provides an irreplaceable mechanism for series prediction, particularly in scenarios where time and computing resources are both critical, exhibiting superiority over other deep learning models with sparse and spike-based communication inherent to SNN methods. However, as the depth of the network increases, a critical challenge arises: excessive diffusion of signals in the deeper network can seriously affect its accuracy and efficiency. Inspired by the organizational principles of hippocampal circuits, this study proposes a broad learning framework inspired by the brain (B2L), offering an alternative SNN architecture to mitigate the problem of excessive diffusion. It adopts a broad, incrementally extendable structure while adopting sparse coding for data representation, dedicated to: (1) Construction of the B2L SNN: Combining preliminary feature extraction with enhancement processing, a dual-layer broad structure establishes random vector functional-link (RVFL) mapping between rate-coded spike sequences and output labels, effectively preventing excessive diffusion to upstream neurons;(2) Extendable Optimization of B2L SNN: Drawing from the concept of incremental learning, B2L SNN employs a weight optimization method to search for optimal configurations by expanding RVFL mappings from initial architecture to static datasets through incremental neuron integration. Experiments across six benchmarks (MNIST, CIFAR-10, CIFAR-100, NORB, N-MNIST, and BCI IV 2b) demonstrate: (1) B2L SNN achieves 20.3×faster training time than four SNN variants (4058 seconds→197 s) via random vector functional-link mapping;(2) 96.97% NORB accuracy (+3.64% over SNN2ANN) with 2.79 ms inference time (3.06×speedup), also achieving SOTA 89.52% accuracy on BCI IV 2b and leading N-MNIST inference speed (3.85ms);(3) Scalability: With 1.5×expansion in feature layers (PF: 60→100, EF: 7k→11k), B2L SNN achieves 1.04% accuracy improvement on MNIST alongside 12.3% faster traini
暂无评论