Creating a design from modular components necessitates three steps: Acquiring knowledge about available components, conceiving an abstract design concept, and implementing that concept in a concrete design. The third ...
详细信息
Ceylon tea industry faces a major challenge in the form of pathogen-induced crop loss, with Blister Blight (BB) caused by Exobasidium vexans posing the greatest threat, leading to harvest losses of over 30%. This fung...
详细信息
Generative Artificial Intelligence (GenAI) has emerged as a pivotal technology across various industries, driving advancements in automation, decision-making, and content generation. This paper investigates the effica...
详细信息
ISBN:
(数字)9798331535193
ISBN:
(纸本)9798331535209
Generative Artificial Intelligence (GenAI) has emerged as a pivotal technology across various industries, driving advancements in automation, decision-making, and content generation. This paper investigates the efficacy of the prompt engineering methods such as zero-shot, one-shot, and few-shot prompting—in optimizing GenAI systems for diverse applications. Through a comprehensive literature review and an empirical survey involving 13 use cases such as chatbots, content creation, and medical decision support, we evaluate the performance of these prompting methods. The findings reveal that few-shot prompting excels in complex tasks, while zero-shot and one-shot prompting are more effective for simpler tasks. These insights provide practical guidance for leveraging GenAI across different domains, contributing to the advancement of AI-driven solutions.
Communication is an effective mechanism to coordinate the behavior of mobile multi-agent systems. We propose a general mobile multi-agent cooperative detection framework, which provides a detection system with enhance...
Communication is an effective mechanism to coordinate the behavior of mobile multi-agent systems. We propose a general mobile multi-agent cooperative detection framework, which provides a detection system with enhanced collaboration capabilities based on graph neural networks and reinforcement learning. Each agent gains information about the surrounding area by heuristic KNN, and then exchanges this part of subgraph information through communication so as to obtain global information in a decentralized way. At the same time, to avoid the computation overhead caused by the increase of the number of agents, attention mechanism is used to filter and optimize the communication process to improve scalability. We evaluate our method on large-scale detection tasks. Our approach is able to outperform the baselines, while making superior communication efficiency 1 .
The degradation of sewer pipes poses significant economical, environmental and health concerns. The maintenance of such assets requires structured plans to perform inspections, which are more efficient when structural...
详细信息
This paper outlines the process of generating a Neo4j graph database powered by Language Models (LLMs). The primary goal is to extract structured information from unstructured data, including user profiles, paper brie...
详细信息
ISBN:
(数字)9798331515683
ISBN:
(纸本)9798331515690
This paper outlines the process of generating a Neo4j graph database powered by Language Models (LLMs). The primary goal is to extract structured information from unstructured data, including user profiles, paper briefs, and Slack messages, and convert them into Cypher queries. The data is then ingested into Neo4j to build a graph database that captures relationships between users, paper, technologies, and messages. A pipeline was developed to automate the process, ensuring accurate entity and relationship extraction using predefined templates. This approach allows for efficient data representation and supports consultancy in managing large datasets by generating insightful visualizations and querying capabilities.
Parkinson's disease (PD) profoundly impacts millions in Sri Lanka, emphasizing the importance of early detection for better patient outcomes. We introduce 'NeuraTrace PD,' an innovative application for ear...
详细信息
Study Region: Goslar and Göttingen, Lower Saxony, Germany. Study Focus: In July 2017, the cities of Goslar and Göttingen experienced severe flood events characterized by short warning time of only 20 minutes...
详细信息
Human-computer interaction (HCI) is an evolving field of research that focuses on understanding and improving the communication and interaction between humans and computers. Over the past decades, we have seen many si...
详细信息
As a crucial technique for identifying irregular samples or outlier patterns, anomaly detection has broad applications in many fields. Convex analysis (CA) is one of the fundamental methods used in anomaly detection, ...
详细信息
As a crucial technique for identifying irregular samples or outlier patterns, anomaly detection has broad applications in many fields. Convex analysis (CA) is one of the fundamental methods used in anomaly detection, which contributes to the robust approximation of algebra and geometry, efficient computation to a unique global solution, and mathematical optimization for modeling. Despite the essential role and evergrowing research in CA-based anomaly detection algorithms, little work has realized a comprehensive survey of it. To fill this gap, we summarize the CA techniques used in anomaly detection and classify them into four categories of density estimation methods, matrix factorization methods, machine learning methods, and the others. The theoretical background, sub-categories of methods, typical applications as well as strengths and limitations for each category are introduced. This paper sheds light on a succinct and structured framework and provides researchers with new insights into both anomaly detection and CA. With the remarkable progress made in the techniques of big data and machine learning, CA-based anomaly detection holds great promise for more expeditious, accurate and intelligent detection capacities.
暂无评论