In this paper, we integrate wireless powered communication networks (WPCNs) with cognitive radio networks (CRNs) in order to develop wireless powered CRNs (WP-CRNs). The hybrid access point (HAP) is used to broadcast ...
详细信息
A numerical technique called Simulated Ising Annealing (SIA) uses digital computers to obtain approximations of the ground states of Ising models. The quadratic unconstrained binary optimization (QUBO) problem in comb...
详细信息
In tire industry,defect detection by X-ray image is an important process to prevent tires with quality issues from entering the *** image processing methods are able to detect specific defects of tires due to being ab...
In tire industry,defect detection by X-ray image is an important process to prevent tires with quality issues from entering the *** image processing methods are able to detect specific defects of tires due to being able to take full advantage of the prior knowledge of defect characteristics from human *** this paper,we adopt multiscale geometric transform technique and propose a tire defect detection algorithm based on Non-Subsampled Shearlet Transform(NSST).Experiments show that our algorithm achieves satisfactory detection *** introducing low-pass filtering and adaptive threshold segmentation,it's also able to fulfill quantitative detection of defect size,showing its application prospect in industrial scenes.
This paper develops PD-type iterative learning control schemes for a class of uncertain batch processes subject to nonrepetitive *** means of two-dimensional/repetitive setting,the sufficient conditions for batch-to-b...
详细信息
ISBN:
(数字)9789887581536
ISBN:
(纸本)9781665482561
This paper develops PD-type iterative learning control schemes for a class of uncertain batch processes subject to nonrepetitive *** means of two-dimensional/repetitive setting,the sufficient conditions for batch-to-batch error convergence and H disturbance attenuation are formulated and ***,the procedure for computing the desired control law matrices is formulated in terms of solvability of linear matrix *** proposed control law is able to fulfil the imposed design specifications,i.e.,they are suitable for the batch processes with time-varying uncertainties as well as non-repetitive *** illustrative example is used to validate the proposed control scheme and demonstrates a possible applicability of the developed results.
The integration of medicine and artificial intelligence is creating novel opportunities to gather, analyze, and generate groundbreaking medical insights from the vast expanse of medical literature. Although these adva...
详细信息
ISBN:
(数字)9798350374315
ISBN:
(纸本)9798350374322
The integration of medicine and artificial intelligence is creating novel opportunities to gather, analyze, and generate groundbreaking medical insights from the vast expanse of medical literature. Although these advancements hold great promise, difficulties including manual annotation and precise data retrieval, and transparency persist. Advanced natural language processing (NLP) techniques and large language models (LLMs) have shown potential in addressing these issues. This paper introduces the Medical Knowledge Graph (MedKG), a comprehensive and multidisciplinary medical knowledge graph. By utilizing advanced NLP algorithms, MedKG extracts millions of entities and converts them into triples from a corpus of superior medical research papers published over the last decade. It categorizes unstructured medical information into nine distinct tags, including disease names, treatments, diagnoses, symptoms, genetics, cellular structures of diseases, patient data, medical procedures, and treatment applications, while seamlessly integrating the digital object identifier (DOI) of each paper. As the latest structured database of medical knowledge, MedKG serves as a powerful tool for accelerating medical research and lays the groundwork for constructing a more extensive medical knowledge graph using full-text medical articles. Moreover, our research establishes a foundation for practical knowledge management systems based on text mining, applicable not only to complex medical systems but also to other professional domains.
Distributed optical fiber vibration sensing systems (DVS) are widely employed in perimeter security for their high sensitivity, simplicity, and strong immunity to electromagnetic interference. However, these systems a...
详细信息
Extremum seeking (ES) is a real-time optimization strategy, thus transmission delays in the feedback loop of ES have big impact on its stability. How big delay that ES control systems are able to withstand? This paper...
详细信息
This paper presents the design and implementation of an autonomous picking robot specifically for harvesting elongated fruits such as loofahs and bitter melons. The robot utilizes a tracked chassis to navigate field t...
详细信息
industrial process data shows the characteristics of large scale,high dimension,and strong correlation,which brings a big challenge for process fault *** this paper,a dynamic intelligent fault detection method based o...
industrial process data shows the characteristics of large scale,high dimension,and strong correlation,which brings a big challenge for process fault *** this paper,a dynamic intelligent fault detection method based on multi-head self-attention and long short-term memory neural network(MSLSTM) is *** MSLSTM model accurately captures the spatial-temporal fault features by making full use of previous ***,the MSLSTM model adopts the multi-head self-attention mechanism to make the whole network structure not only pay attention to the global information,but also emphasize the local ***,the Tennessee Eastman process(TEP) case is utilized to verify the practicability and superiority of the proposed *** experimental results show that the MSLSTM method achieves better fault detection performance in comparison with other conventional methods for detection.
Deep convolutional neural networks have been widely used in scene classification of remotely sensed images. In this work, we propose a robust learning method for the task that is secure against partially incorrect cat...
详细信息
暂无评论