The ability to estimate temporal relationships is critical for both animals and artificial agents. Cognitive science and neuroscience provide remarkable insights into behavioral and neural aspects of temporal credit a...
详细信息
This research introduces a novel framework for summarizing legal judgments by integrating two state-of-the-art pretrained models-Google T5-small and Facebook BART-with rhetorical labels to enhance both accuracy and re...
详细信息
Collection of waste is one of the important goals of Waste Management Unit (WMU), where collecting waste decreases the amount of time, expenses, and the impact of waste collectors on the environment. The work is to cr...
详细信息
This paper focuses on the fault detection and diagnosis of terminal units (TUs) in a building located in London, utilizing real operational historical data to assess their performance and optimal placement across mult...
This paper focuses on the fault detection and diagnosis of terminal units (TUs) in a building located in London, utilizing real operational historical data to assess their performance and optimal placement across multiple floors. While precise locations of the TUs are unavailable, our method analyzes their operational behaviour for one month, applying popular machine learning models to detect and analyze faults effectively. By examining each TU individually and in the aggregate, we identify behavioural patterns that inform decisions regarding their positioning within the building. The dataset comprises over 2 million data points collected from 730 TUs, enabling a comprehensive analysis of their functionality and the impact of suboptimal thermostat placements. Our study employs three machine learning models-traditional multi-class Support Vector Machines and two ensemble methods: Random Forest (RF), and Adaptive Boosting (AdaBoost)-to classify TU behaviors into normal operation, heating faults, and cooling faults. Results indicate that RF outperforms the other models with an accuracy of 99.89%, while AdaBoost achieves an accuracy of 85% and SVM shows 47% accuracy. The findings underscore the potential of a data-driven approach to inform retrofitting decisions and enhance the reliability of HVAC systems. This research contributes valuable knowledge toward optimizing TU placement, ultimately leading to improved energy efficiency and indoor environmental quality.
The integration of IoT technology provides realtime, data-driven monitoring that reduces waste and maintains the quality of the food, changing the way food is preserved and managed. This research focuses on the develo...
详细信息
ISBN:
(数字)9798331520762
ISBN:
(纸本)9798331520779
The integration of IoT technology provides realtime, data-driven monitoring that reduces waste and maintains the quality of the food, changing the way food is preserved and managed. This research focuses on the development and implementation of an Arduino-based IoT device for monitoring freshness, temperature, and humidity in storage food environments. Equipped with an MQ-4 methane sensor and DHT11 sensor, the system detects spoilage indicators and environmental conditions and opens an exhaust fan if the moisture has been in excess. The BLYNK IoT app provides instant information to the user about storage conditions, thus ensuring efficient and proactive food management. This product finds answers to some of the main food-related storage challenges by offering scalable and effective solutions for enhanced freshness and reduced spoilage.
The success and safety of block cipher systems heavily depend on how efficient and secure their Key Schedule Algorithms (KSAs) are, especially when fighting against cryptanalytic attacks. This paper proposes a novel K...
详细信息
As the technology advances, an increase in the attacks to manipulate or extract data illegally has also risen. This also includes one such attack known as Address Resolution protocol cache spoofing attack. The Address...
详细信息
ISBN:
(数字)9798331508456
ISBN:
(纸本)9798331508463
As the technology advances, an increase in the attacks to manipulate or extract data illegally has also risen. This also includes one such attack known as Address Resolution protocol cache spoofing attack. The Address Resolution protocol Spoofer conducts an in-depth exploration into one of the most significant security vulnerabilities identified in local networks, namely Address resolution protocol cache poisoning. The study implements a system which uses a Python based tool which is able to simulate Address Resolution protocol spoofing attacks on the network traffic of two hosts through a Python library known as the Scapy library. This tool allows the execution of Man In The Middle attacks by forging Address Resolution protocol replies and changing the stream of traffic without setting off any alarm by the user. The tool also has a detection mechanism that alerts the users as soon as it detects attempted spoofing; which hence identifies both the offender and the defensive capabilities in Address Resolution protocol spoofing. Additionally, another layer of security is added by user-defined encryption and decryption of the message being delivered. The study has resulted in a secure network, protecting the data from ARP spoofing.
Much progress has been made in the field of person re-identification, but changes in clothing have hindered the practical application of long-term person re-identification. Cloth-changing person re-identification (CC-...
详细信息
Intent classification plays a crucial role in applications such as virtual assistants and chatbots, enabling an accurate determination of the user's intention and providing relevant responses. Minimal supervision ...
详细信息
ISBN:
(数字)9798331544607
ISBN:
(纸本)9798331544614
Intent classification plays a crucial role in applications such as virtual assistants and chatbots, enabling an accurate determination of the user's intention and providing relevant responses. Minimal supervision models that train from minimal labeled data have become important since they can train models using less amount of data as manually labeling data is time-consuming. To address this problem, the proposed model utilizes a few-shot learning mechanism approach using a metalearning architecture for intent classification. Model-Agnostic Meta Learning model is implemented to enhance generalization given the scenario of constrained labeled samples. Model Agnostic Meta Learning is tested using uniform and complexity aware optimal sampling based methods to assess the impact of data imbalance and robustness of the model. The experimental results on the Banking77 dataset show that the Meta Agnostic Meta Learning architectures in a complexity aware non-uniform sampling setting are able to achieve 100 % of the results achieved by full train models when integrated with ML models. DL models on the other hand did not report a considerable enhancement when migrated from a uniform to a non-uniform sampling setting.
The revolutionary impact of drones on delivery services encounters major challenges, such as collision with other obstacles and other drones when operating inside crowded areas. This research introduces a Collision De...
详细信息
暂无评论