Tibet, ensconced within China’s territorial expanse, is distinguished by its labyrinthine and heterogeneous topography, a testament to its profound historical heritage, and the cradle of a unique religious ethos. The...
详细信息
ISBN:
(数字)9798350374377
ISBN:
(纸本)9798350374384
Tibet, ensconced within China’s territorial expanse, is distinguished by its labyrinthine and heterogeneous topography, a testament to its profound historical heritage, and the cradle of a unique religious ethos. The very essence of these attributes, however, has impeded the advancement of Tibet’s tourism service infrastructure, rendering existing smart tourism services inadequate for the region’s visitors. This study delves into the ramifications of informational disparities at tourist sites on Tibetan tourism and addresses the challenge of establishing the Large Language Model (LLM) evaluation criteria. It introduces an innovative approach, the DualGen Bridge AI system, employing supervised fine-tuning techniques to bolster model functionality and enhance optimization processes. Furthermore, it pioneers a multi-structured generative results assessment framework. Empirical validation confirms the efficacy of this framework. The study also explores the application of the supervised fine-tuning method within the proprietary DualGen Bridge AI, aimed at refining the generation of tourist site information. The study’s findings offer valuable insights for optimizing system performance and provide support and inspiration for the application of LLM technology in Tibet’s tourism services and beyond, potentially revolutionizing the smart tourism industry with advanced, tailored information generation capabilities.
In many farm locations in Ethiopia, common bacterial blight (CBB), one of the common bean's known diseases, impacts the crop, lowers yield by up to 45 percent of the production, and also has an impact on seed qual...
详细信息
Recently, directional antenna has shown great potential to deploy in indoor environments and significantly improve wireless network capacity. Due to its directionality, the orientation of antenna becomes a critical is...
详细信息
Recently, directional antenna has shown great potential to deploy in indoor environments and significantly improve wireless network capacity. Due to its directionality, the orientation of antenna becomes a critical issue especially for moving devices while exchanging data with directional AP. Previous work largely focused on scenarios, in which the clients are stable at most of the time and addressed the issue of moving device by remeasurement of the whole network information such as received signal strength, conflict graph. However, re-collection of such information will introduce significant overhead. To adjust directional antenna quickly and wisely in real-time, in this paper, we introduce ADAS, a system that adjust orientation of directional antenna with sensor hints from mobile devices. The key idea of ADAS system is to obtain the movement behavior and location information from sensors equipped in mobile devices, then the AP adapts its orientation accordingly. We implement ADAS system on commercial directional antenna and evaluate its performance under different configurations. The experiment results demonstrate that directional AP in ADAS system could adapt to mobility with less overhead.
The node localization in Wireless Sensor Network (WSN) presently plays an important role in the field of applications. Particle Swarm Optimization (PSO) algorithm is a typical swarm intelligence method. Researchers pr...
详细信息
The node localization in Wireless Sensor Network (WSN) presently plays an important role in the field of applications. Particle Swarm Optimization (PSO) algorithm is a typical swarm intelligence method. Researchers propose many PSO variants and try to apply PSO algorithm to the related problems in WSN. This paper focuses on the WSN node localization using PSO algorithm. This paper conducts the experiment simulation, comparison and evaluation work in the node localization using PSO algorithm. The performance of different PSO variants with different population topologies is analyzed. Experiment simulations show that WSN node localization using PSO algorithm can get good performance in ring topology and square topology. In particular, the two newly proposed PSO variants (GDPSO and LDPSO) have good performance on this problem. This paper proposes some useful conclusions, which will provide a valuable reference to WSN engineering field.
In 3D surface reconstruction from normals, discontinuity preservation is an important but challenging task. However, existing studies fail to address the discontinuous normal maps by enforcing the surface integrabilit...
详细信息
ISBN:
(纸本)9781728132945
In 3D surface reconstruction from normals, discontinuity preservation is an important but challenging task. However, existing studies fail to address the discontinuous normal maps by enforcing the surface integrability in the continuous domain. This paper introduces a robust approach to preserve the surface discontinuity in the discrete geometry way. Firstly, we design two representative normal incompatibility features and propose an efficient discontinuity detection scheme to determine the splitting pattern for a discrete mesh. Secondly, we model the discontinuity preservation problem as a light-weight energy optimization framework by jointly considering the discontinuity detection and the overall reconstruction error. Lastly, we further shrink the feasible solution space to reduce the complexity based on the prior knowledge. Experiments show that the proposed method achieves the best performance on an extensive 3D dataset compared with the state-of-the-arts in terms of mean angular error and computational complexity.
Imbalance is a distinctive feature of many datasets, and how to make the dataset balanced become a hot topic in machine learning field. Synthetic Minority Oversampling Technique (SMOTE) is the classical method to solv...
详细信息
In recent years, with the rapid development of deep learning and computer vision technology, the forgery technology of images and videos has become increasingly mature, posing new challenges to information security an...
详细信息
ISBN:
(数字)9798331519254
ISBN:
(纸本)9798331519261
In recent years, with the rapid development of deep learning and computer vision technology, the forgery technology of images and videos has become increasingly mature, posing new challenges to information security and social stability. Behind the re-evolution of deepfake lies the rampant proliferation of fake content, which is used for election tampering, identity fraud, fraud, spreading fake news, and so on. To address these challenges, researchers are constantly exploring and developing image-based deepfake detection techniques, which aim to effectively identify and prevent deepfake content in images and videos. This article will introduce the current development status of deepfake detection technology, present its principles and methods in detail, and look ahead to its future development directions.
We investigate the age of information (AoI) of a relay-assisted cooperative communication system, where a source node sends status update packets to the destination node as timely as possible with the aid of a relay n...
详细信息
Cloud storage is now an important development trend in information technology. However, information security has become an important problem to impede it for commercial application, such as data con-fidentiality, inte...
详细信息
Cloud storage is now an important development trend in information technology. However, information security has become an important problem to impede it for commercial application, such as data con-fidentiality, integrity, and availability. In this paper, we revisit the two private PDP schemes. We show that the property of correctness cannot be achieved when active adversaries are involved in these auditing systems. More specifically, an active adversary can arbitrarily tamper the cloud data and produce a valid auditing. Moreover, the malicious CSS can put the auditing right to entrust to anyone and control the delegation key and lead to the failure of the subsequent validation work. Finally, we propose a solution using key agreement to resolve the weakness. Our scheme is high efficiency due to removing expensive bilinear computing. Moreover, the verifier is stateless and independent from cloud storage server, which is an important secure property in PDP schemes.
暂无评论