Medical Named Entity Recognition (MNER) is a critical task in medical text mining, serving as a foundation for intelligent diagnosis, disease prediction, and related tasks. However, Chinese medical texts present uniqu...
详细信息
The naive Bayesian classifier(NBC) is a supervised machine learning algorithm having a simple model structure and good theoretical interpretability. However, the generalization performance of NBC is limited to a large...
详细信息
The naive Bayesian classifier(NBC) is a supervised machine learning algorithm having a simple model structure and good theoretical interpretability. However, the generalization performance of NBC is limited to a large extent by the assumption of attribute independence. To address this issue, this paper proposes a novel attribute grouping-based NBC(AG-NBC), which is a variant of the classical NBC trained with different attribute groups. AG-NBC first applies a novel effective objective function to automatically identify optimal dependent attribute groups(DAGs). Condition attributes in the same DAG are strongly dependent on the class attribute, whereas attributes in different DAGs are independent of one another. Then,for each DAG, a random vector functional link network with a SoftMax layer is trained to output posterior probabilities in the form of joint probability density estimation. The NBC is trained using the grouping attributes that correspond to the original condition attributes. Extensive experiments were conducted to validate the rationality, feasibility, and effectiveness of AG-NBC. Our findings showed that the attribute groups chosen for NBC can accurately represent attribute dependencies and reduce overlaps between different posterior probability densities. In addition, the comparative results with NBC, flexible NBC(FNBC), tree augmented Bayes network(TAN), gain ratio-based attribute weighted naive Bayes(GRAWNB), averaged one-dependence estimators(AODE), weighted AODE(WAODE), independent component analysis-based NBC(ICA-NBC), hidden naive Bayesian(HNB) classifier, and correlation-based feature weighting filter for naive Bayes(CFW) show that AG-NBC obtains statistically better testing accuracies, higher area under the receiver operating characteristic curves(AUCs), and fewer probability mean square errors(PMSEs) than other Bayesian classifiers. The experimental results demonstrate that AG-NBC is a valid and efficient approach for alleviating the attribute i
Linear canonical transform is of much significance to optics and information science. Hardy uncertainty principle, like Heisenberg uncertainty principle, plays an important role in various fields. In this paper, four ...
详细信息
Linear canonical transform is of much significance to optics and information science. Hardy uncertainty principle, like Heisenberg uncertainty principle, plays an important role in various fields. In this paper, four new sharper Hardy uncertainty relations on linear canonical transform are derived. These new derived uncertainty relations are connected with the linear canonical transform parameters and indicate new insights for signal energy ***, for certain transform parameters, e.g. b = 0, these new proposed uncertainty relations break the traditional counterparts in signal energy concentration, as will result in new physical interpretation in terms of uncertainty principle. Theoretical analysis and numerical examples are given to show the efficiency of these new relations.
To mitigate the challenges posed by data uncertainty in Full-Self Driving (FSD) systems. This paper proposes a novel feature extraction learning model called Adaptive Region of Interest Optimized Pyramid Network (ARO)...
详细信息
The rapid development of 5G/6G and AI enables an environment of Internet of Everything(IoE)which can support millions of connected mobile devices and applications to operate smoothly at high speed and low ***,these ma...
详细信息
The rapid development of 5G/6G and AI enables an environment of Internet of Everything(IoE)which can support millions of connected mobile devices and applications to operate smoothly at high speed and low ***,these massive devices will lead to explosive traffic growth,which in turn cause great burden for the data transmission and content *** challenge can be eased by sinking some critical content from cloud to *** this case,how to determine the critical content,where to sink and how to access the content correctly and efficiently become new *** work focuses on establishing a highly efficient content delivery framework in the IoE *** particular,the IoE environment is re-constructed as an end-edge-cloud collaborative system,in which the concept of digital twin is applied to promote the *** on the digital asset obtained by digital twin from end users,a content popularity prediction scheme is firstly proposed to decide the critical content by using the Temporal Pattern Attention(TPA)enabled Long Short-Term Memory(LSTM)***,the prediction results are input for the proposed caching scheme to decide where to sink the critical content by using the Reinforce Learning(RL)***,a collaborative routing scheme is proposed to determine the way to access the content with the objective of minimizing *** experimental results indicate that the proposed schemes outperform the state-of-the-art benchmarks in terms of the caching hit rate,the average throughput,the successful content delivery rate and the average routing overhead.
This article presents LoRaDIP, a novel low-light image enhancement (LLIE) model based on deep image priors (DIPs). While DIP-based enhancement models are known for their zero-shot learning, their expensive computation...
详细信息
Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing de...
详细信息
Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing details about the speaker’s goals and desires, as well as their internal condition. Certain vocal characteristics reveal the speaker’s mood, intention, and motivation, while word study assists the speaker’s demand to be understood. Voice emotion recognition has become an essential component of modern HCC networks. Integrating findings from the various disciplines involved in identifying vocal emotions is also challenging. Many sound analysis techniques were developed in the past. Learning about the development of artificial intelligence (AI), and especially Deep Learning (DL) technology, research incorporating real data is becoming increasingly common these days. Thus, this research presents a novel selfish herd optimization-tuned long/short-term memory (SHO-LSTM) strategy to identify vocal emotions in human communication. The RAVDESS public dataset is used to train the suggested SHO-LSTM technique. Mel-frequency cepstral coefficient (MFCC) and wiener filter (WF) techniques are used, respectively, to remove noise and extract features from the data. LSTM and SHO are applied to the extracted data to optimize the LSTM network’s parameters for effective emotion recognition. Python software was used to execute our proposed framework. In the finding assessment phase, Numerous metrics are used to evaluate the proposed model’s detection capability, Such as F1-score (95%), precision (95%), recall (96%), and accuracy (97%). The suggested approach is tested on a Python platform, and the SHO-LSTM’s outcomes are contrasted with those of other previously conducted research. Based on comparative assessments, our suggested approach outperforms the current approaches in vocal emotion recognition.
Handling the massive amount of data generated by Smart Mobile Devices(SMDs)is a challenging computational *** Computing is an emerging computation paradigm that is employed to conquer this *** can bring computation po...
详细信息
Handling the massive amount of data generated by Smart Mobile Devices(SMDs)is a challenging computational *** Computing is an emerging computation paradigm that is employed to conquer this *** can bring computation power closer to the end devices to reduce their computation latency and energy ***,this paradigm increases the computational ability of SMDs by collaboration with edge *** is achieved by computation offloading from the mobile devices to the edge nodes or ***,not all applications benefit from computation offloading,which is only suitable for certain types of *** properties,SMD capability,wireless channel state,and other factors must be counted when making computation offloading ***,optimization methods are important tools in scheduling computation offloading tasks in Edge Computing *** this paper,we review six types of optimization methods-they are Lyapunov optimization,convex optimization,heuristic techniques,game theory,machine learning,and *** each type,we focus on the objective functions,application areas,types of offloading methods,evaluation methods,as well as the time complexity of the proposed *** discuss a few research problems that are still *** purpose for this review is to provide a concise summary that can help new researchers get started with their computation offloading researches for Edge Computing networks.
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and ***,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial *** examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong ***,the security of AI models for the digital communication signals identification is the premise of its efficient and credible *** this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial *** we present more detailed adversarial indicators to evaluate attack and defense ***,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research.
With the popularity of the Internet of Vehicles(IoV), a large amount of data is being generated every day. How to securely share data between the IoV operator and various value-added service providers becomes one of t...
详细信息
With the popularity of the Internet of Vehicles(IoV), a large amount of data is being generated every day. How to securely share data between the IoV operator and various value-added service providers becomes one of the critical issues. Due to its flexible and efficient fine-grained access control feature, Ciphertext-Policy Attribute-Based Encryption(CP-ABE) is suitable for data sharing in IoV. However, there are many flaws in most existing CP-ABE schemes, such as attribute privacy leakage and key misuse. This paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP). A partially hidden access structure is adopted to hide sensitive user attribute values, and attribute categories are sent along with the ciphertext to effectively avoid privacy exposure. In addition, key tracking and malicious user revocation are introduced with broadcast encryption to prevent key misuse. Since the main computation task is outsourced to the cloud, the burden of the user side is relatively low. Analysis of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV.
暂无评论