1,148 Result(s)
-
Chapter and Conference Paper
Research on Data Acquisition and Real-Time Communication for Intelligent Manufacturing Training Equipment Based on Model of Things and Intranet Penetration
Intelligent Manufacturing Training Equipment (IMTE) are featured with high-value shareable training property and high security requirement on human-machine interaction, which prompt urgent demands on equipment...
-
Chapter and Conference Paper
Evolving Epidemic Management Rules Using Deep Neuroevolution: A Novel Approach to Inspection Scheduling and Outbreak Minimization
In epidemic management, the unpredictable dynamics of outbreaks, the constraints of available resources, and the complexity of variable interactions pose a significant challenge in designing effective manageme...
-
Chapter and Conference Paper
Machine Learning-Driven Reactor Pressure Vessel Embrittlement Prediction Model
The application of machine learning in the nuclear field has been considered for the prediction of neutron irradiation embrittlement of reactor pressure vessel (RPV) steels in recent years. In this study, the ...
-
Chapter and Conference Paper
FFANet: Dual Attention-Based Flow Field Aware Network for 3D Grid Classification and Segmentation
Deep learning-based approaches for three-dimensional (3D) grid understanding and processing tasks have been extensively studied in recent years. Despite the great success in various scenarios, the existing app...
-
Chapter and Conference Paper
An Improved Trajectory Planning Method for Unmanned Aerial Vehicles in Complex Environments
Trajectory planning plays a crucial role in the execution of Unmanned aerial vehicle (UAV) missions. However, planning an optimal collision-free trajectory is a challenging task, especially in complex environm...
-
Chapter and Conference Paper
Practical Teaching Reform of Cybersecurity Courses Incorporating Personalized Recommendations
In recent years, with the development of cyber security, the national demand for cybersecurity-related professionals is growing, and the practice of cyber security related practices is increasing, which makes ...
-
Chapter and Conference Paper
Vehicle Edge Computing Network Service Migration Strategy Based on Multi-agent Reinforcement Learning
In order to address the decision-making problem in vehicular edge computing networks, this paper presented a vehicle edge computing service migration strategy based on multi-agent deep learning. This strategy ...
-
Chapter and Conference Paper
Research on Improving Higher Education Exam Quality Based on Weighted k-Medoids Clustering
Exam is the most effective method to evaluate the quality of higher education, and improving higher education exam quality is of paramount importance. Traditional methods of analyzing and improving higher educ...
-
Chapter and Conference Paper
A CNN-Based Real-Time Dense Stereo SLAM System on Embedded FPGA
Simultaneous localization and map** (SLAM) is the task to estimate agent’s ego-motion in the map and reconstruct the 3D geometric of an unknown environment in parallel. Although many SLAM algorithms have bee...
-
Chapter and Conference Paper
Analysis of Significant Cell Differences Between Cancer Patients and Healthy Individuals
At the end of 2019, a global outbreak of a new coronavirus ravaged the world, and to this day, many people’s bodies are still deeply affected by the virus. In order to find out if there is a correlation betwee...
-
Chapter and Conference Paper
COVER: A Heuristic Greedy Adversarial Attack on Prompt-Based Learning in Language Models
Prompt-based learning has been proved to be an effective way in pre-trained language models (PLMs), especially in low-resource scenarios like few-shot settings. However, the trustworthiness of PLMs is of param...
-
Chapter and Conference Paper
Exploring the Establishment and Implementation of a Teaching Evaluation System Based on Value-Added Assessment
Value-added assessment (VAA) can effectively solve the existing problems of the excess of outcome-oriented evaluations and the lack of teaching evaluation feedback mechanisms in higher education, which plays a...
-
Chapter and Conference Paper
CERender: Real-Time Cloud Rendering Based on Cloud-Edge Collaboration
With the maturity of cloud computing and the rise of edge computing, real-time cloud rendering technology has received widespread attention for its ability to solve the problem of low-power mobile devices. Clo...
-
Chapter and Conference Paper
A Group Genetic Algorithm for Energy-Efficient Resource Allocation in Container-Based Clouds with Heterogeneous Physical Machines
Containers are quickly gaining popularity in cloud computing environments due to their scalable and lightweight characteristics. However, the problem of Resource Allocation in Container-based clouds (RAC) is m...
-
Chapter and Conference Paper
Robot Manipulation Strategy for Explosives Disposal in Cluttered Scenes
Compared to human operator, robotic arm possesses the advantages of high accuracy and controllability in handling and manipulating hazardous materials. Due to the complexity and variability of application scen...
-
Chapter and Conference Paper
Lightweight Privacy-Preserving Medical Diagnostic Scheme for Internet of Things Healthcare
Remote medical diagnosis is an emerging trend in technological development. Retrieving diagnostic reports is crucial in remote medical diagnosis systems. However, patients’ medical records are highly sensitive...
-
Chapter and Conference Paper
MTD: Multi-Timestep Detector for Delayed Streaming Perception
Autonomous driving systems require real-time environmental perception to ensure user safety and experience. Streaming perception is a task of reporting the current state of the world, which is used to evaluate...
-
Chapter and Conference Paper
DSQA-LLM: Domain-Specific Intelligent Question Answering Based on Large Language Model
Question Answering (QA) is crucial for humans to access vast knowledge bases, but there is a lack of attention towards representing raw, unstructured questions and answers in specific fields. Additionally, the...
-
Chapter and Conference Paper
Brain Diffuser: An End-to-End Brain Image to Brain Network Pipeline
Brain network analysis is essential for diagnosing and intervention for Alzheimer’s disease (AD). However, previous research relied primarily on specific time-consuming and subjective toolkits. Only few tools...
-
Chapter and Conference Paper
A Study of PyTorch-Based Algorithms for Handwritten Digit Recognition
In this paper, three handwritten digit recognition algorithms based on K-nearest neighbor (KNN), support vector machine (SVM) and convolutional neural network (CNN) are implemented. And compared the performanc...