期刊文献+
共找到2,079篇文章
< 1 2 104 >
每页显示 20 50 100
嵌入式Linux中基于Qt/Embeded触摸屏驱动的设计 被引量:7
1
作者 申伟杰 彭楚武 胡辉红 《中国仪器仪表》 2006年第4期48-51,共4页
本文主要介绍了在嵌入式Linux系统下基于Qt/Embeded的触摸屏驱动的设计,通过对Linux设备驱动和Qt/Embedded设备驱动接口的工作原理和机制介绍,并结合大量源代码进行分析,提出了基于Qt/Embeded的触摸屏驱动的开发方案。
关键词 嵌入式系统 LINUX QT/EMBEDDED 触摸屏 设备驱动
在线阅读 下载PDF
Dragonfang:An Open-Source Embedded Flight Controller with IMU-Based Stabilization for Quadcopter Applications
2
作者 Cosmin Dumitru Emanuel Pantelimon +1 位作者 Alexandru Guzu Georgian Nicolae 《Computers, Materials & Continua》 2026年第4期452-470,共19页
Unmanned aerial vehicles(UAVs),especially quadcopters,have become indispensable in numerous industrial and scientific applications due to their flexibility,lowcost,and capability to operate in dynamic environments.Thi... Unmanned aerial vehicles(UAVs),especially quadcopters,have become indispensable in numerous industrial and scientific applications due to their flexibility,lowcost,and capability to operate in dynamic environments.This paper presents a complete design and implementation of a compact autonomous quadcopter capable of trajectory tracking,object detection,precision landing,and real-time telemetry via long-range communication protocols.The system integrates an onboard flight controller running real-time sensor fusion algorithms,a vision-based detection system on a companion single-board computer,and a telemetry unit using Long Range(LoRa)communication.Extensive flight tests were conducted to validate the system’s stability,communication range,and autonomous capabilities.Potential applications in law enforcement,agriculture,search and rescue,and environmental monitoring are also discussed. 展开更多
关键词 Quadcopter UAV autonomous navigation visual detection sensor fusion TELEMETRY LoRa embedded systems
在线阅读 下载PDF
AI-driven interpretation and prediction of embedded printability based on rheology
3
作者 Xianhao Zhou Zhenrui Zhang +7 位作者 Jintian Yu Lixi Ma Sicheng Ma Bingyan Wu Zixuan Wang Ting Zhang Yongcong Fang Zhuo Xiong 《Bio-Design and Manufacturing》 2026年第1期63-79,I0003-I0012,共27页
Embedded printing is a highly promising approach for creating complex structures within a yield-stress support bath.However,the accurate prediction and control of printability remain fundamental challenges due to the ... Embedded printing is a highly promising approach for creating complex structures within a yield-stress support bath.However,the accurate prediction and control of printability remain fundamental challenges due to the complex interactions between inks and support baths.Here,we present an artificial intelligence(AI)-driven framework that interprets and predicts embedded printability using rheological data.Using a standardized workflow,we extracted 21 rheological descriptors and established 12 indicators to evaluate structural continuity and geometric fidelity.Interpretable machine learning models revealed that direction-dependent defects are governed by the synergistic interplay among ink yield stress,support bath zero shear viscosity,flow behavior index,and time constant.To enable the prediction of printability in a generalizable manner,we further developed a cascaded neural network,which achieved mean relative prediction errors below 15%across all indicators.Experimental validation using three-dimensional(3 D)-printed constructs and micro-computed tomography(μCT)reconstructions confirmed a strong correlation between predicted and actual fidelity.This work establishes a physics-informed,data-driven paradigm for decoding and optimizing embedded printing,offering broad applicability and providing a robust tool for the rapid pairing of suitable printable ink-support bath combinations. 展开更多
关键词 Embedded bioprinting PRINTABILITY RHEOLOGY Machine learning Neural network
在线阅读 下载PDF
Blockchain-Enabled Trusted Virtual Network Embedding in Intelligent Cyber-Physical Systems
4
作者 Zhu Hailong Huang Tao +2 位作者 Zhang Yi Chen Ning Zhang Peiying 《China Communications》 2026年第1期175-188,共14页
With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Further... With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Furthermore,given the open environment and a multitude of devices,enhancing the security of ICPS is an urgent concern.To address these issues,this paper proposes a novel trusted virtual network embedding(T-VNE)approach for ICPS based combining blockchain and edge computing technologies.Additionally,the proposed algorithm leverages a deep reinforcement learning(DRL)model to optimize decision-making processes.It employs the policygradient-based agent to compute candidate embedding nodes and utilizes a breadth-first search(BFS)algorithm to determine the optimal embedding paths.Finally,through simulation experiments,the efficacy of the proposed method was validated,demonstrating outstanding performance in terms of security,revenue generation,and virtual network request(VNR)acceptance rate. 展开更多
关键词 blockchain cyber-physical system trusted embedding virtual network
在线阅读 下载PDF
Context-Aware Spam Detection Using BERT Embeddings with Multi-Window CNNs
5
作者 Sajid Ali Qazi Mazhar Ul Haq +3 位作者 Ala Saleh Alluhaidan Muhammad Shahid Anwar Sadique Ahmad Leila Jamel 《Computer Modeling in Engineering & Sciences》 2026年第1期1296-1310,共15页
Spam emails remain one of the most persistent threats to digital communication,necessitating effective detection solutions that safeguard both individuals and organisations.We propose a spam email classification frame... Spam emails remain one of the most persistent threats to digital communication,necessitating effective detection solutions that safeguard both individuals and organisations.We propose a spam email classification frame-work that uses Bidirectional Encoder Representations from Transformers(BERT)for contextual feature extraction and a multiple-window Convolutional Neural Network(CNN)for classification.To identify semantic nuances in email content,BERT embeddings are used,and CNN filters extract discriminative n-gram patterns at various levels of detail,enabling accurate spam identification.The proposed model outperformed Word2Vec-based baselines on a sample of 5728 labelled emails,achieving an accuracy of 98.69%,AUC of 0.9981,F1 Score of 0.9724,and MCC of 0.9639.With a medium kernel size of(6,9)and compact multi-window CNN architectures,it improves performance.Cross-validation illustrates stability and generalization across folds.By balancing high recall with minimal false positives,our method provides a reliable and scalable solution for current spam detection in advanced deep learning.By combining contextual embedding and a neural architecture,this study develops a security analysis method. 展开更多
关键词 E-mail spam detection BERT embedding text classification CYBERSECURITY CNN
在线阅读 下载PDF
A Hybrid Clique-Based Method with Structural Feature Node Extraction for Community Detection in Overlapping Networks
6
作者 Sicheng Ma Lixiang Zhang +3 位作者 Guocai Chen Zeyu Dai Junru Zhu Wei Fang 《Computers, Materials & Continua》 2026年第4期2231-2253,共23页
Community detection is a fundamental problem in network analysis for identifying densely connected node clusters,with successful applications in diverse fields like social networks,recommendation systems,biology,and c... Community detection is a fundamental problem in network analysis for identifying densely connected node clusters,with successful applications in diverse fields like social networks,recommendation systems,biology,and cyberattack detection.Overlapping community detection refers to the case of a node belonging to multiple communities simultaneously,which is a much more meaningful and challenging task.Graph representation learning with Evolutionary Computation has been studied well in overlapping community detection to deal with complex network structures and characteristics.However,most of them focus on searching the entire solution space,which can be inefficient and lead to inadequate results.To overcome the problem,a structural feature node extraction method is first proposed that can effectively map a network into a structural embedding space.Thus,nodes within the network are classified into hierarchical levels based on their structural feature strength,and only nodes with relatively high strength are considered in subsequent search steps to reduce the search space.Then,a maximal-clique representation method is employed on the given vertex set to identify overlapping nodes.A hybrid clique-based multi-objective evolutionary algorithmwith decomposition method is designed to address cliques and the remaining unexplored nodes separately.The number of communities generated with this allocation method is closer to the actual partition count with high division quality.Experimental results on nine usually used real-world networks,five synthetic networks,and two large-scale networks demonstrate the effectiveness of the proposed methodology in terms of community quality and algorithmic efficiency,compared to traditional,MOEA-based,and graph embedding-based community detection algorithms. 展开更多
关键词 Community detection graph embedding multi-objective evolutionary algorithm CLIQUES link strength
在线阅读 下载PDF
ProRE:A Protocol Message Structure Reconstruction Method Based on Execution Slice Embedding
7
作者 Yuyao Huang Hui Shu Fei Kang 《Computers, Materials & Continua》 2026年第3期936-960,共25页
Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,inclu... Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios. 展开更多
关键词 Protocol reverse engineering program slicing code embedding hierarchical clustering
在线阅读 下载PDF
A Ransomware Detection Approach Based on LLM Embedding and Ensemble Learning
8
作者 Abdallah Ghourabi Hassen Chouaib 《Computers, Materials & Continua》 2026年第4期2327-2342,共16页
In recent years,ransomware attacks have become one of the most common and destructive types of cyberattacks.Their impact is significant on the operations,finances and reputation of affected companies.Despite the effor... In recent years,ransomware attacks have become one of the most common and destructive types of cyberattacks.Their impact is significant on the operations,finances and reputation of affected companies.Despite the efforts of researchers and security experts to protect information systems from these attacks,the threat persists and the proposed solutions are not able to significantly stop the spread of ransomware attacks.The latest remarkable achievements of large language models(LLMs)in NLP tasks have caught the attention of cybersecurity researchers to integrate thesemodels into security threat detection.Thesemodels offer high embedding capabilities,able to extract rich semantic representations and paving theway formore accurate and adaptive solutions.In this context,we propose a new approach for ransomware detection based on an ensemblemethod that leverages three distinctLLMembeddingmodels.This ensemble strategy takes advantage of the variety of embedding methods and the strengths of each model.In the proposed solution,each embedding model is associated with an independently trainedMLP classifier.The predictions obtained are then merged using a weighted voting technique,assigning each model an influence proportional to its performance.This approach makes it possible to exploit the complementarity of representations,improve detection accuracy and robustness,and offer a more reliable solution in the face of the growing diversity and complexity of modern ransomware. 展开更多
关键词 Ransomware detection ensemble learning LLM embedding
在线阅读 下载PDF
Extreme Attitude Prediction of Amphibious Vehicles Based on Improved Transformer Model and Extreme Loss Function
9
作者 Qinghuai Zhang Boru Jia +3 位作者 Zhengdao Zhu Jianhua Xiang Yue Liu Mengwei Li 《哈尔滨工程大学学报(英文版)》 2026年第1期228-238,共11页
Amphibious vehicles are more prone to attitude instability compared to ships,making it crucial to develop effective methods for monitoring instability risks.However,large inclination events,which can lead to instabili... Amphibious vehicles are more prone to attitude instability compared to ships,making it crucial to develop effective methods for monitoring instability risks.However,large inclination events,which can lead to instability,occur frequently in both experimental and operational data.This infrequency causes events to be overlooked by existing prediction models,which lack the precision to accurately predict inclination attitudes in amphibious vehicles.To address this gap in predicting attitudes near extreme inclination points,this study introduces a novel loss function,termed generalized extreme value loss.Subsequently,a deep learning model for improved waterborne attitude prediction,termed iInformer,was developed using a Transformer-based approach.During the embedding phase,a text prototype is created based on the vehicle’s operation log data is constructed to help the model better understand the vehicle’s operating environment.Data segmentation techniques are used to highlight local data variation features.Furthermore,to mitigate issues related to poor convergence and slow training speeds caused by the extreme value loss function,a teacher forcing mechanism is integrated into the model,enhancing its convergence capabilities.Experimental results validate the effectiveness of the proposed method,demonstrating its ability to handle data imbalance challenges.Specifically,the model achieves over a 60%improvement in root mean square error under extreme value conditions,with significant improvements observed across additional metrics. 展开更多
关键词 Amphibious vehicle Attitude prediction Extreme value loss function Enhanced transformer architecture External information embedding
在线阅读 下载PDF
Theoretical Mechanisms of New Quality Productive Forces Reshaping the Rural Division of Labor System
10
作者 Ximing ZHAO Xiejun CHENG 《Asian Agricultural Research》 2026年第2期19-22,29,共5页
In the context of the coordinated pursuit of"carbon peak and neutrality"objectives,alongside the strategy to establish a robust agricultural nation,the economic and social development of rural areas is under... In the context of the coordinated pursuit of"carbon peak and neutrality"objectives,alongside the strategy to establish a robust agricultural nation,the economic and social development of rural areas is undergoing a profound paradigm shift.The traditional rural division of labor pattern,which depends on tangible factors such as land,labor,and capital,has increasingly encountered developmental challenges characterized by diminishing marginal returns and a detrimental cycle of internal competition.The new quality productive force,centered on data,algorithms,green technologies,bioengineering,and clean energy,offers a potential pathway for the rural division of labor system to overcome the"low-level equilibrium".This force is characterized by attributes such as non-exclusivity,replicability,network collaboration,and ecological compatibility.This paper develops a three-dimensional collaborative analytical framework encompassing"technology,institution,and culture".It systematically elucidates the internal logic by which new quality productive forces drive the transformation of the rural division of labor from"quantitative factor matching"to"qualitative structural reorganization"through three principal mechanisms:technology embedding,institutional reconstruction,and cultural coupling.Furthermore,the study proposes corresponding policy recommendations,thereby offering theoretical insights to support the modernization of China s agriculture and rural areas,as well as the development of a strong agricultural country. 展开更多
关键词 New quality productive force Rural division of labor system Technology embedding Institutional reconstruction Cultural coupling
在线阅读 下载PDF
基于DCNN-Transformer模型的XSS攻击检测方法 被引量:1
11
作者 何志伟 高大鹏 《信息技术》 2025年第3期93-100,共8页
为进一步提高XSS攻击的检测效果,文中提出一种基于DCNN-Transformer模型的XSS攻击检测方法。通过对收集的数据依次进行解码、规范化、分词、TF-IDF选词、构建词典和编码预处理,用于模型的训练和测试。文中提出的DCNN-Transformer模型引... 为进一步提高XSS攻击的检测效果,文中提出一种基于DCNN-Transformer模型的XSS攻击检测方法。通过对收集的数据依次进行解码、规范化、分词、TF-IDF选词、构建词典和编码预处理,用于模型的训练和测试。文中提出的DCNN-Transformer模型引入了Embedding层,还综合了一维深度卷积神经网络快速处理序列数据和Transformer模型并行处理序列数据及学习序列元素间依赖关系的能力。实验结果表明,DCNN-Transformer模型相比于LSTM、GRU、DCNN和DCNN-GRU模型,收敛速度最快且效果更优,准确率、召回率和f1值最高,模型轻量、检测速度快,综合表现显著优于其他4个模型,为XSS攻击检测提供了一个更优的方法。 展开更多
关键词 XSS攻击检测 卷积神经网络 Transformer Embedding层 TF-IDF
在线阅读 下载PDF
Embedded solar adaptive optics telescope:achieving compact integration for high-efficiency solar observations 被引量:1
12
作者 Naiting Gu Hao Chen +11 位作者 Ao Tang Xinlong Fan Carlos Quintero Noda Yawei Xiao Libo Zhong Xiaosong Wu Zhenyu Zhang Yanrong Yang Zao Yi Xiaohu Wu Linhai Huang Changhui Rao 《Opto-Electronic Advances》 2025年第5期60-74,共15页
Adaptive optics(AO)has significantly advanced high-resolution solar observations by mitigating atmospheric turbulence.However,traditional post-focal AO systems suffer from external configurations that introduce excess... Adaptive optics(AO)has significantly advanced high-resolution solar observations by mitigating atmospheric turbulence.However,traditional post-focal AO systems suffer from external configurations that introduce excessive optical surfaces,reduced light throughput,and instrumental polarization.To address these limitations,we propose an embedded solar adaptive optics telescope(ESAOT)that intrinsically incorporates the solar AO(SAO)subsystem within the telescope's optical train,featuring a co-designed correction chain with a single Hartmann-Shack full-wavefront sensor(HS f-WFS)and a deformable secondary mirror(DSM).The HS f-WFS uses temporal-spatial hybrid sampling technique to simultane-ously resolve tip-tilt and high-order aberrations,while the DSM performs real-time compensation through adaptive modal optimization.This unified architecture achieves symmetrical polarization suppression and high system throughput by min-imizing optical surfaces.A 600 mm ESAOT prototype incorporating a 12×12 micro-lens array HS f-WFS and 61-actuator piezoelectric DSM has been developed and successfully conducted on-sky photospheric observations.Validations in-cluding turbulence simulations,optical bench testing,and practical observations at the Lijiang observatory collectively confirm the system's capability to maintain aboutλ/10 wavefront error during active region tracking.This architectural breakthrough of the ESAOT addresses long-standing SAO integration challenges in solar astronomy and provides scala-bility analyses confirming direct applicability to the existing and future large solar observation facilities. 展开更多
关键词 embedded solar adaptive optics telescope(ESAOT) Hartmann-Shack full-wavefront sensor(HS f-WFS) deformable secondary mirror(DSM) high-resolution solar observations solar telescopes
在线阅读 下载PDF
基于元建模的实时系统模型转换方法研究 被引量:8
13
作者 刘亚萍 黄志球 祝义 《小型微型计算机系统》 CSCD 北大核心 2010年第11期2145-2153,共9页
通过模型转换将UML模型转换为形式化模型并进行模型检验是软件工程研究领域的热点,然而传统的模型转换多是ad-hoc式的,转换规则复杂且难以重用.本文针对这一研究现状,通过元建模实现MARTE到时间自动机模型的转换,从而提出一种基于元建... 通过模型转换将UML模型转换为形式化模型并进行模型检验是软件工程研究领域的热点,然而传统的模型转换多是ad-hoc式的,转换规则复杂且难以重用.本文针对这一研究现状,通过元建模实现MARTE到时间自动机模型的转换,从而提出一种基于元建模的实时系统模型转换方法.该方法有效的分离了语法转换与语义转换,框架标准的支撑使得转换易于重用.最后通过一个实例来说明该方法的可行性与有效性. 展开更多
关键词 模型转换 MARTE(modeling and analysis of REAL TIME and embeded systems) 模型验证 时间自动机
在线阅读 下载PDF
On Markov and Zariski Embeddings in a Free Group
14
作者 Victor Hugo Yanez Dmitri Shakhmatov 《南开大学学报(自然科学版)》 北大核心 2025年第1期18-21,共4页
Let G be a group.The family of all sets which are closed in every Hausdorf group topology of G form the family of closed sets of a T_(1) topology M_(G) on G called the Markov topology.Similarly,the family of all algeb... Let G be a group.The family of all sets which are closed in every Hausdorf group topology of G form the family of closed sets of a T_(1) topology M_(G) on G called the Markov topology.Similarly,the family of all algebraic subsets of G forms a family of closed sets for another T_(1)topology Z_(G) on G called the Zarski topology.A subgroup H of G is said to be Markov(resp.Zarski)embedded if the equality M_(G|H)=M_(H)(resp.Z_(G|H)=Z_(H))holds.I's proved that an abirary subgroup of a free group is both Zariski and Markov embedded in it. 展开更多
关键词 free group Zariski topology Markov embedding centralizer in a free group
原文传递
On σ-c-propermutable Subgroups of Finite Groups
15
作者 MA Xiaojian MAO Yuemei 《数学进展》 北大核心 2025年第3期509-517,共9页
Let G be a finite group.A subgroup H of G is said to be σ-c-propermutable in G if G has a subgroup B such that G=N_(G)(H)B and for every Hall σ_(i)-subgroup B_(i) of B,there exists an element x∈B such that HB_(i)^(... Let G be a finite group.A subgroup H of G is said to be σ-c-propermutable in G if G has a subgroup B such that G=N_(G)(H)B and for every Hall σ_(i)-subgroup B_(i) of B,there exists an element x∈B such that HB_(i)^(x)=B_(i)^(x) H.In this paper,the influence of σ-c-propermutable subgroups on the structure of finite groups is investigated,and some criteria for a normal subgroup of G to be hypercyclically embedded in G are derived. 展开更多
关键词 complete Hallσ-set σ-c-propermutable subgroup supersoluble group hypercyclically embedded
原文传递
An Embedded Computer Vision Approach to Environment Modeling and Local Path Planning in Autonomous Mobile Robots
16
作者 Rıdvan Yayla Hakan Üçgün Onur Ali Korkmaz 《Computer Modeling in Engineering & Sciences》 2025年第12期4055-4087,共33页
Recent advancements in autonomous vehicle technologies are transforming intelligent transportation systems.Artificial intelligence enables real-time sensing,decision-making,and control on embedded platforms with impro... Recent advancements in autonomous vehicle technologies are transforming intelligent transportation systems.Artificial intelligence enables real-time sensing,decision-making,and control on embedded platforms with improved efficiency.This study presents the design and implementation of an autonomous radio-controlled(RC)vehicle prototype capable of lane line detection,obstacle avoidance,and navigation through dynamic path planning.The system integrates image processing and ultrasonic sensing,utilizing Raspberry Pi for vision-based tasks and ArduinoNano for real-time control.Lane line detection is achieved through conventional image processing techniques,providing the basis for local path generation,while traffic sign classification employs a You Only Look Once(YOLO)model optimized with TensorFlow Lite to support navigation decisions.Images captured by the onboard camera are processed on the Raspberry Pi to extract lane geometry and calculate steering angles,enabling the vehicle to follow the planned path.In addition,ultrasonic sensors placed in three directions at the front of the vehicle detect obstacles and allow real-time path adjustment for safe navigation.Experimental results demonstrate stable performance under controlled conditions,highlighting the system’s potential for scalable autonomous driving applications.This work confirms that deep learning methods can be efficiently deployed on low-power embedded systems,offering a practical framework for navigation,path planning,and intelligent transportation research. 展开更多
关键词 Embedded vision system mobile robot navigation lane detection sensor fusion deep learning on embedded systems real-time path planning
在线阅读 下载PDF
SNAPSHOTS OF NOTABLE BOOKS ON AFRICA
17
《ChinAfrica》 2025年第6期64-64,共1页
African Lions.By GIGI ROMANO.Independently Published.In the book,Gigi Romano delivers an electrifying and deeply insightful chronicle of football’s evolution across Africa.Tracing its roots from the colonial era to t... African Lions.By GIGI ROMANO.Independently Published.In the book,Gigi Romano delivers an electrifying and deeply insightful chronicle of football’s evolution across Africa.Tracing its roots from the colonial era to the present day,this captivating narrative reveals how football transformed from a pastime introduced by foreign powers into a deeply embedded cultural force and source of immense national pride. 展开更多
关键词 source pride national pride deeply embedded colonial era evolution AFRICA FOOTBALL cultural force
原文传递
An Analytical Review of Large Language Models Leveraging KDGI Fine-Tuning,Quantum Embedding’s,and Multimodal Architectures
18
作者 Uddagiri Sirisha Chanumolu Kiran Kumar +2 位作者 Revathi Durgam Poluru Eswaraiah G Muni Nagamani 《Computers, Materials & Continua》 2025年第6期4031-4059,共29页
A complete examination of Large Language Models’strengths,problems,and applications is needed due to their rising use across disciplines.Current studies frequently focus on single-use situations and lack a comprehens... A complete examination of Large Language Models’strengths,problems,and applications is needed due to their rising use across disciplines.Current studies frequently focus on single-use situations and lack a comprehensive understanding of LLM architectural performance,strengths,and weaknesses.This gap precludes finding the appropriate models for task-specific applications and limits awareness of emerging LLM optimization and deployment strategies.In this research,50 studies on 25+LLMs,including GPT-3,GPT-4,Claude 3.5,DeepKet,and hybrid multimodal frameworks like ContextDET and GeoRSCLIP,are thoroughly reviewed.We propose LLM application taxonomy by grouping techniques by task focus—healthcare,chemistry,sentiment analysis,agent-based simulations,and multimodal integration.Advanced methods like parameter-efficient tuning(LoRA),quantumenhanced embeddings(DeepKet),retrieval-augmented generation(RAG),and safety-focused models(GalaxyGPT)are evaluated for dataset requirements,computational efficiency,and performance measures.Frameworks for ethical issues,data limited hallucinations,and KDGI-enhanced fine-tuning like Woodpecker’s post-remedy corrections are highlighted.The investigation’s scope,mad,and methods are described,but the primary results are not.The work reveals that domain-specialized fine-tuned LLMs employing RAG and quantum-enhanced embeddings performbetter for context-heavy applications.In medical text normalization,ChatGPT-4 outperforms previous models,while two multimodal frameworks,GeoRSCLIP,increase remote sensing.Parameter-efficient tuning technologies like LoRA have minimal computing cost and similar performance,demonstrating the necessity for adaptive models in multiple domains.To discover the optimum domain-specific models,explain domain-specific fine-tuning,and present quantum andmultimodal LLMs to address scalability and cross-domain issues.The framework helps academics and practitioners identify,adapt,and innovate LLMs for different purposes.This work advances the field of efficient,interpretable,and ethical LLM application research. 展开更多
关键词 Large languagemodels quantum embeddings fine-tuning techniques multimodal architectures ethical AI scenarios
在线阅读 下载PDF
Modified Watermarking Scheme Using Informed Embedding and Fuzzy c-Means–Based Informed Coding
19
作者 Jyun-Jie Wang Yin-Chen Lin Chi-Chun Chen 《Computers, Materials & Continua》 2025年第12期5595-5624,共30页
Digital watermarking must balance imperceptibility,robustness,complexity,and security.To address the challenge of computational efficiency in trellis-based informed embedding,we propose a modified watermarking framewo... Digital watermarking must balance imperceptibility,robustness,complexity,and security.To address the challenge of computational efficiency in trellis-based informed embedding,we propose a modified watermarking framework that integrates fuzzy c-means(FCM)clustering into the generation off block codewords for labeling trellis arcs.The system incorporates a parallel trellis structure,controllable embedding parameters,and a novel informed embedding algorithm with reduced complexity.Two types of embedding schemes—memoryless and memory-based—are designed to flexibly trade-off between imperceptibility and robustness.Experimental results demonstrate that the proposed method outperforms existing approaches in bit error rate(BER)and computational complexity under various attacks,including additive noise,filtering,JPEG compression,cropping,and rotation.The integration of FCM enhances robustness by increasing the codeword distance,while preserving perceptual quality.Overall,the proposed framework is suitable for real-time and secure watermarking applications. 展开更多
关键词 WATERMARKING informed embedding fuzzy c-means informed coding
在线阅读 下载PDF
A portable,low-cost lactate measurement system
20
作者 WANG Qingqing PAN Yu +3 位作者 YU Chuanxin WANG Yanyan ZHANG Kaikai LIU Sheng 《Journal of Measurement Science and Instrumentation》 2025年第1期37-46,共10页
Lactate,as a metabolite,plays a significant role in a number of fields,including medical diagnostics,exercise physiology and food science.Traditional methods for lactate measurement often involve expensive and cumbers... Lactate,as a metabolite,plays a significant role in a number of fields,including medical diagnostics,exercise physiology and food science.Traditional methods for lactate measurement often involve expensive and cumbersome instrumentation.This study developed a portable and low-cost lactate measurement system,including independently detectable hardware circuits and user-friendly embedded software,computer,and smartphone applications.The experiment verified that the relative error of the detection current in the device circuit was less than 1%.The electrochemical performance was measured by comparing the[Fe(CN)_(6)]^(3−)/[Fe(CN)_(6)]^(4−)solution with the desktop electrochemical workstation CHI660E,and a nearly consistent chronoamperometry(CA)curve was obtained.Two modified lactate sensors were used for CA testing of lactate.Within the concentration range of 0.1 mmol·L^(−1)to 20 mmol·L^(−1),there was a good linear relationship between lactate concentration and steady-state current,with a correlation coefficient(R2)greater than 0.99 and good repeatability,demonstrating the reliability of the developed device.The lactate measurement system developed in this study not only provides excellent detection performance and reliability,but also achieves portability and low cost,providing a new solution for lactate measurement. 展开更多
关键词 lactate measurement portable device embedded development lactate sensor electrochemical analysis
在线阅读 下载PDF
上一页 1 2 104 下一页 到第
使用帮助 返回顶部