Three-dimensional Network-on-Chip (3D NoC) is gaining popularity among designers due to its scalability, higher bandwidth, fault tolerance, and reliability. However, stacking of multiple dies leads to increase in powe...
详细信息
Artificial Intelligence (AI) techniques are essential to the modeling of realistic behaviors for agents in simulation systems. Although Case-Based Reasoning (CBR) and Clustering techniques are being explored in the im...
详细信息
Open source datasets are the typical source used to train computers to accurately detect visual objects (e.g., humans, animals, and inanimate objects) through various machine learning methods (e.g., Deep Learning (DL)...
详细信息
With the significant advancements in Information and Communications Technology(ICT), computersimulations have been widely used in natural sciences and engineering analysis. algorithms for parameters optimization in c...
详细信息
With the significant advancements in Information and Communications Technology(ICT), computersimulations have been widely used in natural sciences and engineering analysis. algorithms for parameters optimization in computer models have been necessity in computermodeling due to the accuracy requirements. As a principal branch of computer models, hydrological models have been a fundamental method for researching hydrological processes. In this paper, a computer model of the groundwater system in the middle reaches of the Heihe River Basin was established. Geological features of different regions were characterized by sub-zones of parameters in the model which were optimized by Particle Filter. The effectiveness for Particle Filter of optimizing the parameters of numerical models was verified. The results indicated significant improvements of parameters after 100 time-steps which converged to optimal value. Meanwhile, the difference between simulated and observed groundwater level was reduced along with the parameters convergence.
The proceedings contain 54 papers. The topics discussed include: an efficient 2 bits-level for image encryption based on DNA, multi-delayed Chebyshev map and cellular automata;an improved framework called DU++ applied...
ISBN:
(纸本)9781728115351
The proceedings contain 54 papers. The topics discussed include: an efficient 2 bits-level for image encryption based on DNA, multi-delayed Chebyshev map and cellular automata;an improved framework called DU++ applied to brain tumor segmentation;modeling of blockchain based systems using queuing theory simulation;the application research of internet of things to oil pipeline leak detection;shadow puppetry classification using convolutional neural networks;database selection model based on fuzzy comprehensive evaluation;direct localization algorithm of moving target for passive radar;image conversion in multiple domains based on GaN;and the evolution of people's interest in video games.
On multiple incidences of terrorist attacks in recent times across Europe, it has been observed that the perpetrators of the attack were in the suspect databases of the law enforcement authorities, but weren't und...
详细信息
ISBN:
(纸本)9783319933726;9783319933719
On multiple incidences of terrorist attacks in recent times across Europe, it has been observed that the perpetrators of the attack were in the suspect databases of the law enforcement authorities, but weren't under active surveillance at the time of the attack due to resource limitations on the part of the authorities. As the suspect databases in various European countries are very large, and it takes significant amount of technical and human resources to monitor a suspect in the database, monitoring all the suspects in the database may be an impossible task. In this paper, we propose a scheme utilizing Identifying Codes that will significantly reduce the resource requirement of law enforcement authorities, and will have the capability of uniquely identifying a suspect in case the suspect becomes active in planning a terrorist attack. The scheme relies on the assumption that, when an individual becomes active in planning a terrorist attack, his/her friends/associates will have some inkling of the individuals plan. Accordingly, even if the individual is not under active surveillance by the authorities, but the individual's friends/associates are, the individual planning the attack can be uniquely identified. We applied our technique on two terrorist networks, one involved in an attack in Paris and the other involved in the 9/11 attack. We show that, in the Paris network, if 5 of the 10 individuals were monitored, the attackers most likely would have been exposed. If only 15 out of the 37 individuals involved in the 9/11 attack were under surveillance, specific individuals involved in the planning of the 9/11 attack would have been exposed.
Toxic cloud caused by accidents in the industries is extremely dangerous for the occupants. Thus, in case of such accidents, the occupants must be immediately evacuated from industry buildings. In this paper, we explo...
详细信息
Anomalous behavior detection in many applications is becoming more and more important, especially for computer security and sensor networks domains, in which data are typical time-series. However, the sequence anomaly...
详细信息
Calcium dynamics plays key role in many intracellular processes. Studying of calcium sparks, that is events of calcium release via groups of ryanodine receptors, or RyR channels, is of a great importance for live scie...
详细信息
Calcium dynamics plays key role in many intracellular processes. Studying of calcium sparks, that is events of calcium release via groups of ryanodine receptors, or RyR channels, is of a great importance for live sciences. Recent experimental studies show, that RyRs have a non-uniform arrangement in calcium release units (CRU), however, to our knowledge, there is yet no published Ca' spark model which takes into account this fact. In the paper we made use of a genetic simulated annealing (GSA) algorithm for the RyR cluster generation and Gillespie algorithm for modeling calcium spark. computersimulation of the model CRU taking into account a specific homotetrameric structure of the RyR channel shows that experimental nearest neighbor distances (NND) distributions of RyRs in CRU do not provide exact information about calcium spark probability. Having the same NND distribution, the CRUs can have different inverse distance matrices and hence different calcium spark properties. Our model approach opens novel perspectives for studying the calcium release process. (C) 2018 The Authors. Published by Elsevier B.V.
The article is devoted to the description of the complex method to design granulation unit, which is based on the joint use of the computermodeling results on the simulation models and software modeling based on aut...
详细信息
暂无评论