Counterfactual examples (CFs) are one of the most popular methods for attaching post hoc explanations to machine learning models. However, existing CF generation methods either exploit the internals of specific models...
详细信息
This study evaluates the interval-valued availability of a linear consecutive k-out-of-n: F system while considering uncertainty, where the probability that the system will perform as intended is not known with precis...
详细信息
A self-organizing, reconfigurable, and structure-less wireless network that provides intended communications without any radio infrastructure is called the mobile ad hoc network (MANETs). It is generally utilized in s...
详细信息
A self-organizing, reconfigurable, and structure-less wireless network that provides intended communications without any radio infrastructure is called the mobile ad hoc network (MANETs). It is generally utilized in special outside occasions, locations, military surgeries, and natural disasters. In MANET, providing security is the primary issue because of the adoption of network structures. Moreover, the modifications in dynamic topologies expose the strike selection, such as routing, eavesdropping, and alteration of several programs. If MANET has several privacy and security issues, then it may surpass the quality of services (QoS). Hence, the security in MANET is guaranteed by using intrusion tracking approaches. This intrusion tracking system regulates the MANET in recognizing some other violation weaknesses. High protections are provided by detecting intrusions from the entire network, which includes attacks that are beyond the network layer. The nodes are not merely altered by the power collapse in the system, but it is also capable of transferring the packets in the network, which depends on the total system life. An effective routing protocol is designed to select the optimal paths for enhancing navigation in MANETs. Moreover, the terms secure routing and energy efficiency are critical problems when changing the network topology and limiting resources with this kind of network. A hybridized optimization-aided routing strategy is offered in this research work to provide an energy-efficient routing protocol. At the initial stage, the experimentation is conducted based on the sensor nodes in MANET. Since the existing models are ineffective in achieving high energy efficiency, the new routing protocol is developed by proposing the hybrid optimization algorithm. Accordingly, the suggested work is regarded for optimizing the shortest path in the routing model by using the Hybrid Sailfish Optimizer and Whale Optimization Algorithm (HS-WOA). To validate the network e
The inverse eigenvalue problem studies the possible spectra among matrices whose off-diagonal entries have their zero-nonzero patterns described by the adjacency of a graph G. In this paper, we refer to the i-nullity ...
详细信息
This paper is concerned with a link between inductive inference and dynamic epistemic logic. The bridge was first introduced in [20, 21, 22]. We present a synthetic view on subsequent contributions: inductive truth-tr...
详细信息
To solve conservation laws,efficient schemes such as essentially nonoscillatory(ENO)and weighted ENO(WENO)have been introduced to control the Gibbs *** on radial basis functions(RBFs)with the classical WENO-JS weights...
详细信息
To solve conservation laws,efficient schemes such as essentially nonoscillatory(ENO)and weighted ENO(WENO)have been introduced to control the Gibbs *** on radial basis functions(RBFs)with the classical WENO-JS weights,a new type of WENO schemes has been proposed to solve conservation laws[*** et al.,***.,70(2017),pp.551–575].The purpose of this paper is to introduce a new formulation of conservative finite difference RBFWENO schemes to solve conservation *** the usual method for reconstructing the flux functions,the flux function is generated directly with the conservative *** with Guo and Jung(2017),the main advantage of this framework is that arbitrary monotone fluxes can be employed,while in Guo and Jung(2017)only smooth flux splitting can be used to reconstruct flux *** 1D and 2D benchmark problems are prepared to demonstrate the good performance of the new scheme.
In this paper we give a new, efficient algorithm for computing curve skeletons, based on local separators. Our efficiency stems from a multilevel approach, where we solve small problems across levels of detail and com...
详细信息
Demand-side flexibility as a new source of ancillary services is attracting growing attention. Aggregation and coordination mechanisms are needed to efficiently use the demand side flexibility. This paper proposes a n...
详细信息
In view of the problems faced during the ongoing development of public transport, such as departure intervals that are too long, low occupancy rates, difficulties making a profit, and high express delivery costs, bus ...
详细信息
Urban Green Space (UGS) plays a vital role in maintaining the balance of urban ecosystems. In Yogyakarta City, urban development and an increase in population accompanied by a decrease and insufficiency in the proport...
详细信息
暂无评论