作者:
Urszula StańczykDepartment of Graphics
Computer Vision and Digital Systems Faculty of Automatic Control Electronics and Computer Science Silesian University of Technology Akademicka 2A 44-100 Gliwice Poland
Relative or decision reducts belong with mechanisms dedicated to feature selection, and they are embedded in rough set approach to data processing. Algorithms for reduct construction typically aim at dimensionality re...
详细信息
Relative or decision reducts belong with mechanisms dedicated to feature selection, and they are embedded in rough set approach to data processing. Algorithms for reduct construction typically aim at dimensionality reduction aspect, searching for smallest reducts, which are considered as the most advantageous from the point of view of knowledge representation. However, classifiers build on reduced data models, based on reducts, can significantly vary in performance. Therefore, to ensure quality of predictions, other characteristics of reducts, apart from their cardinalities, need to be taken into account. The paper presents research in which estimation of reduct quality through their characteristics was reflected in calculation of the proposed weighting factors leading to attribute rankings. These rankings were next employed in the process of filtering decision rules, inferred by classic rough set approach. Constructed rule-based classifiers were applied in the stylometric domain to solve a task of authorship attribution.
Cybersecurity has in recent years emerged as a paramount concern in the design and operation of industrial systems and civil infrastructures, due mainly to their susceptibility to malicious cyber attacks which take ad...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
Cybersecurity has in recent years emerged as a paramount concern in the design and operation of industrial systems and civil infrastructures, due mainly to their susceptibility to malicious cyber attacks which take advantage of the vulnerability of communication networks and IT devices. In this paper, we investigate such an attack and counter attack scenario by considering multiagent systems, a somewhat basic prototype of cyberphysical systems. We study false data injection attacks launched on the agent sensors, and possible defense of such attacks at the agent actuators. The primary issue under consideration is the stealthiness of the attacks, while steering a multiagent system away from its consensual state. We propose a metric to quantify the stealthiness, and formulate the stealthiness problem as one of zero-sum games. We solve the problem explicitly, which gives rise to a fundamental bound on the stealthiness achievable, and as well optimal attack and defense strategies that achieve the optimal stealthiness, both of which can be obtained in terms of certain augmented controllability Gramians associated with the agents. The stealthiness bound is seen to depend on agent dynamics and network characteristics including a measure of connectivity.
In this article we corrected the trilinear formula for triple disjoint matrix multiplication given in the article ‘J. Laderman, V. Pan, X. H. Sha, On practical Algorithms for Accelerated Matrix Multiplication, Linear...
详细信息
Detecting anomalies in satellite telemetry data is pivotal in ensuring its safe operations. Although there exist various data-driven techniques for the task of determining abnormal parts of the signal, they are virtua...
详细信息
It is well known that nowadays children tend to spend lot of time playing games on mobile devices at the expense of reading books. The current research aims to explore ways to design and develop a mobile application, ...
It is well known that nowadays children tend to spend lot of time playing games on mobile devices at the expense of reading books. The current research aims to explore ways to design and develop a mobile application, attractive for children, that uses voice recognition technology and gamification techniques to help children read more and better and to track the progress of reading. The application is implemented with Flutter, Dart and Firebase and is addressed to children, the books being made available in encyclopedia format. By integrating technologies such as NLP and gamification the application aims to improve reading fluency among children, but also to give them the opportunity to accumulate new and exciting information in the same time.
Interconnections between AC power systems,power transmission with higher efficiency,and aggregation and delivery of power from offshore wind farms to different AC regions are among the main drivers for the development...
详细信息
Interconnections between AC power systems,power transmission with higher efficiency,and aggregation and delivery of power from offshore wind farms to different AC regions are among the main drivers for the development of HVDC *** grids can result in lower demand variability,higher flexibility,superior electricity market management,and higher economic *** is expected that isolated HVDC systems transition to an HVDC grid that overlays the existing AC *** a substantial development also results in a number of critical technical challenges related to system control,operation,and protection,which should be properly and accurately *** Special Issue focuses on the recent achievements and advancements in overcoming these *** papers for publications in this Special Issue fall into four major topics:devices,control,operation,and protection.
This work presents the results of the examination of the HeLa cell line exposure on the ELF-EMF (extremely low-frequency electromagnetic field). In particular, the relationship between ELF-EMF exposition time and cell...
详细信息
ISBN:
(数字)9798350372359
ISBN:
(纸本)9798350372366
This work presents the results of the examination of the HeLa cell line exposure on the ELF-EMF (extremely low-frequency electromagnetic field). In particular, the relationship between ELF-EMF exposition time and cell death. The examination of cell death hallmarks were examined by estimation levels of selected proteins - FACL4 (a protein that is a part of the ferroptosis pathway) and CK18 (Cytokeratin related to necrosis and apoptosis pathways) in the proposed model of workers exposed to ELF-EMF week.
Multiple VAVs can perform certain large-scale tasks by constructing VA V clusters in practical applications since its excellent performance such as strong operability and composability. However, it is difficult to det...
详细信息
In the context of DOORS, a medium-scale distributed system, running on tens of 'normal PCs and/or embedded devices, we propose a solution for the problem of efficient allocation of execution and storage resources....
详细信息
The amount of data generated daily grows tremendously in virtually all domains of science and industry, and its efficient storage, processing and analysis pose significant practical challenges nowadays. To automate th...
详细信息
暂无评论