In this paper, we propose feature-based federated transfer learning as a novel approach to improve communication efficiency by reducing the uplink payload by multiple orders of magnitude compared to that of existing a...
详细信息
The holomorphic embedding method(HEM)stands as a mathematical technique renowned for its favorable convergence properties when resolving algebraic systems involving complex *** key idea behind the HEM is to convert th...
详细信息
The holomorphic embedding method(HEM)stands as a mathematical technique renowned for its favorable convergence properties when resolving algebraic systems involving complex *** key idea behind the HEM is to convert the task of solving complex algebraic equations into a series expansion involving one or multiple embedded complex *** transformation empowers the utilization of complex analysis tools to tackle the original problem *** the 2010s,the HEM has been applied to steady-state and dynamic problems in power systems and has shown superior convergence and robustness compared to traditional numerical *** paper provides a comprehensive review on the diverse applications of the HEM and its variants reported by the literature in the past *** paper discusses both the strengths and limitations of these HEMs and provides guidelines for practical *** also outlines the challenges and potential directions for future research in this field.
The main role of Automatic Generation Control (AGC) is to maintain power grids frequency within specified operating limits. Due to the fact that AGC is the sole automatic feedback control loop between physical and cyb...
详细信息
With the exponential rise in global air traffic,ensuring swift passenger processing while countering potential security threats has become a paramount concern for aviation *** X-ray baggage monitoring is now standard,...
详细信息
With the exponential rise in global air traffic,ensuring swift passenger processing while countering potential security threats has become a paramount concern for aviation *** X-ray baggage monitoring is now standard,manual screening has several limitations,including the propensity for errors,and raises concerns about passenger *** address these drawbacks,researchers have leveraged recent advances in deep learning to design threatsegmentation ***,these models require extensive training data and labour-intensive dense pixelwise annotations and are finetuned separately for each dataset to account for inter-dataset ***,this study proposes a semi-supervised contour-driven broad learning system(BLS)for X-ray baggage security threat instance segmentation referred to as *** research methodology involved enhancing representation learning and achieving faster training capability to tackle severe occlusion and class imbalance using a single training routine with limited baggage *** proposed framework was trained with minimal supervision using resource-efficient image-level labels to localize illegal items in multi-vendor baggage *** specifically,the framework generated candidate region segments from the input X-ray scans based on local intensity transition cues,effectively identifying concealed prohibited items without entire baggage *** multi-convolutional BLS exploits the rich complementary features extracted from these region segments to predict object categories,including threat and benign *** contours corresponding to the region segments predicted as threats were then utilized to yield the segmentation *** proposed C-BLX system was thoroughly evaluated on three highly imbalanced public datasets and surpassed other competitive approaches in baggage-threat segmentation,yielding 90.04%,78.92%,and 59.44%in terms of mIoU on GDXray,SIXray,and Compass-XP,***,the lim
The increasing dependence on smartphones with advanced sensors has highlighted the imperative of precise transportation mode classification, pivotal for domains like health monitoring and urban planning. This research...
详细信息
The increasing dependence on smartphones with advanced sensors has highlighted the imperative of precise transportation mode classification, pivotal for domains like health monitoring and urban planning. This research is motivated by the pressing demand to enhance transportation mode classification, leveraging the potential of smartphone sensors, notably the accelerometer, magnetometer, and gyroscope. In response to this challenge, we present a novel automated classification model rooted in deep reinforcement learning. Our model stands out for its innovative approach of harnessing enhanced features through artificial neural networks (ANNs) and visualizing the classification task as a structured series of decision-making events. Our model adopts an improved differential evolution (DE) algorithm for initializing weights, coupled with a specialized agent-environment relationship. Every correct classification earns the agent a reward, with additional emphasis on the accurate categorization of less frequent modes through a distinct reward strategy. The Upper Confidence Bound (UCB) technique is used for action selection, promoting deep-seated knowledge, and minimizing reliance on chance. A notable innovation in our work is the introduction of a cluster-centric mutation operation within the DE algorithm. This operation strategically identifies optimal clusters in the current DE population and forges potential solutions using a pioneering update mechanism. When assessed on the extensive HTC dataset, which includes 8311 hours of data gathered from 224 participants over two years. Noteworthy results spotlight an accuracy of 0.88±0.03 and an F-measure of 0.87±0.02, underscoring the efficacy of our approach for large-scale transportation mode classification tasks. This work introduces an innovative strategy in the realm of transportation mode classification, emphasizing both precision and reliability, addressing the pressing need for enhanced classification mechanisms in an eve
In the construction industry,to prevent accidents,non-destructive tests are necessary and *** impedance tomography is a new technology in non-invasive imaging in which the image of the inner part of conductive bodies ...
详细信息
In the construction industry,to prevent accidents,non-destructive tests are necessary and *** impedance tomography is a new technology in non-invasive imaging in which the image of the inner part of conductive bodies is reconstructed by the arrays of external electrodes that are connected on the periphery of the *** equipment is cheap,fast,and edge *** this imaging method,the image of electrical conductivity distribution(or its opposite;electrical impedance)of the internal parts of the target object is *** image reconstruction process is performed by injecting a precise electric current to the peripheral boundaries of the object,measuring the peripheral voltages induced from it and processing the collected *** an electrical impedance tomography system,the voltages measured in the peripheral boundaries have a non-linear equation with the electrical conductivity *** paper presents a cheap electrical Impedance Tomography(EIT)instrument for detecting impurities in the concrete.A voltage-controlled current source,a micro-controller,a set of multiplexers,a set of electrodes,and a personal computer constitute the structure of the *** conducted tests on concrete with impurities show that the designed EIT system can reveal impurities with a good accuracy in a reasonable time.
This study explores the development of a self-driving car using a combination of deep learning (DL), machine learning (ML), computer vision (CV), and convolutional neural networks (CNN). The proposed system aims to si...
详细信息
Intrusion detection is critical to guaranteeing the safety of the data in the *** though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristic...
详细信息
Intrusion detection is critical to guaranteeing the safety of the data in the *** though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristics are becoming increasingly complicated,posing significant hurdles to intrusion *** challenges in terms of false positives,false negatives,low detection accuracy,high running time,adversarial attacks,uncertain attacks,*** to insecure Intrusion Detection System(IDS).To offset the existing challenge,the work has developed a secure Data Mining Intrusion detection system(DataMIDS)framework using Functional Perturbation(FP)feature selection and Bengio Nesterov Momentum-based Tuned Generative Adversarial Network(BNM-tGAN)attack detection *** data mining-based framework provides shallow learning of features and emphasizes feature engineering as well as ***,the IDS data are analyzed for missing values based on the Marginal Likelihood Fisher Information Matrix technique(MLFIMT)that identifies the relationship among the missing values and attack *** on the analysis,the missing values are classified as Missing Completely at Random(MCAR),Missing at random(MAR),Missing Not at Random(MNAR),and handled according to the ***,categorical features are handled followed by feature scaling using Absolute Median Division based Robust Scalar(AMDRS)and the Handling of the imbalanced *** selection of relevant features is initiated using FP that uses‘3’Feature Selection(FS)techniques i.e.,Inverse Chi Square based Flamingo Search(ICS-FSO)wrapper method,Hyperparameter Tuned Threshold based Decision Tree(HpTT-DT)embedded method,and Xavier Normal Distribution based Relief(XavND-Relief)filter ***,the selected features are trained and tested for detecting attacks using *** Experimental analysis demonstrates that the introduced DataMIDS framework produces an accurate diagnosis about the
The goal of this study is to build a self-driving robot that can effectively navigate mazes by utilizing sophisticated computer vision algorithms with ROS2. Fusion 360 is used to create the robot model, and ROS2 launc...
详细信息
Most blockchain systems currently adopt resource-consuming protocols to achieve consensus between miners;for example,the Proof-of-Work(PoW)and Practical Byzantine Fault Tolerant(PBFT)schemes,which have a high consumpt...
详细信息
Most blockchain systems currently adopt resource-consuming protocols to achieve consensus between miners;for example,the Proof-of-Work(PoW)and Practical Byzantine Fault Tolerant(PBFT)schemes,which have a high consumption of computing/communication resources and usually require reliable communications with bounded ***,these protocols may be unsuitable for Internet of Things(IoT)networks because the IoT devices are usually lightweight,battery-operated,and deployed in an unreliable wireless ***,this paper studies an efficient consensus protocol for blockchain in IoT networks via reinforcement ***,the consensus protocol in this work is designed on the basis of the Proof-of-Communication(PoC)scheme directly in a single-hop wireless network with unreliable communications.A distributed MultiAgent Reinforcement Learning(MARL)algorithm is proposed to improve the efficiency and fairness of consensus for miners in the blockchain *** this algorithm,each agent uses a matrix to depict the efficiency and fairness of the recent consensus and tunes its actions and rewards carefully in an actor-critic framework to seek effective *** results from the simulation show that the fairness of consensus in the proposed algorithm is guaranteed,and the efficiency nearly reaches a centralized optimal solution.
暂无评论