In this research we analyzed EEG signals to classify motor planning and execution phases during a set of motor learning task. We began by preprocessing the EEG data and then displaying topographical plots (topoplots) ...
详细信息
ISBN:
(数字)9798331529710
ISBN:
(纸本)9798331529727
In this research we analyzed EEG signals to classify motor planning and execution phases during a set of motor learning task. We began by preprocessing the EEG data and then displaying topographical plots (topoplots) of different frequency bands of EEG data to classify the phases. Afterward, we tested convolutional neural network (CNN) models, ResNet18 and EfficientNet to further enhance the processing and classification of the EEG signals. The CNN models were examined based on performance measures like accuracy, precision, recall, and F1-score. Primary findings suggested that ResNet-18 and EfficientNet models successfully distinguished the motor planning and execution phases, particularly EfficientNet presented better results. This study highlights the utilization of deep learning models as a potential way to classify EEG signals. This will help us to understand motor learning in humans better. Ultimately, after classifying the phases, we proceeded to classifing different drawn patterns and identify them using these two models. For classifying the phases using ResNet18 and EfficientNet networks, we managed to achieve accuracies of $86.3 \%$ and $89.2 \%$, respectively. Additionally, for pattern classification, accuracies of $\mathbf{8 7. 9 \%}$ for ResNet18 and $\mathbf{9 6. 9 \%}$ for EfficientNet were obtained.
As an essential function of encrypted Internet traffic analysis,encrypted traffic service classification can support both coarse-grained network service traffic management and security ***,the traditional plaintext-ba...
详细信息
As an essential function of encrypted Internet traffic analysis,encrypted traffic service classification can support both coarse-grained network service traffic management and security ***,the traditional plaintext-based Deep Packet Inspection(DPI)method cannot be applied to such a ***,machine learning-based existing methods encounter two problems during feature selection:complex feature overcost processing and Transport Layer Security(TLS)version *** this paper,we consider differences between encryption network protocol stacks and propose a composite deep learning-based method in multiprotocol environments using a sliding multiple Protocol Data Unit(multiPDU)length sequence as features by fully utilizing the Markov property in a multiPDU length sequence and maintaining suitability with a TLS-1.3 *** experiments show that both Length-Sensitive(LS)composite deep learning model using a capsule neural network and LS-long short time memory achieve satisfactory effectiveness in F1-score and *** to faster feature extraction,our method is suitable for actual network environments and superior to state-of-the-art methods.
Recently,smart cities have emerged as an effective approach to deliver high-quality services to the people through adaptive optimization of the available *** the advantages of smart cities,security remains a huge chal...
详细信息
Recently,smart cities have emerged as an effective approach to deliver high-quality services to the people through adaptive optimization of the available *** the advantages of smart cities,security remains a huge challenge to be ***,Intrusion Detection System(IDS)is the most proficient tool to accomplish security in this ***,blockchain exhibits significance in promoting smart city designing,due to its effective characteristics like immutability,transparency,and *** order to address the security problems in smart cities,the current study designs a Privacy Preserving Secure Framework using Blockchain with Optimal Deep Learning(PPSF-BODL)*** proposed PPSFBODL model includes the collection of primary data using sensing ***,z-score normalization is also utilized to transform the actual data into useful ***,Chameleon Swarm Optimization(CSO)with Attention Based Bidirectional Long Short TermMemory(ABiLSTM)model is employed for detection and classification of *** is employed for optimal hyperparameter tuning of ABiLSTM *** the same time,Blockchain(BC)is utilized for secure transmission of the data to cloud *** cloud server is a decentralized,distributed,and open digital ledger that is employed to store the transactions in different methods.A detailed experimentation of the proposed PPSF-BODL model was conducted on benchmark dataset and the outcomes established the supremacy of the proposed PPSFBODL model over recent approaches with a maximum accuracy of 97.46%.
To establish a secure and dependable operational setting for practical industrial processes, it is crucial to detect incipient faults promptly and accurately. In this work, a novel data-driven process monitoring appro...
详细信息
This paper presents a comprehensive approach to accident detection using supervised and unsupervised learning methods. Our methodology encompasses data gathering, preprocessing, and dimensionality reduction, applied t...
详细信息
ISBN:
(数字)9798331515768
ISBN:
(纸本)9798331515775
This paper presents a comprehensive approach to accident detection using supervised and unsupervised learning methods. Our methodology encompasses data gathering, preprocessing, and dimensionality reduction, applied to a highly imbalanced dataset with 99.99% of instances being non-crash and 0.01% of instances being crash. We evaluate various traditional machine learning algorithms, which achieve high accuracy but fail to provide satisfactory precision, a critical metric for our application. To address this, we propose an unsupervised learning method—novelty detection—that effectively identifies crash instances without relying on labels, accurately predicting the crash events based on the provided “Crash Time.” Our results demonstrate the limitations of traditional supervised methods in this context and emphasize the potential of unsupervised learning for improved accident detection.
A graph G is edge-k-choosable if,for any assignment of lists L(e)of at least k colors to all edges e∈E(G),there exists a proper edge coloring such that the color of e belongs to L(e)for all e∈E(G).One of Vizing’s c...
详细信息
A graph G is edge-k-choosable if,for any assignment of lists L(e)of at least k colors to all edges e∈E(G),there exists a proper edge coloring such that the color of e belongs to L(e)for all e∈E(G).One of Vizing’s classic conjectures asserts that every graph is edge-(Δ+1)-*** is known since 1999 that this conjecture is true for general graphs withΔ≤*** recently,in 2015,Bonamy confirmed the conjecture for planar graph withΔ≥8,but the conjecture is still open for planar graphs with 5≤Δ≤*** confirm the conjecture for planar graphs withΔ≥6 in which every 7-cycle(if any)induces a C_(7)(so,without chords),thereby extending a result due to Dong,Liu and Li.
Existing approaches for addressing the continuation power flow problem with limits are mainly iterative and can face the serious drawbacks, e.g., the divergence, slow convergence, and ignoring or mis-computing a limit...
详细信息
As technology develops continuously, digital images are being applied more and more extensively in daily life. Digital images are mainly divided into two categories: one is the images obtained by photosensitive device...
详细信息
ISBN:
(纸本)9781510691667
As technology develops continuously, digital images are being applied more and more extensively in daily life. Digital images are mainly divided into two categories: one is the images obtained by photosensitive devices such as cameras, and the other is the images generated by software. Nevertheless, in low - light conditions, the images captured by traditional photosensitive devices typically suffer from issues like low luminance and subpar visual qualities. These problems pose significant challenges to subsequent image processing and practical applications. Thus, the technology of enhancing low - light images has emerged as a crucial research area for the purpose of elevating image quality. This paper puts forward a solution centered around the improved UNet network to address the issue of image enhancement in low - light settings. The UNet network effectively performs image enhancement through feature extraction, feature fusion, and restoration operations. However, the classical UNet can only process single - channel grayscale images, and the loss function it uses has relatively limited effects in low - light image processing. Therefore, this paper adjusts the number of channels of the UNet network so that it can process three - channel RGB images and improves the loss function. We compared the enhancement effects of L1 Loss, VGG Loss, and SmoothL1 Loss respectively, and carried out a quantitative analysis through evaluation metrics such as PSNR and SSIM. Ultimately, through the combination of the three loss functions and their weighted optimization, the enhancement effect of low - light images is notably enhanced. The innovation of this paper lies in expanding the structure of the UNet network to make it adaptable to three - channel image processing, and improving the quality of image enhancement by improving the loss function. This approach is capable of efficiently enhancing the visual impact of low - light images, thereby offering a practical solution for imag
According to the United Nations, having access to clean water for consumption is a fundamental human right. General Assembly in 2010. The importance of safe drinking water cannot be overstated. Unsafe drinking water a...
详细信息
Evolving from massive multiple-input multiple-output (MIMO) in current 5G communications, ultra-massive MIMO emerges as a seminal technology for fulfilling more stringent requirements of future 6G communications. Howe...
详细信息
暂无评论