A polydyne cam and knife follower system are studied. The effect of cam angular velocity and follower guides internal dimensions on Lyapunov parameter is considered. Wolf algorithm is used to quantify largest Lyapunov...
详细信息
Converting source codes to feature vectors can be useful in programming-related tasks, such as plagiarism detection on ACM contests. We present a brand-new method for feature extraction from C++ files, which includes ...
详细信息
Converting source codes to feature vectors can be useful in programming-related tasks, such as plagiarism detection on ACM contests. We present a brand-new method for feature extraction from C++ files, which includes both features describing syntactic and lexical properties of an AST tree and features characterizing disassembly of source code. We propose a method for solving the plagiarism detection task as a classification problem. We prove the effectiveness of our feature set by testing on a dataset that contains50 ACM problems and ~90 k solutions for them. Trained xgboost model gets a relative binary f1-score=0.745 on the test set.
A developed adaptive forecasting model for cloud resource allocation is presented. It employs principal component analysis on a sequence of virtual machine (VM) requests. Requests are processed to detect anomalies, an...
A developed adaptive forecasting model for cloud resource allocation is presented. It employs principal component analysis on a sequence of virtual machine (VM) requests. Requests are processed to detect anomalies, and adaptive predictions are computed using EEMD-ARIMA or EEMD-RT-ARIMA methods. The choice between EEMD-ARIMA and EEMD-RT-ARIMA methods is determined by comparing the execution time values ${\mathrm {R}}_{\mathrm {{i}}}$ (sequential series test) with the threshold value ${\mathrm {R}}_{\mathrm {{t d}}}$. If ${\mathrm {R}}_{\mathrm {{i}}} \gt {\mathrm {Rtd}}$, EEMD-ARIMA is used; if ${\mathrm {R}}_{\mathrm {{i}}} \leq {\mathrm {R}}_{\mathrm {{t d}}}$, EEMD-RT-ARIMA is applied. This adaptive approach enables the selection of a prediction method based on data characteristics and resource demands. To optimize the selection of the ${\mathrm {R}}_{\mathrm {{t d}}}$ threshold, the impact on accuracy and time costs is examined. A quartile method is utilized to detect dynamic spikes, and cubic spline interpolation is employed to smooth data. EEMDRT-ARIMA-based forecasting enhances accuracy through preprocessing of dynamic spikes and adaptive method selection. Calculations of time costs indicate that this method reduces forecasting time by 1.5 times by extracting core component sequences.
An article presents an approach for cyberattack detection based on genetic algorithms is presented. The method allows detecting both known and unknown cyberattacks. The method has the heuristic nature and is based on ...
ISBN:
(数字)9781728199573
ISBN:
(纸本)9781728199580
An article presents an approach for cyberattack detection based on genetic algorithms is presented. The method allows detecting both known and unknown cyberattacks. The method has the heuristic nature and is based on the collected data about the cyberattacks. It makes it possible to give an answer about the cyberattacks' existence in the computer networks and its hosts. Developed attack detection approach consists of training and detection stages. The mechanism of attack detection system is based on the cyberattacks' features gathering from network or hosts, extracting the subset of acquired set and generation the attacks' detection rules. Genetic algorithms are used for the minimization of the feature set, which allows effective using of the system resources for attacks detection. In order to detect the attacks, the proposed technique involves the rule generation. The attacks' features are described by the set of sub-rules. It is suggested to use the feature with the smallest domain for generating the minimal set for rules. It is possible to select the optimal feature after all selected features which were discovered while applying the genetic algorithm. The sub-rule set is used with the aim to reduce false positive rate.
A solution for the problem of controlling the unmanned quadrotor vehicles group flight in presence of obstacles of complex form is proposed. A traditional approach to construction of the target function does not solve...
详细信息
Major challenge in the analysis of clinical data and knowledge discovery is to suggest an integrated, advanced and efficient tools, methods and technologies for access and processing of progressively increasing amount...
详细信息
In recent years, with the continuous growth of social and economic level, people's living standard has also been constantly improved. Under this background, contemporary people highly respect a good living environ...
In recent years, with the continuous growth of social and economic level, people's living standard has also been constantly improved. Under this background, contemporary people highly respect a good living environment, and the importance of building interior decoration engineering has been fully reflected. As one of the important design contents of interior decoration, the use level and effect of color will directly affect the overall visual effect of interior decoration and the comfort of interior space. Through the rational collocation of colors, the artistic characteristics of interior decoration can be displayed, which can also show the important role of color in interior decoration. In modern interior decoration, the use of colors is gradually enriched, and the use of multiple colors leads to the problem of actual color matching. Image segmentation, which is the premise of image recognition and tracking, divides an image into regions with different characteristics and extracts interesting objects. This technology has been widely used in military affairs, medicine, intelligent transportation, pedestrian detection, product inspection, sports, remote sensing, machine vision and other fields. Therefore, good color matching is very important in the actual interior decoration practice.
The methods of nonlinear adaptation based on an analytical design of aggregated regulators and modal control are discussed for solving the problem of nonlinear control over a robotic arm operating under the conditions...
详细信息
The Hamming neural network is an effective tool for solving the problems of recognition and classification of discrete objects whose components are encoded with the binary bipolar alphabet, and the difference between ...
详细信息
ISBN:
(数字)9781728193526
ISBN:
(纸本)9781728193533
The Hamming neural network is an effective tool for solving the problems of recognition and classification of discrete objects whose components are encoded with the binary bipolar alphabet, and the difference between the number of identical bipolar components of the compared objects (vectors images) and the Hamming distance between them (Hamming distance is the number of mismatched bits in the binary vectors being compared) is used as the objects proximity measures. However, the Hamming neural network cannot be used to solve these problems in case the components of the compared objects (vectors) are encoded with the binary alphabet. It also cannot be used to evaluate the affinity (proximity) of objects (binary vectors) with Jaccard, Sokal and Michener, Kulzinsky functions, etc. In this regard, a generalized Hamming neural network architecture has been developed. It consists of two main blocks, which can vary being relatively independent on each other. The first block, consisting of one layer of neurons, calculates the proximity measures of the input image and the reference ones stored in the neuron relations weights of this block. Unlike the Hamming neural network, this block can calculate various proximity measures and signals about the magnitude of these proximity measures from the output of the first block neurons which are followed to the inputs of the second block elements. In the Hamming neural network, the Maxnet neural network is used as the second block, which gives out one maximum signal from the outputs of the first block neurons. If the inputs of the Maxnet network receive not only one but several identical maximum signals, then the second block, and, consequently, the Hamming network, cannot recognize the input vector, which is at the same minimum Hamming distance from two or more reference images stored in the first block. The proposed generalized architecture of the Hamming neural network allows using neural networks instead of the Maxnet network, whi
This research focuses on hyperparameter optimization for LSTM to forecast SARS-CoV-2 infection cases in the Russian Federation, aiming to determine the best combination of parameters for a well-fitting model. Using L...
This research focuses on hyperparameter optimization for LSTM to forecast SARS-CoV-2 infection cases in the Russian Federation, aiming to determine the best combination of parameters for a well-fitting model. Using LSTM’s capability to analyze relationships within time series data, a bidirectional LSTM-based method is introduced for predicting daily infection cases. The study evaluates nearly 10 unique forecasting models and conducts a comprehensive analysis and comparison of their results. The Bidirectional LSTM model proves to be a reliable approach for forecasting daily SARS-CoV-2 infection cases in Russia, displaying the highest prediction accuracy among the tested models.
暂无评论