Inspired by the visual system of the fruit fly, we had created a generic building block for neuromorphic hardware that is vital for third generation neural networks. This enables time delay to be parametrized in a che...
详细信息
Peculiarities of constructing ensemble bagging classifiers for identifying the state of a computer system under conditions of noisy data are studied. Decision trees and multilayer perceptron were used as basic classif...
详细信息
A particular problem in using artificial intelligence techniques in the sensor grid is the high power consumption. Remote sensors are usually limited by the amount of power available, thus our general goal is to minim...
详细信息
A growing range of data sets have been created in recent years; these are used by platforms and software applications and kept in remote access repositories. Datasets are therefore more susceptible to harmful attacks....
详细信息
ISBN:
(数字)9798350365856
ISBN:
(纸本)9798350365863
A growing range of data sets have been created in recent years; these are used by platforms and software applications and kept in remote access repositories. Datasets are therefore more susceptible to harmful attacks. As a result, network security in data transmission is becoming a more important area of study. One well-known method for safeguarding computer systems is the deployment of intrusion detection systems. This study proposes an artificial intelligence based method for data analysis-based anomaly detection. Methods based on machine learning and rules are mixed together. The right rules are created via a genetic algorithm. Relevant features are extracted using principal component analysis with the goal of enhancing performance. The KDD Cup 1999 dataset is used to empirically validate the suggested procedure, satisfying the criterion of using appropriate data. Using the well-known benchmark dataset, the suggested approach is used to identify and examine four different kinds of attacks: Neptune, Ipsweep, Pod, and Teardrop. During the machine learning phase, the data is categorized into categories of attacks and normal behavior after the features set during the training phase are tested. For the purpose of data analysis, the input data is divided into training and testing sets for an artificial neural network. The first 80% of the data are used to train the neural network, and the remaining 20% are used for testing. The estimated accuracy improves with the number of epochs and is higher for training data and lower for validation test data, according to experimental results. Consequently, the trained model can be retained and used to detect discrepancies. The learnt model is used to the system to compute new input parameters that are not used during training or validation.
Data gathering is an active research topic for wireless sensor networks WSNs with internet of things IoTs. Optimal data gathering enables collecting sensor data efficiently with minimum cost and energy consumption for...
详细信息
Medical image quality is very important. High quality ensures the standard of medical diagnosis, treatment, and patient life through health care or automated intelligence systems for medical diagnosis, monitoring, and...
详细信息
ISBN:
(数字)9798350353358
ISBN:
(纸本)9798350353365
Medical image quality is very important. High quality ensures the standard of medical diagnosis, treatment, and patient life through health care or automated intelligence systems for medical diagnosis, monitoring, and treatment. The computing difficulties in processing medical images are discussed in the study. Proposing parallel computational models and program implementations based on medical image filtering techniques is one of the main issues. A filter-based parallel computational model is designed. Implementing a multithreaded parallel program verifies the suggested parallel model. An analysis of the effectiveness of medical image filters using a parallel multithreaded computer implementation that generates output images for each type of applied filter and applies filters on a list of compressed medical images. The BlackAndWhiteFilter, UVFilter, BinaryThresholdFilter, and RobertFilter have been applied. Experimental estimates have been analysed for the parallel performance metrics execution time and speedup. The performance estimation and scalability analyses demonstrate the strong scalability of the proposed solution.
An analysis of modern computer network intrusion detection systems was carried out. The application of machine and deep learning methods for classification problems has been investigated. The UNSW-NB15 dataset, develo...
详细信息
Technology advancements have transformed medical science and practice, leading to the vast gathering of a wide range of medical data. Medical researchers use artificial intelligence techniques extensively because they...
详细信息
ISBN:
(数字)9798350349832
ISBN:
(纸本)9798350349849
Technology advancements have transformed medical science and practice, leading to the vast gathering of a wide range of medical data. Medical researchers use artificial intelligence techniques extensively because they enable the identification and creation of models of complicated datasets and the interactions between them. This, in turn, enables the successful prediction of future outcomes associated with a specific sickness type. An artificial intelligence-based approach to healthcare data analytics is presented, which leverages data to build a desired model and solve a particular issue. The suggested approach for healthcare data analytics uses a random forest and feedforward artificial neural network with two hidden layers as its basis to get the best model.
orthogonal and quasi-orthogonal matrices with a limited number of element values and structured in some way are of considerable interest for many technical applications related to image processing and signal coding. T...
详细信息
An important marketing strategy of automotive manufacturers is to promote high-quality products by extending warranty periods, which inevitably generates additional costs. In general, different loads on a control unit...
详细信息
暂无评论