In a congested road network, it is always desirable to find a reliable shortest path so far as travel time is concerned. Physical distance and travel time are invariably uncertain due to large-scale maintenance work, ...
详细信息
In this paper, the heat conduction equation for composite materials posed and solved. This problem is known as an inverse initial value problem for the heat conduction equation. In order to solve and formulate this in...
详细信息
the paper proposes the use of 3D convolutional neural network for recognizing user emotions on videos in a recommender system. The data approach aims to use the recognized emotion as important implicit feedback and im...
the paper proposes the use of 3D convolutional neural network for recognizing user emotions on videos in a recommender system. The data approach aims to use the recognized emotion as important implicit feedback and improve the recommendation result. This is expected to significantly improve the performance of the recommender system.
An analysis of modern computer network intrusion detection systems was carried out. The application of machine and deep learning methods for classification problems has been investigated. The UNSW-NB15 dataset, develo...
详细信息
ISBN:
(数字)9798350384499
ISBN:
(纸本)9798350384505
An analysis of modern computer network intrusion detection systems was carried out. The application of machine and deep learning methods for classification problems has been investigated. The UNSW-NB15 dataset, developed at the Australian Cyber Security Center's (ACCS) Cyber Range Laboratory, contains data on normal network operations and synthetic intrusions. Data pre-processing was performed, including class balancing using the SMOTEENN method and selection of informative features using the Recursive Feature Elimination method. The possibility of using the stacking meta-algorithm to detect intrusions into computer networks has been investigated. A new algorithm for generating packets of raw data is proposed, which generates two sets of training data: one for training basic models, the other for a meta-model. A study of the effectiveness of using Random Forest, ANN, K Nearest Neighbor methods and Support Vector Machine and Random Forest as a decision-making meta-model was conducted. The use of the stacking meta-algorithm with the proposed algorithm for forming packets of output data, as well as basic models and a meta-model, led to a significant improvement in the quality of the model. It was found that, on average, recall and f1 score increased by 55.6% and 37.4%, respectively, compared to raw data and other models.
In this paper, the optimization of safety parameters for a communication channel with the required safety integrity level (SIL) 3 at runtime is investigated. In order to guarantee the safe communication additional mea...
详细信息
orthogonal and quasi-orthogonal matrices with a limited number of element values and structured in some way are of considerable interest for many technical applications related to image processing and signal coding. T...
orthogonal and quasi-orthogonal matrices with a limited number of element values and structured in some way are of considerable interest for many technical applications related to image processing and signal coding. The paper classifies and considers cyclic matrices and matrices with cyclic blocks. Descriptions of noise-resistant encoding methods of images and their protective masking using such matrices are given. Based on the analysis of the autocorrelation functions of new code sequences obtained from strings of modified cyclic quasi-orthogonal matrices and the simulation performed, numerical values of the quality parameters of the new code sequences are given. It is shown that their application makes it possible to reduce the maximum level of the side lobe of the aperiodic autocorrelation function, which allows us to conclude that their application is promising and that signal coding algorithms can be revised.
1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information ***,distributed methods ...
详细信息
1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information ***,distributed methods also exist,such as peer-to-peer networks and distributed hash *** technology,which is decentralized,anonymous,non-tamperable and anti-attack,can be applied to covert communication to solve the problems of traditional methods and improve the quality of communication.
Actions of monoidal categories on categories, also known as actegories, have been familiar to category theorists for a long time, and yet a comprehensive overview of this topic seems to be missing from the literature....
详细信息
Over the last few years, the fields of Artificial Intelligence, Robotics and IoT have gained a lot of attention. This increasing interest has brought, among other things, to the development of autonomous multi-agent s...
详细信息
the issue of ensuring the reliability of the functioning of global systems of remote online monitoring of the condition of patients is considered. Remote monitoring is in demand when supervision the health status of d...
the issue of ensuring the reliability of the functioning of global systems of remote online monitoring of the condition of patients is considered. Remote monitoring is in demand when supervision the health status of disabled people with cardiovascular diseases, pregnant women and children. It is especially in demand in the context of a pandemic and the accompanying restrictions on movement. Monitoring is carried out “transparently” for the patient, without involving him in the subtleties of the process of interaction with a medical institution, ensuring the preservation of his mobility due to the proposed concept of implementing a wearable online monitor device. The procedures of the online monitor initialization and distribution of functions in it are considered. Threats to the normal functioning of distributed systems with online monitors are presented, including existing problems of a general nature related mainly to global communications. Solutions are offered to ensure reliable operation of wearable devices as part of online monitors.
暂无评论