The theory of intuitionistic fuzzy sets (IFSs) plays an essential role to deal with uncertainty and ambiguity. However, the IFSs deal only with anticipation, not periodicity. But, complex IFSs (CIFS) can handle both u...
详细信息
Remote monitoring of objects or technological processes is used in many industries and service-oriented companies to obtain up-to-date information about the state of things or technical processes. The article is devot...
详细信息
The report presents the results of a comparative analysis of methods for parameterization of cognitive models based on the use of fuzzy set theory and antonym logic. Reasoned expediency of using methods of the logic o...
详细信息
ISBN:
(数字)9798350384499
ISBN:
(纸本)9798350384505
The report presents the results of a comparative analysis of methods for parameterization of cognitive models based on the use of fuzzy set theory and antonym logic. Reasoned expediency of using methods of the logic of antonyms in the construction and research of cognitive models of weakly structured situations. An approach to calculating the magnitudes of the indirect and total influence of factors on each other in certain types of cognitive models built based on the logic of antonyms is proposed.
The report proposes a dynamic routing method for Self-healing Networks (ShN). The method takes into account the specific features of ShN. During routing, the flow of service information is reduced. The search for the ...
详细信息
ISBN:
(数字)9798350384499
ISBN:
(纸本)9798350384505
The report proposes a dynamic routing method for Self-healing Networks (ShN). The method takes into account the specific features of ShN. During routing, the flow of service information is reduced. The search for the optimal route is carried out using a convolutional neural network. The method significantly outperforms existing methods when some network nodes fail.
The process of unsteady flow of a single-phase liquid in a cylindrical reservoir arising under the elastic mode of reservoir development is considered. To describe this process, a power law of filtration is proposed f...
The process of unsteady flow of a single-phase liquid in a cylindrical reservoir arising under the elastic mode of reservoir development is considered. To describe this process, a power law of filtration is proposed for a single-phase flow in a porous medium. Within the framework of the proposed model, the task of identifying one parameter of the model characterizing the simulated reservoir system is set. To construct a discrete analog of the inverse problem, the finite difference method is used using an explicit–implicit approximation in time. To solve the resulting system of nonlinear equations, a special representation is proposed that allows reducing the nonlinear system to two independent systems of linear equations. As a result, an explicit formula is obtained for determining the approximate value of the desired reservoir parameter. Based on the proposed method, numerical experiments were carried out for model problems.
In pattern recognition, depending on how the training sample is represented, a theory associated with the standard representation of the training sample (information) and the structural theory are distinguished. In th...
详细信息
ISBN:
(数字)9798350399202
ISBN:
(纸本)9798350399202
In pattern recognition, depending on how the training sample is represented, a theory associated with the standard representation of the training sample (information) and the structural theory are distinguished. In the first case it is convenient to set and describe objects that are independent of each other, objects that have a rigid, static nature. In the second case, when information is specified in a structural way, it is convenient to study, describe and recognize objects whose basis presents an invariable internal or external structure. This paper considers a fundamentally different case of setting learning information. It deals with objects and processes that are based on conflict. Such features are peculiar to the data sets that an unmanned vehicle receives while driving, which requires minute-by-minute formation and decision-making in the context of the current traffic situation. Naturally, it is necessary to involve game-theoretic models to describe conflicts. It is these issues, i.e., the systematic study of game-theoretic models in the problems of recognition and classification, that the work is devoted to. It is emphasized that the classification of recognizable objects, as some speculative system, must meet the requirements of sufficiency of grounds and coverage of the totality of existing and possible recognizable objects. The most important purpose of classification is to describe the properties of its classes and subclasses, types and subspecies of recognized objects, which makes it possible for it to be used for recognizing specific objects, which subjects encounter in certain areas of activity. The paper introduces the concept of stable classification, formulates and proves the theorems based on the introduced concept, the sufficiency of the conditions for the correctness of the algorithm of pattern recognition, using the game-theoretic approach and evaluation of the degree of stability of the classification underlying it. The generated theorems a
Chronic back pain can present a serious health concern, with symptoms that can significantly affect an individual's well-being, mobility, and overall quality of life over an extended period. While chronic back pai...
详细信息
Evaluating student performance is important for universities and institutions in the current student education landscape because it helps them create models that work better for students. The automation of various fea...
详细信息
The subject of the study is methods of balancing raw data. The purpose of the article is to improve the quality of intrusion detection in computer networks by using class balancing methods. Task: to investigate method...
The subject of the study is methods of balancing raw data. The purpose of the article is to improve the quality of intrusion detection in computer networks by using class balancing methods. Task: to investigate methods of balancing classes and to develop a classification method on imbalanced data to increase the level of network security. The methods used are: methods of artificial intelligence, machine learning. The following results were obtained: Class balancing methods based on Undersampling, Oversampling and their combinations were studied. The following methods were chosen for further research: SMOTEENN, SVMSMOTE, BorderlineSMOTE, ADASYN, SMOTE, KMeansSMOTE. The UNSW-NB 15 set was used as the source data, which contains information about the normal functioning of the network and during intrusions. A decision tree based on the CART (Classification And Regression Tree) algorithm was used as the basic classifier. According to the research results, it was found that the use of the SMOTEENN method provides an opportunity to improve the quality of detection of intrusions in the functioning of the network. Conclusions. The scientific novelty of the obtained results lies in the complex use of data balancing methods and the method of data classification based on decision trees to detect intrusions into computer networks, which made it possible to reduce the number of Type II errors.
暂无评论