The paper demonstrates for the first time that a brain-inspired spiking neural network (SNN) architecture can be used not only to learn spatio-temporal data, but also to extract fuzzy spatio-temporal rules from such d...
详细信息
The transferable belief model, as a semantic interpretation of Dempster-Shafer theory, enables agents to perform reasoning and decision making in imprecise and incomplete environments. The model offers distinct semant...
详细信息
The paper considers a mathematical model for managing a scientific digital ecosystem exemplified by the agriculture case; the model enables assessing the impact science exerts on the regions’ socioeconomic position i...
The paper considers a mathematical model for managing a scientific digital ecosystem exemplified by the agriculture case; the model enables assessing the impact science exerts on the regions’ socioeconomic position in order to build an adequate response to the advanced economies’ regime of severe sanctions against Russia. For these purposes, a systemic analysis of the subject identification and classification of ecosystems was conducted to address the critical issue of determining the basic concepts and terms of the country’s digitalization.
As the concept of smart cities continues to gain momentum, the integration of various technologies has become essential for creating sustainable and efficient urban environments. However, with the proliferation of int...
As the concept of smart cities continues to gain momentum, the integration of various technologies has become essential for creating sustainable and efficient urban environments. However, with the proliferation of interconnected devices and systems, the risk of network security threats has increased significantly. This research article aims to identify and analyze the main threats to network security in smart cities. By exploring the potential vulnerabilities and challenges posed by the interconnected infrastructure, this study provides insights into the key areas that require attention to ensure the resilience and protection of smart cities. The findings of this research emphasize the need for robust security measures and proactive strategies to mitigate the identified threats.
In practical applications of deep learning, as the demand for the modeling capability increases, the network size may need to be massively enlarged in response. This may form a significant challenge in practice, espec...
详细信息
In Edge Computing (EC), containers have been increasingly used to deploy applications to provide mobile users services. Each container must run based on a container image file that exists locally. However, it has been...
详细信息
Gigapixel image analysis, particularly for whole slide images (WSIs), often relies on multiple instance learning (MIL). Under the paradigm of MIL, patch image representations are extracted and then fixed during the tr...
详细信息
Computational models of neurodegeneration aim to emulate the evolving pattern of pathology in the brain during neurodegenerative disease, such as Alzheimer’s disease. Previous studies have made specific choices on th...
详细信息
Because of the complicated mechanism of ankle injury, it is very difficult to diagnose ankle fracture in clinic. In order to simplify the process of fracture diagnosis, an automatic diagnosis model of ankle fracture w...
详细信息
暂无评论