The Nong Han Chaloem Phrakiat Lotus Park is a tourist attraction and a source of learning regarding lotus ***,as a training area,it lacks appeal and learning motivation due to its conventional presentation of informat...
详细信息
The Nong Han Chaloem Phrakiat Lotus Park is a tourist attraction and a source of learning regarding lotus ***,as a training area,it lacks appeal and learning motivation due to its conventional presentation of information regarding lotus *** current study introduced the concept of smart learning in this setting to increase interest and motivation for *** neural networks(CNNs)were used for the classification of lotus plant species,for use in the development of a mobile application to display details about each *** scope of the study was to classify 11 species of lotus plants using the proposed CNN model based on different techniques(augmentation,dropout,and L2)and hyper parameters(dropout and epoch number).The expected outcome was to obtain a high-performance CNN model with reduced total parameters compared to using three different pre-trained CNN models(Inception V3,VGG16,and VGG19)as *** performance of the model was presented in terms of accuracy,F1-score,precision,and recall *** results showed that the CNN model with the augmentation,dropout,and L2 techniques at a dropout value of 0.4 and an epoch number of 30 provided the highest testing accuracy of *** best proposed model was more accurate than the pre-trained CNN models,especially compared to Inception *** addition,the number of total parameters was reduced by approximately 1.80–2.19 *** findings demonstrated that the proposed model with a small number of total parameters had a satisfactory degree of classification accuracy.
Advancements in neuromorphic computing have given an impetus to the development of systems with adaptive behavior,dynamic responses,and energy efficiency *** charge-based or emerging memory technologies such as memris...
详细信息
Advancements in neuromorphic computing have given an impetus to the development of systems with adaptive behavior,dynamic responses,and energy efficiency *** charge-based or emerging memory technologies such as memristors have been developed to emulate synaptic plasticity,replicating the key functionality of neurons—integrating diverse presynaptic inputs to fire electrical impulses—has remained *** this study,we developed reconfigurable metal-oxide-semiconductor capacitors(MOSCaps)based on hafnium diselenide(HfSe2).The proposed devices exhibit(1)optoelectronic synaptic features and perform separate stimulus-associated learning,indicating considerable adaptive neuron emulation,(2)dual light-enabled charge-trapping and memcapacitive behavior within the same MOSCap device,whose threshold voltage and capacitance vary based on the light intensity across the visible spectrum,(3)memcapacitor volatility tuning based on the biasing conditions,enabling the transition from volatile light sensing to non-volatile optical data *** reconfigurability and multifunctionality of MOSCap were used to integrate the device into a leaky integrate-and-fire neuron model within a spiking neural network to dynamically adjust firing patterns based on light stimuli and detect exoplanets through variations in light intensity.
This study investigates a safe reinforcement learning algorithm for grid-forming(GFM)inverter based frequency *** guarantee the stability of the inverter-based resource(IBR)system under the learned control policy,a mo...
详细信息
This study investigates a safe reinforcement learning algorithm for grid-forming(GFM)inverter based frequency *** guarantee the stability of the inverter-based resource(IBR)system under the learned control policy,a modelbased reinforcement learning(MBRL)algorithm is combined with Lyapunov approach,which determines the safe region of states and *** obtain near optimal control policy,the control performance is safely improved by approximate dynamic programming(ADP)using data sampled from the region of attraction(ROA).Moreover,to enhance the control robustness against parameter uncertainty in the inverter,a Gaussian process(GP)model is adopted by the proposed algorithm to effectively learn system dynamics from *** simulations validate the effectiveness of the proposed algorithm.
This paper explores the global spread of the COVID-19 virus since 2019, impacting 219 countries worldwide. Despite the absence of a definitive cure, the utilization of artificial intelligence (AI) methods for disease ...
详细信息
This paper explores the global spread of the COVID-19 virus since 2019, impacting 219 countries worldwide. Despite the absence of a definitive cure, the utilization of artificial intelligence (AI) methods for disease diagnosis has demonstrated commendable effectiveness in promptly diagnosing patients and curbing infection transmission. The study introduces a deep learning-based model tailored for COVID-19 detection, leveraging three prevalent medical imaging modalities: computed tomography (CT), chest X-ray (CXR), and Ultrasound. Various deep Transfer Learning Convolutional Neural Network-based (CNN) models have undergone assessment for each imaging modality. For each imaging modality, this study has selected the two most accurate models based on evaluation metrics such as accuracy and loss. Additionally, efforts have been made to prune unnecessary weights from these models to obtain more efficient and sparse models. By fusing these pruned models, enhanced performance has been achieved. The models have undergone rigorous training and testing using publicly available real-world medical datasets, focusing on classifying these datasets into three distinct categories: Normal, COVID-19 Pneumonia, and non-COVID-19 Pneumonia. The primary objective is to develop an optimized and swift model through strategies like Transfer Learning, Ensemble Learning, and reducing network complexity, making it easier for storage and transfer. The results of the trained network on test data exhibit promising outcomes. The accuracy of these models on the CT scan, X-ray, and ultrasound datasets stands at 99.4%, 98.9%, and 99.3%, respectively. Moreover, these models’ sizes have been substantially reduced and optimized by 51.93%, 38.00%, and 69.07%, respectively. This study proposes a computer-aided-coronavirus-detection system based on three standard medical imaging techniques. The intention is to assist radiologists in accurately and swiftly diagnosing the disease, especially during the screen
The authors consider the property of detectability of discrete event systems in the presence of sensor attacks in the context of *** authors model the system using an automaton and study the general notion of detectab...
详细信息
The authors consider the property of detectability of discrete event systems in the presence of sensor attacks in the context of *** authors model the system using an automaton and study the general notion of detectability where a given set of state pairs needs to be(eventually or periodically)distinguished in any estimate of the state of the *** authors adopt the ALTER sensor attack model from previous work and formulate four notions of CA-detectability in the context of this attack model based on the following attributes:strong or weak;eventual or *** authors present verification methods for strong CA-detectability and weak *** authors present definitions of strong and weak periodic CA-detectability that are based on the construction of a verifier automaton called the augmented *** development also resulted in relaxing assumptions in prior results on D-detectability,which is a special case of CA-detectability.
Backdoor attacks pose great threats to deep neural network models. All existing backdoor attacks are designed for unstructured data(image, voice, and text), but not structured tabular data, which has wide real-world a...
详细信息
Backdoor attacks pose great threats to deep neural network models. All existing backdoor attacks are designed for unstructured data(image, voice, and text), but not structured tabular data, which has wide real-world applications, e.g., recommendation systems, fraud detection, and click-through rate prediction. To bridge this research gap, we make the first attempt to design a backdoor attack framework, named BAD-FM, for tabular data prediction models. Unlike images or voice samples composed of homogeneous pixels or signals with continuous values, tabular data samples contain well-defined heterogeneous fields that are usually sparse and discrete. Tabular data prediction models do not solely rely on deep networks but combine shallow components(e.g., factorization machine, FM) with deep components to capture sophisticated feature interactions among fields. To tailor the backdoor attack framework to tabular data models, we carefully design field selection and trigger formation algorithms to intensify the influence of the trigger on the backdoored model. We evaluate BAD-FM with extensive experiments on four datasets, i.e.,HUAWEI, Criteo, Avazu, and KDD. The results show that BAD-FM can achieve an attack success rate as high as 100%at a poisoning ratio of 0.001%, outperforming baselines adapted from existing backdoor attacks against unstructured data models. As tabular data prediction models are widely adopted in finance and commerce, our work may raise alarms on the potential risks of these models and spur future research on defenses.
Flux-barrier permanent magnet Vernier motors are among the latest magnetic motors developed and optimized in the industry. In these motors, the arrangement of magnets plays a critical role and significantly impacts on...
详细信息
This paper proposes a deep-learning color image steganography scheme that employs convolutional autoencoders with ResNet architecture. In the proposed method, all images are passed through the Preproccessing model whi...
详细信息
The printed circuit boards (PCBs) should be inspected during the manufacturing process to minimize defects such as printing errors, incorrect component selections, and incorrect soldering. Convolutional neural network...
详细信息
Over-the-air computation(AirComp)enables federated learning(FL)to rapidly aggregate local models at the central server using waveform superposition property of wireless *** this paper,a robust transmission scheme for ...
详细信息
Over-the-air computation(AirComp)enables federated learning(FL)to rapidly aggregate local models at the central server using waveform superposition property of wireless *** this paper,a robust transmission scheme for an AirCompbased FL system with imperfect channel state information(CSI)is *** model CSI uncertainty,an expectation-based error model is *** main objective is to maximize the number of selected devices that meet mean-squared error(MSE)requirements for model broadcast and model *** problem is formulated as a combinatorial optimization problem and is solved in two ***,the priority order of devices is determined by a sparsity-inducing ***,a feasibility detection scheme is used to select the maximum number of devices to guarantee that the MSE requirements are *** alternating optimization(AO)scheme is used to transform the resulting nonconvex problem into two convex *** results illustrate the effectiveness and robustness of the proposed scheme.
暂无评论