We study the maximum weight convex polytope problem, in which the goal is to find a convex polytope maximizing the total weight of enclosed points. Prior to this work, the only known result for this problem was an O(n...
The classification of short-term power load data by clustering algorithm can lay a good foundation for the subsequent power load forecasting work and provide a more efficient, safe and reliable direction for the opera...
详细信息
Facial expression recognition(FER)remains a hot research area among computer vision researchers and still becomes a challenge because of high intraclass *** techniques for this problem depend on hand-crafted features,...
详细信息
Facial expression recognition(FER)remains a hot research area among computer vision researchers and still becomes a challenge because of high intraclass *** techniques for this problem depend on hand-crafted features,namely,LBP,SIFT,and HOG,along with that a classifier trained on a database of videos or *** execute perform well on image datasets captured in a controlled condition;however not perform well in the more challenging dataset,which has partial faces and image ***,many studies presented an endwise structure for facial expression recognition by utilizing DL ***,this study develops an earthworm optimization with an improved SqueezeNet-based FER(EWOISN-FER)*** presented EWOISN-FER model primarily applies the contrast-limited adaptive histogram equalization(CLAHE)technique as a pre-processing *** addition,the improved SqueezeNet model is exploited to derive an optimal set of feature vectors,and the hyperparameter tuning process is performed by the stochastic gradient boosting(SGB)***,EWO with sparse autoencoder(SAE)is employed for the FER process,and the EWO algorithm appropriately chooses the SAE ***-ranging experimental analysis is carried out to examine the performance of the proposed *** experimental outcomes indicate the supremacy of the presented EWOISN-FER technique.
Context: softwareengineering (SE) community has empirically investigated software defect prediction as a proxy to benchmark it as a process improvement activity to assure software quality. In the domain of software f...
详细信息
ISBN:
(纸本)9781450396134
Context: softwareengineering (SE) community has empirically investigated software defect prediction as a proxy to benchmark it as a process improvement activity to assure software quality. In the domain of software fault prediction, the performance of classification algorithms is highly provoked with the residual effects attributed to feature irrelevance and data redundancy issues. Problem: The meta-learning-based ensemble methods are usually carried out to mitigate these noise effects and boost the software fault prediction performance. However, there is a need to benchmark the performance of meta-learning ensemble methods (as fault predictor) to assure software quality control and aid developers in their decision making. Method: We conduct an empirical and comparative study to evaluate and benchmark the improvement in the fault prediction performance via meta-learning ensemble methods as compared to their component base-level fault predictors. In this study, we perform a series of experiments with four well-known meta-level ensemble methods Vote, StackingC (i.e., Stacking), MultiScheme, and Grading. We also use five high-performance fault predictors Logistic (i.e., Logistic Regression), J48 (i.e., Decision Tree), IBK (i.e. k-nearest neighbor), NaiveBayes, and Decision Table (DT). Subsequently, we performed these experiments on public defect datasets with k-fold (k=10) cross-validation. We used F-measure and ROC-AUC (Receiver Operating Characteristic-Area Under Curve) performance measures and applied the four non-parametric tests to benchmark the fault prediction performance results of meta-learning ensemble methods. Results and Conclusion: we conclude that meta-learning ensemble methods, especially Vote could outperform the base-level fault predictors to tackle the feature irrelevance and redundancy issues in the domain of software fault prediction. Having said that, their performance is highly related to the number of base-level classifiers and the set of softwa
In this paper, we study the obstacle avoidance problem of second-order nonlinear multi-agent systems (MASs) with directed graph based on event-triggered control. Firstly, the consensus requirement is accomplished by u...
详细信息
Unaided authentication services provide the flexibility to login without being dependent on any additional *** power of recording attack resilient unaided authentication services(RARUAS)is undeniable as,in some aspect...
详细信息
Unaided authentication services provide the flexibility to login without being dependent on any additional *** power of recording attack resilient unaided authentication services(RARUAS)is undeniable as,in some aspects,they are even capable of offering better security than the biometric based authentication ***,high login complexity of these RARUAS makes them far from usable in *** adopted information leakage control strategies have often been identified as the primary cause behind such high login *** recent proposals have made some significant efforts in designing a usable RARUAS by reducing its login complexity,most of them have failed to achieve the desired usability *** this paper,we have introduced a new notion of controlling the information leakage *** maintaining a good security standard,the introduced idea helps to reduce the login complexity of our proposed mechanism—named as Textual-Graphical Password-based Mechanism or TGPM,by a significant *** with resisting the recording attack,TGPM also achieves a remarkable property of threat *** the best of our knowledge,TGPM is the first RARUAS,which can both prevent and detect the activities of the opportunistic recording attackers who can record the complete login activity of a genuine user for a few login *** study reveals that TGPM assures much higher session resiliency compared to the existing authentication services,having the same or even higher login ***,TGPM stores the password information in a distributed way and thus restricts the adversaries to learn the complete secret from a single compromised server.A thorough theoretical analysis has been performed to prove the strength of our proposal from both the security and usability *** have also conducted an experimental study to support the theoretical argument made on the usability standard of TGPM.
The Internet of Vehicles (IoV) necessitates efficient resource management to meet the growing demands for high data rates, low latency, and real-time communication in Intelligent Transportation Systems (ITS). This pap...
详细信息
Intelligent Internet of Things (IIoT), a network paradigm, is an interconnection of intelligent edge devices, empowered by machine learning models. The recent emergence of large language models (LLMs) opens a new path...
详细信息
Static Context Header Compression and Fragmentation (SCHC) is a standard defined as an adaptation layer for supporting IPv6, UDP, and CoAP protocols in low power wide area network (LPWAN) technologies. SCHC has fragme...
详细信息
Recent work has introduced an important yet relatively under-explored NLP task called Semantic Overlap Summarization (SOS) that entails generating a summary from multiple alternative narratives which conveys the commo...
详细信息
暂无评论