The rapid development of Internet technology derived out a massive network text data. Therefore, how to classify the massive text data efficiently has important theoretical significance and application value. In order...
详细信息
In this paper, we propose a multi-input multi-output controller for optimal control of nonlinear energy storage, using deep reinforcement learning (DRL) algorithm. This controller provides the frequency support in an ...
详细信息
A cataract is one of the most significant eye problems worldwide that does not immediately impair vision and progressively worsens over *** cataract prediction based on various imaging technologies has been addressed ...
详细信息
A cataract is one of the most significant eye problems worldwide that does not immediately impair vision and progressively worsens over *** cataract prediction based on various imaging technologies has been addressed recently,such as smartphone apps used for remote health monitoring and eye *** recent years,advances in diagnosis,prediction,and clinical decision support using Artificial Intelligence(AI)in medicine and ophthalmology have been *** to privacy concerns,a lack of data makes applying artificial intelligence models in the medical field *** address this issue,a federated learning framework named CDFL based on a VGG16 deep neural network model is proposed in this *** study collects data from the Ocular Disease Intelligent Recognition(ODIR)database containing 5,000 patient *** significant features are extracted and normalized using the min-max normalization *** the federated learning-based technique,the VGG16 model is trained on the dataset individually after receiving model updates from two *** transferring the attributes to the global model,the suggested method trains the local *** global model subsequently improves the technique after integrating the new *** client analyses the results in three rounds to decrease the over-fitting *** experimental result shows the effectiveness of the federated learning-based technique on a Deep Neural Network(DNN),reaching a 95.28%accuracy while also providing privacy to the patient’s *** experiment demonstrated that the suggested federated learning model outperforms other traditional methods,achieving client 1 accuracy of 95.0%and client 2 accuracy of 96.0%.
A conceptual ontological model of Digital Crime has been developed, consisting of five non-empty classes. Identification and classification were carried out according to the experience of domestic and foreign experts....
详细信息
In the era of business, business intelligence (BI) technology can inform the decision-maker of the right data and insight. In this study, a business intelligence model is built to help the marketing department build a...
In the era of business, business intelligence (BI) technology can inform the decision-maker of the right data and insight. In this study, a business intelligence model is built to help the marketing department build an efficient promotion strategy. This paper aims to understand the impact of segmenting customers using the soft clustering technique (fuzz-c-means) based on their spending behavior or Recency, Frequency, and Monetary Model (RFM model) on product affiliation or market basket analysis to develop more efficient promotions to target customers. This aim is approached first by, downloading a dataset called online retail from Kaggle, exploring data to remove the missing value and detect and remove outliers, and constructing an RFM model (Recency, frequency, and monetary). Second, the clustering algorithm is performed fuzzy-c-means, to segment customers into clusters with similar characteristics. Third, product affiliation or association rules are obtained as per cluster using the FP-growth algorithm. Eventually, spending behavior is concluded to show a significant impact on product affiliation which means that clustering based on spending behavior increases the efficiency of market basket analysis (MBA).
Numerous remote area applications welcome standalone renewable energy power generation systems or isolated microgrids (MGs). Due to the nature of solar and wind energy, the frequency deviation control (FDC) in hybrid ...
详细信息
Increasing bus frequency to fulfill the performance requirements of dependable applications may increase the susceptibility of the system to transient faults. This paper describes an integration of protection against ...
Increasing bus frequency to fulfill the performance requirements of dependable applications may increase the susceptibility of the system to transient faults. This paper describes an integration of protection against transient bus faults into the interface of the Hardisc RISC-V core. The protection is based on information redundancy with spatial redundancy features. It enables uninterrupted execution in the presence of transient faults and provides a hardware-software interface for its reporting. The benchmarking results indicate that most of the applications will be impacted minimally. The protection has a negligible impact on the maximal frequency and 8% area and power consumption overhead.
Fingerprint matching,spoof mitigation and liveness detection are the trendiest biometric techniques,mostly because of their stability through life,uniqueness and their least risk of *** recent decade,several technique...
详细信息
Fingerprint matching,spoof mitigation and liveness detection are the trendiest biometric techniques,mostly because of their stability through life,uniqueness and their least risk of *** recent decade,several techniques are presented to address these challenges over well-known *** study provides a comprehensive review on the fingerprint algorithms and techniques which have been published in the last few *** divides the research on fingerprint into nine different approaches including feature based,fuzzy logic,holistic,image enhancement,latent,conventional machine learning,deep learning,template matching and miscellaneous *** these,deep learning approach has outperformed other approaches and gained significant attention for future *** reviewing fingerprint literature,it is historically divided into four eras based on 106 referred papers and their cumulative citations.
Safety/mission-critical applications require high dependability of the control systems. Their state-of-the-art protection approach is a system-level lockstep. This paper compares the system-level dual and triple locks...
详细信息
ISBN:
(数字)9798350377569
ISBN:
(纸本)9798350377576
Safety/mission-critical applications require high dependability of the control systems. Their state-of-the-art protection approach is a system-level lockstep. This paper compares the system-level dual and triple lockstep technique to the microarchitecture-level protection of the Hardisc RISC-V core. For a fair comparison, each system is based on the same core(s) and integrates protection against bit-flips in memory and transient faults in the bus. We propose a fault injection methodology, combining pre-synthesis simulation with synthesis data to analyse the vulnerability of a system to faults. The fault injection campaigns show that the Hardisc can withstand fault rates orders of magnitude higher than the dual-core lockstep system while preserving the same area and power consumption. It comes with a 5% frequency penalty. We have shown that system failures are more frequent once the fault rate reaches an application-specific threshold (one fault in 100 clock cycles).
Ensuring safe, secure, and trustworthy artificial intelligence (AI), particularly within safety-critical systems like autonomous cyber-physical stems (CPS), is of paramount importance and of crucial urgency for depend...
详细信息
ISBN:
(数字)9798350395709
ISBN:
(纸本)9798350395716
Ensuring safe, secure, and trustworthy artificial intelligence (AI), particularly within safety-critical systems like autonomous cyber-physical stems (CPS), is of paramount importance and of crucial urgency for dependability research. One approach to establishing such desiderata of AI is through formal verification, particularly in machine learning (ML) components like neural networks, to establish they meet certain formal specifications. The Neural Network Verification (NNV) software tool implements automated formal methods for this purpose, specifically reachability analysis, and this interactive tutorial will demonstrate these to formally verify specifications in neural networks, as well as in closed-loop CPS. The tutorial begins with a lecture on the emerging research area of neural network verification, followed by interactive demos of these methods implemented in NNV. Examples will be shown from the security, medicine, and CPS domains.
暂无评论