This study presents an algorithm for solving the Traveling Salesman Problem (TSP) based on Circuit Covering Graph and Insertion Heuristic methods. This algorithm offers an efficient approach to constructing a tour for...
详细信息
Deep neural networks virtually dominate the domain of most modern vision systems, providing high performance at a cost of increased computational complexity. Since for those systems it is often required to operate bot...
详细信息
Parkinson’s disease (PD) is a debilitating neurodegenerative disorder affecting millions worldwide. Early detection is vital for effective management, yet remains challenging. In this study, we investigated four dist...
详细信息
Quantum Neural Networks (QNNs) are an emerging technology that can be used in many applications including computer vision. In this paper, we presented a traffic sign classification system implemented using a hybrid qu...
详细信息
Critical Raw Materials attract increasing attention due to their depleting reserves and low recyclability. Niobium, one of the most rare and vital elements, is primarily found in Brazil. This research explores the pot...
详细信息
Chronic obstructive pulmonary disease (COPD) is a lung disease causing hundred thousand of death each year worldwide and defined as a respiratory and airflow impairment majorly due to large and small airways dysfuncti...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote *** attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are *** paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic *** employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA *** proposed voting classifier categorizes the network intrusions robustly and *** assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack *** dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and *** achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
作者:
Stanczyk, UrszulaDepartment of Graphics
Computer Vision and Digital Systems Faculty of Automatic Control Electronics and Computer Science Silesian University of Technology Akademicka 2A Gliwice44-100 Poland
Decision reducts and rules belong to forms used for the representation of knowledge learnt from input data while using a rough set approach in the exploration stage. As with any patterns that capture properties of dat...
详细信息
作者:
Stanczyk, UrszulaBaron, GrzegorzDepartment of Graphics
Computer Vision and Digital Systems Faculty of Automatic Control Electronics and Computer Science Silesian University of Technology Akademicka 2A Gliwice44-100 Poland
The paper presents a description of the research methodology dedicated to a two-step discretisation process applied to the input numeric data, with combining the characteristics of selected supervised and unsupervised...
详细信息
A fuzzy system for setting the priority of IT project work has been developed, in which a preliminary analysis of the metrics of readiness, permission and complexity of tasks is carried out, which makes it possible to...
详细信息
暂无评论