This paper proposes an improved version of the Partial Reinforcement Optimizer(PRO),termed *** LNPRO has undergone a learner phase,which allows for further communication of information among the PRO population,changin...
详细信息
This paper proposes an improved version of the Partial Reinforcement Optimizer(PRO),termed *** LNPRO has undergone a learner phase,which allows for further communication of information among the PRO population,changing the state of the PRO in terms of ***,the Nelder-Mead simplex is used to optimize the best agent in the population,accelerating the convergence speed and improving the accuracy of the PRO *** comparing LNPRO with nine advanced algorithms in the IEEE CEC 2022 benchmark function,the convergence accuracy of the LNPRO has been *** accuracy and stability of simulated data and real data in the parameter extraction of PV systems are *** to the PRO,the precision and stability of LNPRO have indeed been enhanced in four types of photovoltaic components,and it is also superior to other excellent *** further verify the parameter extraction problem of LNPRO in complex environments,LNPRO has been applied to three types of manufacturer data,demonstrating excellent results under varying irradiation and *** summary,LNPRO holds immense potential in solving the parameter extraction problems in PV systems.
Internet of Things (IoT) applications have recently been widely used in safety-critical scenarios. To prevent sensitive information leaks, IoT device vendors provide hardware-assisted protections, called Trusted Execu...
详细信息
Breast cancer is a major health concern for women worldwide, and early detection is vital to improve treatment outcomes. While existing techniques in mammogram classification have demonstrated promising results, their...
详细信息
Breast cancer is a major health concern for women worldwide, and early detection is vital to improve treatment outcomes. While existing techniques in mammogram classification have demonstrated promising results, their limitations become apparent when applied to larger datasets. The decline in performance with increased dataset size highlights the need for further research and advancements in the field to enhance the scalability and generalizability of these techniques. In this study, we propose a framework to classify breast cancer from mammograms using techniques such as mammogram enhancement, discrete cosine transform (DCT) dimensionality reduction, and deep convolutional neural network (DCNN). The first step is to improve the mammogram display to improve the visibility of key features and reduce noise. For this, we use 2-stage Contrast Limited Adaptive Histogram Equalization (CLAHE). DCT is then used to enhance mammograms to reduce residual data. It can provide effective reduction while preserving important diagnostic information. In this way, we reduce the computational complexity and increase the results of subsequent classification algorithms. Finally, DCNN is used on size-reduced DCT coefficients to learn feature discrimination and classification of mammograms. DCNN architectures have been optimized with various techniques to improve their performance, including regularization and hyperparameter tuning. We perform experiments on the DDSM dataset, a large dataset containing approximately 55,000 mammogram images, and demonstrate the effectiveness of the proposed method. We assess the proposed model’s performance by computing the precision, recall, accuracy, F1-Score, and area under the receiver operating characteristic curve (AUC). We achieve Precision and Recall values of 0.929 and 0.963, respectively. The classification accuracy of the proposed models is 0.963. Moreover, the F1-Score and AUC values are 0.962 and 0.987, respectively. These results are better a
Depression is a disease that affects everyone, both young and old. This mental illness not only affects the surrounding environment but everyone. Depression is characterized by deep sadness, behavioral changes and man...
详细信息
Event representation in text is basic task for natural language processing. In this paper, an enhanced event representation framework using contrastive learning based on Gaussian embedding (EventGE) is proposed. To ma...
详细信息
On the transmission line,the invasion of foreign objects such as kites,plastic bags,and balloons and the damage to electronic components are common transmission line *** these faults is of great significance for the s...
详细信息
On the transmission line,the invasion of foreign objects such as kites,plastic bags,and balloons and the damage to electronic components are common transmission line *** these faults is of great significance for the safe operation of power ***,a YOLOv5 target detection method based on a deep convolution neural network is *** this paper,Mobilenetv2 is used to replace Cross Stage Partial(CSP)-Darknet53 as the *** structure uses depth-wise separable convolution to reduce the amount of calculation and parameters;improve the detection *** the same time,to compensate for the detection accuracy,the Squeeze-and-Excitation Networks(SENet)attention model is fused into the algorithm framework and a new detection scale suitable for small targets is added to improve the significance of the fault target area in the *** pictures of foreign matters such as kites,plastic bags,balloons,and insulator defects of transmission lines,and sort theminto a data *** experimental results on datasets show that themean Accuracy Precision(mAP)and recall rate of the algorithm can reach 92.1%and 92.4%,*** the same time,by comparison,the detection accuracy of the proposed algorithm is higher than that of other methods.
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this...
详细信息
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this research provides a Three-Layered Security Access model(TLSA)aligned to an intrusion detection mechanism,access control mechanism,and data encryption *** TLSA underlines the need for the protection of sensitive *** proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard(AES).For data transfer and storage,this encryption guarantees the data’s authenticity and ***,the solution employs the AES encryption algorithm to secure essential data before storing them in the Cloud to minimize unauthorized ***-based access control(RBAC)implements the second strategic level,which ensures specific personnel access certain data and *** RBAC,each user is allowed a specific role and *** implies that permitted users can access some data stored in the *** layer assists in filtering granular access to data,reducing the risk that undesired data will be discovered during the *** 3 deals with intrusion detection systems(IDS),which detect and quickly deal with malicious actions and intrusion *** proposed TLSA security model of e-commerce includes conventional levels of security,such as encryption and access control,and encloses an insight intrusion detection *** method offers integrated solutions for most typical security issues of cloud computing,including data secrecy,method of access,and *** extensive performance test was carried out to confirm the efficiency of the proposed three-tier security *** have been made with state-of-art techniques,including DES,RSA,and DUAL-RSA,keeping into account Accuracy,QILV,F-Measure,Sensitivity,MSE,PSNR,SSIM,and computation time,encryption time,and decryption *** proposed
Due to their low power consumption and limited computing power,Internet of Things(IoT)devices are difficult to ***,the rapid growth of IoT devices in homes increases the risk of *** detection systems(IDS)are commonly ...
详细信息
Due to their low power consumption and limited computing power,Internet of Things(IoT)devices are difficult to ***,the rapid growth of IoT devices in homes increases the risk of *** detection systems(IDS)are commonly employed to prevent *** systems detect incoming attacks and instantly notify users to allow for the implementation of appropriate *** have been made in the past to detect new attacks using machine learning and deep learning techniques,however,these efforts have been *** this paper,we propose two deep learning models to automatically detect various types of intrusion attacks in IoT ***,we experimentally evaluate the use of two Convolutional Neural Networks(CNN)to detect nine distinct types of attacks listed in the NF-UNSW-NB15-v2 *** accomplish this goal,the network stream data were initially converted to twodimensional images,which were then used to train the neural network *** also propose two baseline models to demonstrate the performance of the proposed ***,both models achieve high accuracy in detecting the majority of these nine attacks.
Document-level Relation Extraction (DocRE) aims to identify relationships between entity pairs within a document. However, most existing methods assume a uniform label distribution, resulting in suboptimal performance...
详细信息
In recent years due to increase in the number of customers and organizations utilize cloud applications for personal and professionalization become greater. As a result of this increase in utilizing the Cloud services...
详细信息
暂无评论