Conventional fuzzy systems(type-1 and type 2)are universal *** goal of this paper is to design and implement a new chaotic fuzzy system(NCFS)based on the Lee oscil-lator for function approximation and chaotic *** inco...
详细信息
Conventional fuzzy systems(type-1 and type 2)are universal *** goal of this paper is to design and implement a new chaotic fuzzy system(NCFS)based on the Lee oscil-lator for function approximation and chaotic *** incorporates fuzzy reasoning of the fuzzy systems,self-adaptation of the neural networks,and chaotic signal generation in a unique *** features enable the structure to handle uncertainties by generating new information or by chaotic search among prior *** fusion of chaotic structure into the neurons of the membership layer of a conventional fuzzy system makes the NCFS more capable of confronting nonlinear *** on the GFA and Stone-Weierstrass theorems,we show that the proposed model has the function approximation *** NCFS perfor-mance is investigated by applying it to the problem of chaotic *** results are demonstrated to ilustrate the concept of function approximation.
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are ha...
详细信息
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are handy to use,but they are susceptible to stolen smart card attacks and few other notable security *** prefer to use Web applications that guarantee for security against several security attacks,especially insider attacks,which is *** of several existing schemes prove the security pitfalls of the protocols from preventing security attacks,specifically insider *** paper introduces LAPUP:a novel lightweight authentication protocol using physically unclonable function(PUF)to prevent security attacks,principally insider *** PUFs are used to generate the security keys,challenge-response pair(CRP)and hardware signature for designing the *** transmitted messages are shared as hash values and encrypted by the keys generated by *** messages are devoid of all possible attacks executed by any attacker,including insider *** is also free from stolen verifier attacks,as the databases are secured by using the hardware signature generated by *** analysis of the protocol exhibits the strength of LAPUP in preventing insider attacks and its resistance against several other security *** evaluation results of the communication and computation costs of LAPUP clearly shows that it achieves better performance than existing protocols,despite providing enhanced security.
With the rise of cloud computing, multi-user scenarios have become a common setting for data sharing nowadays. The conservative security notion might not be sufficient for such a data sharing model. As a response to t...
详细信息
This paper presents a method for the optimized reconfiguration of radial distribution systems that explicitly considers the protection systems constraints. A fully automated method based on graph analysis is proposed ...
详细信息
In this paper, we consider incomplete and asymmetric information formulations of the General Lotto game, which describes two opposing players that strategically allocate limited resources over multiple contests. In pa...
详细信息
In the era of advanced machine learning techniques,the development of accurate predictive models for complex medical conditions,such as thyroid cancer,has shown remarkable *** predictivemodels for thyroid cancer enhan...
详细信息
In the era of advanced machine learning techniques,the development of accurate predictive models for complex medical conditions,such as thyroid cancer,has shown remarkable *** predictivemodels for thyroid cancer enhance early detection,improve resource allocation,and reduce ***,the widespread adoption of these models in clinical practice demands predictive performance along with interpretability and *** paper proposes a novel association-rule based feature-integratedmachine learning model which shows better classification and prediction accuracy than present *** study also focuses on the application of SHapley Additive exPlanations(SHAP)values as a powerful tool for explaining thyroid cancer prediction *** the proposed method,the association-rule based feature integration framework identifies frequently occurring attribute combinations in the *** original dataset is used in trainingmachine learning models,and further used in generating SHAP values *** the next phase,the dataset is integrated with the dominant feature sets identified through association-rule based *** new integrated dataset is used in re-training the machine learning *** new SHAP values generated from these models help in validating the contributions of feature sets in predicting *** conventional machine learning models lack interpretability,which can hinder their integration into clinical decision-making *** this study,the SHAP values are introduced along with association-rule based feature integration as a comprehensive framework for understanding the contributions of feature sets inmodelling the *** study discusses the importance of reliable predictive models for early diagnosis of thyroid cancer,and a validation framework of *** proposed model shows an accuracy of 93.48%.Performance metrics such as precision,recall,F1-score,and the area un
Non-orthogonal multiple access (NOMA), multiple-input multiple-output (MIMO) and mobile edge computing (MEC) are prominent technologies to meet high data rate demand in the sixth generation (6G) communication networks...
详细信息
Non-orthogonal multiple access (NOMA), multiple-input multiple-output (MIMO) and mobile edge computing (MEC) are prominent technologies to meet high data rate demand in the sixth generation (6G) communication networks. In this paper, we aim to minimize the transmission delay in the MIMO-MEC in order to improve the spectral efficiency, energy efficiency, and data rate of MEC offloading. Dinkelbach transform and generalized singular value decomposition (GSVD) method are used to solve the delay minimization problem. Analytical results are provided to evaluate the performance of the proposed Hybrid-NOMA-MIMO-MEC system. Simulation results reveal that the H-NOMA-MIMO-MEC system can achieve better delay performance and lower energy consumption compared to OMA.
Bat Algorithm (BA) is a nature-inspired metaheuristic search algorithm designed to efficiently explore complex problem spaces and find near-optimal solutions. The algorithm is inspired by the echolocation behavior of ...
详细信息
We propose a cross-subcarrier precoder design(CSPD) for massive multiple-input multiple-output(MIMO) orthogonal frequency division multiplexing(OFDM) downlink. This work aims to significantly improve the channel estim...
详细信息
We propose a cross-subcarrier precoder design(CSPD) for massive multiple-input multiple-output(MIMO) orthogonal frequency division multiplexing(OFDM) downlink. This work aims to significantly improve the channel estimation and signal detection performance by enhancing the smoothness of the frequency domain effective channel. This is accomplished by designing a few vectors known as the transform domain precoding vectors(TDPVs), which are then transformed into the frequency domain to generate the precoders for a set of subcarriers. To combat the effect of channel aging, the TDPVs are optimized under imperfect channel state information(CSI). The optimal precoder structure is derived by maximizing an upper bound of the ergodic weighted sum-rate(WSR) and utilizing the a posteriori beam-based statistical channel model(BSCM). To avoid the large-dimensional matrix inversion, we propose an algorithm with symplectic optimization. Simulation results indicate that the proposed cross-subcarrier precoder design significantly outperforms conventional methods.
The Internet of Things (IoT) has revolutionized our lives, but it has also introduced significant security and privacy challenges. The vast amount of data collected by these devices, often containing sensitive informa...
详细信息
暂无评论