Due to its significant applications in magnetic devices for cell separation, magnetic drugs for cancer tumor treatment, blood flow adjustment during surgery, magnetic endoscopy, and fluid pumping in industrial and eng...
详细信息
The generalization of BVPs always covers a wide range of equations. Our choice in this research is the generalization of Caputo-type fractional discrete differential equations that include two or more fractional q-int...
详细信息
The vulnerability of Deep Neural Networks (DNNs) to adversarial attacks poses a significant challenge to their deployment in safety-critical applications. While extensive research has addressed various attack scenario...
详细信息
In the current era, quantum resources are extremely limited, and this makes difficult the usage of quantum machine learning (QML) models. Concerning the supervised tasks, a viable approach is the introduction of a qua...
详细信息
During the acquisition of electroencephalographic(EEG) signals, data may be missing or corrupted by noise and artifacts. To reconstruct the incomplete data, EEG signals are firstly converted into a three-order tensor(...
详细信息
During the acquisition of electroencephalographic(EEG) signals, data may be missing or corrupted by noise and artifacts. To reconstruct the incomplete data, EEG signals are firstly converted into a three-order tensor(multi-dimensional data) of shape time × channel × trial. Then, the missing data can be efficiently recovered by applying a tensor completion method(TCM).However, there is not a unique way to organize channels and trials in a tensor, and different numbers of channels are available depending on the EEG setting used, which may affect the quality of the tensor completion results. The main goal of this paper is to evaluate the robustness of EEG completion methods with several designed parameters such as the ordering of channels and trials, the number of channels, and the amount of missing data. In this work, the results of completing missing data by several TCMs were compared. To emulate different scenarios of missing data, three different patterns of missing data were ***, the amount of missing data on completion effects was analyzed, including the time lengths of missing data and the number of channels or trials affected by missing data. Secondly, the numerical stability of the completion methods was analyzed by shuffling the indices along channels or trials in the EEG data tensor. Finally, the way that the number of electrodes of EEG tensors influences completion effects was assessed by changing the number of channels. Among all the applied TCMs, the simultaneous tensor decomposition and completion(STDC) method achieves the best performance in providing stable results when the amount of missing data or the electrode number of EEG tensors is changed. In other words, STDC proves to be an excellent choice of TCM, since permutations of trials or channels have almost no influence on the complete results. The STDC method can efficiently complete the missing EEG signals. The designed simulations can be regarded as a procedure to validate whether or
With the dramatic increase of interconnected devices in smart cities, ensuring the integrity and security of the basic infrastructure has become a major concern. Intrusion detection plays a major role in protecting sm...
With the dramatic increase of interconnected devices in smart cities, ensuring the integrity and security of the basic infrastructure has become a major concern. Intrusion detection plays a major role in protecting smart city systems against cyber-attacks and threats. Deep learning (DL) techniques, namely recurrent neural networks (RNN) or convolutional neural networks (CNNs), were employed for analyzing the network traffic data. The model was trained by labelled dataset, where network traffic instance was categorized as either intrusive or normal. This study proposes a novel automated Intrusion Detection and Classification design using Binary Metaheuristics with Deep Learning (AIDC-BMDL) techniques on Smart Cities. The AIDC-BMDL technique makes use of metaheuristic feature selection and DL based classification process. For the election of optimal features in the intrusion data, the AIDC-BMDL technique uses binary gray wolf optimizer (BGWO) algorithm. Besides, the AIDC-BMDL technique exploits Stacked Autoencoder (SAE) model for the effectual recognition and classification of the intrusions in the smart city environment. The simulation results illustrated the ability of the AIDC-BMDL technique to accurately identify intrusions in smart city environments. The AIDC-BMDL technique gained maximum performance, pointing out the significance of improving the security of smart cities.
This article introduces the idea of P – field which is generalization of P –field. As a first result, it is shown that the intersection of any family of P – field is a P – field too. The main goal of this work to ...
This article introduces the idea of P – field which is generalization of P –field. As a first result, it is shown that the intersection of any family of P – field is a P – field too. The main goal of this work to study a basic of this concept and a basic properties, examples, propositions, theorem and characterizations of this idea have been introduced.
The classification problem has been widely studied in data mining, machine learning, and information retrieval communities with applications in several domains, such as target marketing, medical diagnosis, newsgroup f...
详细信息
The classification problem has been widely studied in data mining, machine learning, and information retrieval communities with applications in several domains, such as target marketing, medical diagnosis, newsgroup filtering, and document organization. In this work, we take up the challenge of improving Text Classification (TC) using Text Summarizing (TS).
The traditional majorization design method makes too many restrictions on the objective function to be optimized and its constraints, which brings a lot of inconvenience to solving majorization problems in practical p...
The traditional majorization design method makes too many restrictions on the objective function to be optimized and its constraints, which brings a lot of inconvenience to solving majorization problems in practical projects. A new stochastic Optimization algorithm based on swarm intelligence - granule swarm algorithm (PSO) was put forward in, and it has been widely concerned by researchers. When the algorithm is initialized, the granules are randomly divided into several sub-granule groups, each sub-granule group evolves independently according to a given strategy, and random migration and adaptive mutation of granules are carried out in the specified period of evolution to maintain the diversity of the entire population., to avoid premature convergence. The inverse analysis of geotechnical engineering majorization is essentially a typical majorization problem of complex nonlinear functions. The use of global majorization algorithm is an ideal way to solve this problem. low productivity. The new algorithm is applied to the elastic-plastic parameter inversion of geotechnical materials. The results show that compared with the conventional granule swarm majorization algorithm, the improved algorithm significantly improves the search efficiency of parameters, and the results that meet the accuracy requirements can be obtained with less iterations, which reduces the amount of calculation of elastic- plastic back analysis of geotechnical engineering. It is a feasible parameter inversion method.
The feasibility-seeking approach provides a systematic scheme to manage and solve complex constraints for continuous problems, and we explore it for the floorplanning problems with increasingly heterogeneous constrain...
详细信息
暂无评论