Air quality significantly impacts human health and economic conditions, making precise and timely assessment crucial in urban areas. Existing studies often fail to predict pollution accurately in smaller areas due to ...
详细信息
Fiducial inference is applied to nonparametric g-modeling in the discrete *** propose a computationally efficient algorithm to sample from the fiducial distribution and use the generated samples to construct point est...
详细信息
Fiducial inference is applied to nonparametric g-modeling in the discrete *** propose a computationally efficient algorithm to sample from the fiducial distribution and use the generated samples to construct point estimates and confidence *** study the theoretical properties of the fiducial distribution and perform extensive simulations in various *** proposed approach gives rise to good statistical performance in terms of the mean squared error of point estimators and coverage of confidence ***,we apply the proposed fiducial method to estimate the probability of each satellite site being malignant using gastric adenocarcinoma data with 844 patients.
In this paper,a new strategy for a sub-element-based shock capturing for discontinuous Galerkin(DG)approximations is *** idea is to interpret a DG element as a col-lection of data and construct a hierarchy of low-to-h...
详细信息
In this paper,a new strategy for a sub-element-based shock capturing for discontinuous Galerkin(DG)approximations is *** idea is to interpret a DG element as a col-lection of data and construct a hierarchy of low-to-high-order discretizations on this set of data,including a first-order finite volume scheme up to the full-order DG *** dif-ferent DG discretizations are then blended according to sub-element troubled cell indicators,resulting in a final discretization that adaptively blends from low to high order within a single DG *** goal is to retain as much high-order accuracy as possible,even in simula-tions with very strong shocks,as,e.g.,presented in the Sedov *** framework retains the locality of the standard DG scheme and is hence well suited for a combination with adaptive mesh refinement and parallel *** numerical tests demonstrate the sub-element adaptive behavior of the new shock capturing approach and its high accuracy.
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral *** characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in ***,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate ***,we review the literature on the use of AI in physiological characteristics recognition pub-lished after *** use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their *** also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions.
The performance of SISR models is currently growing at a rapid pace since the adoption of Convolutional Neural Networks (CNN) in the domain. Despite that, the understanding of the underlying factors of this rapid grow...
详细信息
In order to promote the evaluation performance of deep learning infrared automatic target recognition (ATR) algorithms in the complex environment of air-to-air missile research, we proposed an analytic hierarchy proce...
详细信息
Fuzzy inference system(FIS)is a process of fuzzy logic reasoning to produce the output based on fuzzified *** system starts with identifying input from data,applying the fuzziness to input using membership functions(M...
详细信息
Fuzzy inference system(FIS)is a process of fuzzy logic reasoning to produce the output based on fuzzified *** system starts with identifying input from data,applying the fuzziness to input using membership functions(MF),generating fuzzy rules for the fuzzy sets and obtaining the *** are several types of input MFs which can be introduced in FIS,commonly chosen based on the type of real data,sensitivity of certain rule implied and computational *** paper focuses on the construction of interval type 2(IT2)trapezoidal shape MF from fuzzy C Means(FCM)that is used for fuzzification process of mamdani *** the process,upper MF(UMF)and lower MF(LMF)of the MF need to be identified to get the range of the footprint of uncertainty(FOU).This paper proposes Genetic tuning process,which is a part of genetic algorithm(GA),to adjust parameters in order to improve the behavior of existing system,especially to enhance the accuracy of the system *** novel process is a hybrid approach which produces Genetic Fuzzy System(GFS)that helps to enhance fuzzy classification problems and *** approach provides a new method for the construction and tuning process of the IT2 MF,based on the FCM *** result is compared to Gaussian shape IT2 MF and trapezoid IT2 MF generated by the classic GA *** is shown that the proposed approach is able to outperform the mentioned benchmarked *** work implies a wider range of IT2 MF types,constructed based on FCM outcomes,and an optimum generation of the FOU so that it can be implemented in practical applications such as prediction,analytics and rule-based solutions.
With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,whic...
详细信息
With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,which makes task assignment inefficient due to insufficient *** this paper,an Intelligent and Trustworthy task assignment method based on Trust and Social relations(ITTS)is proposed for scenarios with many tasks and few ***,ITTS first makes initial assignments based on trust and social influences,thereby transforming the complex large-scale industrial task assignment of the platform into the small-scale task assignment for each ***,an intelligent Q-decision mechanism based on workers'social relation is proposed,which adopts the first-exploration-then-utilization principle to allocate *** when a worker cannot cope with the assigned tasks,it initiates dynamic worker recruitment,thus effectively solving the worker shortage problem as well as the cold start *** importantly,we consider trust and security issues,and evaluate the trust and social circles of workers by accumulating task feedback,to provide the platform a reference for worker recruitment,thereby creating a high-quality worker ***,extensive simulations demonstrate ITTS outperforms two benchmark methods by increasing task completion rates by 56.49%-61.53%and profit by 42.34%-47.19%.
Radiology report generation is an essential task in the medical field, which aims to automate the generation of medical terminology descriptions of radiology images. However, this task currently suffers from several p...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network *** paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key ***,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use *** paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions.
暂无评论