Road pricing is an urban traffic management mechanism to reduce traffic ***,most of the road pricing systems based on predefined charging tolls fail to consider the dynamics of urban traffic flows and travelers’deman...
详细信息
Road pricing is an urban traffic management mechanism to reduce traffic ***,most of the road pricing systems based on predefined charging tolls fail to consider the dynamics of urban traffic flows and travelers’demands on the arrival *** this paper,we propose a method to dynamically adjust online road toll based on traffic conditions and travelers’demands to resolve the above-mentioned *** method,based on deep reinforcement learning,automatically allocates the optimal toll for each road during peak hours and guides vehicles to roads with lower toll ***,it further considers travelers’demands to ensure that more vehicles arrive at their destinations before their estimated arrival *** method can increase the traffic volume effectively,as compared to the existing static mechanisms.
This research proposes a highly effective soft computing paradigm for estimating the compressive strength(CS)of metakaolin-contained cemented *** proposed approach is a combination of an enhanced grey wolf optimizer(E...
详细信息
This research proposes a highly effective soft computing paradigm for estimating the compressive strength(CS)of metakaolin-contained cemented *** proposed approach is a combination of an enhanced grey wolf optimizer(EGWO)and an extreme learning machine(ELM).EGWO is an augmented form of the classic grey wolf optimizer(GWO).Compared to standard GWO,EGWO has a better hunting mechanism and produces an optimal *** EGWO was used to optimize the ELM structure and a hybrid model,ELM-EGWO,was *** train and validate the proposed ELM-EGWO model,a sum of 361 experimental results featuring five influencing factors was *** on sensitivity analysis,three distinct cases of influencing parameters were considered to investigate the effect of influencing factors on predictive *** consequences show that the constructed ELM-EGWO achieved the most accurate precision in both training(RMSE=0.0959)and testing(RMSE=0.0912)*** outcomes of the ELM-EGWO are significantly superior to those of deep neural networks(DNN),k-nearest neighbors(KNN),long short-term memory(LSTM),and other hybrid ELMs constructed with GWO,particle swarm optimization(PSO),harris hawks optimization(HHO),salp swarm algorithm(SSA),marine predators algorithm(MPA),and colony predation algorithm(CPA).The overall results demonstrate that the newly suggested ELM-EGWO has the potential to estimate the CS of metakaolin-contained cemented materials with a high degree of precision and robustness.
Brain signal analysis from electroencephalogram(EEG)recordings is the gold standard for diagnosing various neural disorders especially epileptic *** signals are highly chaotic compared to normal brain signals and thus...
详细信息
Brain signal analysis from electroencephalogram(EEG)recordings is the gold standard for diagnosing various neural disorders especially epileptic *** signals are highly chaotic compared to normal brain signals and thus can be identified from EEG *** the current seizure detection and classification landscape,most models primarily focus on binary classification—distinguishing between seizure and non-seizure *** effective for basic detection,these models fail to address the nuanced stages of seizures and the intervals between *** identification of per-seizure or interictal stages and the timing between seizures is crucial for an effective seizure alert *** granularity is essential for improving patient-specific interventions and developing proactive seizure management *** study addresses this gap by proposing a novel AI-based approach for seizure stage classification using a Deep Convolutional Neural Network(DCNN).The developed model goes beyond traditional binary classification by categorizing EEG recordings into three distinct classes,thus providing a more detailed analysis of seizure *** enhance the model’s performance,we have optimized the DCNN using two advanced techniques:the Stochastic Gradient Algorithm(SGA)and the evolutionary Genetic Algorithm(GA).These optimization strategies are designed to fine-tune the model’s accuracy and ***,k-fold cross-validation ensures the model’s reliability and generalizability across different data *** and validated on the Bonn EEG data sets,the proposed optimized DCNN model achieved a test accuracy of 93.2%,demonstrating its ability to accurately classify EEG *** summary,the key advancement of the present research lies in addressing the limitations of existing models by providing a more detailed seizure classification system,thus potentially enhancing the effectiveness of real-time seizure prediction and management systems in clinic
The hand localization problem has been a longstanding focus due to its many applications. The task involves modeling the hand as a singular point and determining its position within a defined coordinate system. Howeve...
详细信息
In permissionless blockchain systems, Proof of Work (PoW) is utilized to address the issues of double-spending and transaction starvation. When an attacker acquires more than 50% of the hash power of the entire networ...
详细信息
Clinical auxiliary decision-making is related to life and health of patients, so the deep model needs to extract the personalised representation of patients to ensure high analysis and prediction accuracy;and provide ...
详细信息
The present paper was focused on understanding of relationships between structure, composition, mechanical and high temperature tribological performances of the CrHfNbTaTiCxNy high entropy coatings. The CrHfNbTaTiCxNy...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing ac...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing across the participating entities, a malicious agent may gain access to outsourced data from the cloud environment. A malicious agent is an entity that deliberately breaches the data. This information accessed might be misused or revealed to unauthorized parties. Therefore, data protection and prediction of malicious agents have become a demanding task that needs to be addressed appropriately. To deal with this crucial and challenging issue, this paper presents a Malicious Agent Identification-based Data Security (MAIDS) Model which utilizes XGBoost machine learning classification algorithm for securing data allocation and communication among different participating entities in the cloud system. The proposed model explores and computes intended multiple security parameters associated with online data communication or transactions. Correspondingly, a security-focused knowledge database is produced for developing the XGBoost Classifier-based Malicious Agent Prediction (XC-MAP) unit. Unlike the existing approaches, which only identify malicious agents after data leaks, MAIDS proactively identifies malicious agents by examining their eligibility for respective data access. In this way, the model provides a comprehensive solution to safeguard crucial data from both intentional and non-intentional breaches, by granting data to authorized agents only by evaluating the agent’s behavior and predicting the malicious agent before granting data. The performance of the proposed model is thoroughly evaluated by accomplishing extensive experiments, and the results signify that the MAIDS model predicts the malicious agents with high accuracy, precision, recall, and F1-scores up to 95.55%, 95.30%, 95.50%, and 95.20%, respectively. This enormously enhances the system’s sec
The Internet is the most complex machine humankind has ever built, and thus, it is difficult to defend it from attacks. The most common attack to the Internet is DDoS attacks. With the growing popularity for QUIC prot...
详细信息
Blockchain technology has been extensively studied over the past decade as a foundation for decentralized information-sharing platforms due to its promising *** the success of existing blockchain architectures like Bi...
详细信息
Blockchain technology has been extensively studied over the past decade as a foundation for decentralized information-sharing platforms due to its promising *** the success of existing blockchain architectures like Bitcoin,Ethereum,Filecoin,Hyperledger Fabric,BCOS,and BCS,current blockchain applications are still quite *** struggles with scenarios requiring high-speed transactions(e.g.,online markets)or large data storage(e.g.,video services)due to consensus efficiency *** restrictions pose risks to investors in blockchain-based economic systems(e.g.,DeFi),deterring current and potential *** protection challenges make it difficult to involve sensitive data in blockchain applications.
暂无评论