Due to the vast amount of patient health data, automated healthcare systems still struggle to classify and diagnose various ailments. Learning redundant data also reduces categorization accuracy. A Deep Belief Network...
详细信息
When processing large amounts of data, proteins play a key role in biological processes. Protein structure prediction relies on a procedure called relevant feature selection. To accomplish classification, a feature se...
详细信息
This study delves into the crucial task of rumor detection amidst the rapid spread of information online, focusing on the efficacy of advanced dual co-attention ensemble models for ensuring digital communication’s re...
详细信息
Internet of Vehicles(IoV)is an intelligent vehicular technology that allows vehicles to communicate with each other via *** and the Internet of Things(IoT)enable cutting-edge technologies including such self-driving *...
详细信息
Internet of Vehicles(IoV)is an intelligent vehicular technology that allows vehicles to communicate with each other via *** and the Internet of Things(IoT)enable cutting-edge technologies including such self-driving *** the existing systems,there is a maximum communication delay while transmitting the *** proposed system uses hybrid Cooperative,Vehicular Communication Management Framework called CAMINO(CA).Further it uses,energy efficient fast message routing protocol with Common Vulnerability Scoring System(CVSS)methodology for improving the communication delay,*** improves security while transmitting the messages through *** this research,we present a unique intelligent vehicular infrastructure communication management *** framework includes additional stability for both short and long-range mobile *** also includes built-in cooperative intelligent transport system(C-ITS)capabilities for experimental verification in real-world *** addition,an energy efficient-fast message distribution routing protocol(EE-FMDRP)has been *** combines the benefits between both temporal and direction oriented routing *** has been suggested for distributing information from the origin ends to the predetermined objective in a quick,accurate,and effective manner in the event of an *** critical value scale score(CVSS)employ ratings to measure the assault probability in Markov *** of chained transitions allow us to statistically evaluate the integrity of a group of *** the proposed method helps to enhance the vehicular *** CAMINO with energy efficient fast protocol using CVSS(CA-EEFP-CVSS)method outperforms in terms of shortest transmission latency achieves 2.6 sec,highest throughput 11.6%,and lowest energy usage 17%and PDR 95.78%.
Efficient highway lighting is crucial for ensuring road safety and reducing energy consumption and costs. Traditional highway lighting systems rely on timers or simple photosensors, leading to inefficient operation by...
详细信息
Satellite image classification is the most significant remote sensing method for computerized analysis and pattern detection of satellite data. This method relies on the image's diversity structures and necessitat...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and ***,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial *** examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong ***,the security of AI models for the digital communication signals identification is the premise of its efficient and credible *** this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial *** we present more detailed adversarial indicators to evaluate attack and defense ***,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research.
In permissionless blockchain systems, Proof of Work (PoW) is utilized to address the issues of double-spending and transaction starvation. When an attacker acquires more than 50% of the hash power of the entire networ...
详细信息
The event management mechanism matches messages that have been subscribed to and events that have been published. To identify the subscriptions that correspond to the occurrence inside the category, it must first run ...
详细信息
The flow shop scheduling problem is important for the manufacturing *** flow shop scheduling can bring great benefits to the ***,there are few types of research on Distributed Hybrid Flow Shop Problems(DHFSP)by learni...
详细信息
The flow shop scheduling problem is important for the manufacturing *** flow shop scheduling can bring great benefits to the ***,there are few types of research on Distributed Hybrid Flow Shop Problems(DHFSP)by learning assisted *** work addresses a DHFSP with minimizing the maximum completion time(Makespan).First,a mathematical model is developed for the concerned ***,four Q-learning-assisted meta-heuristics,e.g.,genetic algorithm(GA),artificial bee colony algorithm(ABC),particle swarm optimization(PSO),and differential evolution(DE),are *** to the nature of DHFSP,six local search operations are designed for finding high-quality solutions in local *** of randomselection,Q-learning assists meta-heuristics in choosing the appropriate local search operations during ***,based on 60 cases,comprehensive numerical experiments are conducted to assess the effectiveness of the proposed *** experimental results and discussions prove that using Q-learning to select appropriate local search operations is more effective than the random *** verify the competitiveness of the Q-learning assistedmeta-heuristics,they are compared with the improved iterated greedy algorithm(IIG),which is also for solving *** Friedman test is executed on the results by five *** is concluded that the performance of four Q-learning-assisted meta-heuristics are better than IIG,and the Q-learning-assisted PSO shows the best competitiveness.
暂无评论