Induction machines are widely used in industrial and household applications due to their efficiency in electromechanical energy conversion. However, broken rotor bars can significantly disrupt machine performance, typ...
详细信息
This paper proposes an alternative detection frame-work for multiple sclerosis (MS) and idiopathic acute transverse myelitis (ATM) within the 6G-enabled Internet of Medical Things (IoMT) environment. The developed fra...
详细信息
Irrigation is an essential role in forming. Due to technological development, it is not needed to depend on someone to do irrigation when we are away. So, this paper specifies how automatic irrigation can be per-forme...
详细信息
The design of an antenna requires a careful selection of its parameters to retain the desired ***,this task is time-consuming when the traditional approaches are employed,which represents a significant *** the other h...
详细信息
The design of an antenna requires a careful selection of its parameters to retain the desired ***,this task is time-consuming when the traditional approaches are employed,which represents a significant *** the other hand,machine learning presents an effective solution to this challenge through a set of regression models that can robustly assist antenna designers to find out the best set of design parameters to achieve the intended *** this paper,we propose a novel approach for accurately predicting the bandwidth of metamaterial *** proposed approach is based on employing the recently emerged guided whale optimization algorithm using adaptive particle swarm optimization to optimize the parameters of the long-short-term memory(LSTM)deep *** optimized network is used to retrieve the metamaterial bandwidth given a set of *** addition,the superiority of the proposed approach is examined in terms of a comparison with the traditional multilayer perceptron(ML),Knearest neighbors(K-NN),and the basic LSTM in terms of several evaluation criteria such as root mean square error(RMSE),mean absolute error(MAE),and mean bias error(MBE).Experimental results show that the proposed approach could achieve RMSE of(0.003018),MAE of(0.001871),and MBE of(0.000205).These values are better than those of the other competing models.
Autonomous robots combine skills to form increasingly complex behaviors, called missions. While skills are often programmed at a relatively low abstraction level, their coordination is architecturally separated and of...
详细信息
Autonomous robots combine skills to form increasingly complex behaviors, called missions. While skills are often programmed at a relatively low abstraction level, their coordination is architecturally separated and often expressed in higher-level languages or frameworks. State machines have been the go-to language to model behavior for decades, but recently, behavior trees have gained attention among roboticists. Originally designed to model autonomous actors in computer games, behavior trees offer an extensible tree-based representation of missions and are claimed to support modular design and code reuse. Although several implementations of behavior trees are in use, little is known about their usage and scope in the real world. How do concepts offered by behavior trees relate to traditional languages, such as state machines? How are concepts in behavior trees and state machines used in actual applications? This paper is a study of the key language concepts in behavior trees as realized in domain-specific languages (DSLs), internal and external DSLs offered as libraries, and their use in open-source robotic applications supported by the Robot Operating System (ROS). We analyze behavior-tree DSLs and compare them to the standard language for behavior models in robotics: state machines. We identify DSLs for both behavior-modeling languages, and we analyze five in-depth. We mine open-source repositories for robotic applications that use the analyzed DSLs and analyze their usage. We identify similarities between behavior trees and state machines in terms of language design and the concepts offered to accommodate the needs of the robotics domain. We observed that the usage of behavior-tree DSLs in open-source projects is increasing rapidly. We observed similar usage patterns at model structure and at code reuse in the behavior-tree and state-machine models within the mined open-source projects. We contribute all extracted models as a dataset, hoping to inspire the commu
Cardiovascular problems have become the predominant cause of death worldwide and a rise in the number of patients has been observed ***,electrocardiogram(ECG)data is analyzed by medical experts to determine the cardia...
详细信息
Cardiovascular problems have become the predominant cause of death worldwide and a rise in the number of patients has been observed ***,electrocardiogram(ECG)data is analyzed by medical experts to determine the cardiac abnormality,which is *** addition,the diagnosis requires experienced medical experts and is ***,automated identification of cardiovascular disease using ECGs is a challenging problem and state-of-the-art performance has been attained by complex deep learning *** study proposes a simple multilayer perceptron(MLP)model for heart disease prediction to reduce computational *** dataset containing averaged signals with window size 10 is used as an *** competing deep learning and machine learning models are used for comparison.K-fold cross-validation is used to validate the *** outcomes reveal that the MLP-based architecture can produce better outcomes than existing approaches with a 94.40%accuracy *** findings of this study show that the proposed system achieves high performance indicating that it has the potential for deployment in a real-world,practical medical environment.
Touch gesture biometrics authentication system is the study of user's touching behavior on his touch device to identify *** features traditionally used in touch gesture authentication systems are extracted using h...
详细信息
Touch gesture biometrics authentication system is the study of user's touching behavior on his touch device to identify *** features traditionally used in touch gesture authentication systems are extracted using hand-crafted feature extraction *** this work,we investigate the ability of Deep Learning(DL)to automatically discover useful features of touch gesture and use them to authenticate the *** different models are investigated Long-Short Term Memory(LSTM),Gated Recurrent Unit(GRU),Convolutional Neural Network(CNN)combined with LSTM(CNN-LSTM),and CNN combined with GRU(CNN-GRU).In addition,different regularization techniques are investigated such as Activity Regularizer,Batch Normalization(BN),Dropout,and *** deep networks were trained from scratch and tested using TouchAlytics and BioIdent datasets for dynamic touch *** result reported in terms of authentication accuracy,False Acceptance Rate(FAR),False Rejection Rate(FRR).The best result we have been obtained was 96.73%,96.07%and 96.08%for training,validation and testing accuracy respectively with dynamic touch authentication system on TouchAlytics dataset with CNN-GRU DL model,while the best result of FAR and FRR obtained on TouchAlytics dataset was with CNN-LSTM were FAR was 0.0009 and FRR was *** BioIdent dataset the best results have been obtained was 84.87%,78.28%and 78.35%for Training,validation and testing accuracy respectively with CNN-LSTM *** use of a learning based approach in touch authentication system has shown good results comparing with other state-of-the-art using TouchAlytics dataset.
The current paper proposes a new approach for peripheral speech emotion analysis and gender estimation incorporating the best machine learning architectures such as CNNs and LSTMs. Its correct depiction of emotions an...
详细信息
The application of synthetic Intelligence (AI) to records science has spread out a massive array of new possibilities. Via the combination of advanced evaluation strategies, effective understanding-pushed system gaini...
详细信息
Body fitness monitoring applications are using mobile sensors to identify human activities. Human activity identification is a challenging task because of the wide availability of human activities. This paper proposes...
详细信息
暂无评论