For a Petri net N and a marking M, let RN(M) be the set of markings reachable from M and let CN(M) be the set of markings M′ such that M′ ε{lunate} RN(M) and M ε{lunate} RN(M′)CN(M) is a strongly connected compon...
The problems of cyberattacks have been frequent in all areas for several years, the use of technology has become an indispensable element in the environment of the electoral process and its activities to mitigate the ...
详细信息
In this paper, we describe development of a glove-typed input device using hetero-core fiber optic sensors. A hetero-core fiber sensor is suited to the glove-typed input device because its advantage of optical fiber s...
详细信息
ISBN:
(纸本)9781450305242
In this paper, we describe development of a glove-typed input device using hetero-core fiber optic sensors. A hetero-core fiber sensor is suited to the glove-typed input device because its advantage of optical fiber such as flexibility, light weight, and thin size structure. In addition, the hetero-core fiber has been found to have highly sensitive and reproducible perfomance with bending detection. The developed glove-typed input device was successfully operated for its application to the 3D-CG modeling.
A prototype PC-based system of giving color estimation ability to monochrome security cameras has been developed based on the novel concept. The novel concept can be divided into 3 stages. First, space-variant color f...
详细信息
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc...
详细信息
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protocol becomes a major concern in the ***,MANET’s lack of infrastructure,unpredictable topology,and restricted resources,as well as the lack of a previously permitted trust relationship among connected nodes,contribute to the attack detection burden.A novel detection approach is presented in this paper to classify passive and active black-hole *** proposed approach is based on the dipper throated optimization(DTO)algorithm,which presents a plausible path out of multiple paths for statistics transmission to boost MANETs’quality of service.A group of selected packet features will then be weighed by the DTO-based multi-layer perceptron(DTO-MLP),and these features are collected from nodes using the Low Energy Adaptive Clustering Hierarchical(LEACH)clustering *** is a powerful classifier and the DTO weight optimization method has a significant impact on improving the classification process by strengthening the weights of key features while suppressing the weights ofminor *** hybridmethod is primarily designed to combat active black-hole *** the LEACH clustering phase,however,can also detect passive black-hole *** effect of mobility variation on detection error and routing overhead is explored and evaluated using the suggested *** diverse mobility situations,the results demonstrate up to 97%detection accuracy and faster execution ***,the suggested approach uses an adjustable threshold value to make a correct conclusion regarding whether a node is malicious or benign.
Personalization and adaptation of web resources are very actual topics. To date, personalization and adaptation based on semantic web technologies gain still more focus. The use of the technologies resolves issues the...
详细信息
ISBN:
(纸本)9789549641523
Personalization and adaptation of web resources are very actual topics. To date, personalization and adaptation based on semantic web technologies gain still more focus. The use of the technologies resolves issues the lack of the explicit and machine processable semantics in the resources of the current Web;however, new issues are opened, such as effective retrieval of semantic user profiles. In this paper, we present an overview of available methods for user profile acquisition - sharing. We propose an approach to ontology based adaptation and also an underlying structure allowing an efficient but cost-effective way to use semantic user profiles (ontologies) in different applications. Therefore a model for semantic user profile sharing based on the algorithms of peer-to-peer networks is provided - namely distributed hash tables. Discussion of arising issues as well as our attention to implement and experimentally evaluate proposed model concludes the paper.
The potential of mesenchymal stem cells(MSCs)in regenerative medicine has been largely known due to their capability to induce tissue regeneration in vivo with minimum inflammation during *** adult stem cell type exhi...
详细信息
The potential of mesenchymal stem cells(MSCs)in regenerative medicine has been largely known due to their capability to induce tissue regeneration in vivo with minimum inflammation during *** adult stem cell type exhibit unique features of tissue repair mechanism and immune modulation mediated by their secreted factors,called ***,the utilization of secretome as a therapeutic agent provided new insight into cell-free ***,a sufficient amount of secretome is necessary to realize their applications for translational medicine which required a proper biomanufacturing *** factors related to their production need to be considered to produce a clinical-grade secretome as a biological therapeutic *** viewpoint highlights the current challenges and considerations during the biomanufacturing process of MSCs secretome.
Oropharyngeal carcinoma is a life-threatening disease that requires prompt diagnosis and treatment. This study uses deep learning algorithms to present a novel method for improving medical imaging to detect oropharyng...
详细信息
Cursive text recognition of Arabic script-based languages like Urdu is extremely complicated due to its diverse and complex *** approaches like genetic algorithms have been used in the past for various optimization as...
详细信息
Cursive text recognition of Arabic script-based languages like Urdu is extremely complicated due to its diverse and complex *** approaches like genetic algorithms have been used in the past for various optimization as well as pattern recognition tasks,reporting exceptional *** proposed Urdu ligature recognition system uses a genetic algorithm for optimization and *** the proposed recognition system observes the processes of pre-processing,segmentation,feature extraction,hierarchical clustering,classification rules and genetic algorithm optimization and *** pre-processing stage removes noise from the sentence images,whereas,in segmentation,the sentences are segmented into ligature *** features are extracted from each of the segmented ligature ***-feature hierarchical clustering is observed that results in clustered ***,classification rules are used for the representation of the clustered *** genetic algorithm performs an optimization mechanism using multi-level sorting of the clustered data for improving the classification rules used for recognition of Urdu *** conducted on the benchmark UPTI dataset for the proposed Urdu ligature recognition system yields promising results,achieving a recognition rate of 96.72%.
In recent years, the increasing influence of machine learning in different industries had inspired many traders to benefit from it in the world of finance, stock trading is one of the most important activities. Predic...
详细信息
暂无评论