Artificial neural networks are capable of machine learning by simulating the hiera rchical structure of the human *** enable learning by brain and machine,it is essential to accurately identify and correct the predict...
详细信息
Artificial neural networks are capable of machine learning by simulating the hiera rchical structure of the human *** enable learning by brain and machine,it is essential to accurately identify and correct the prediction errors,referred to as credit assignment(Lillicrap et al.,2020).It is critical to develop artificial intelligence by understanding how the brain deals with credit assignment in neuroscience.
Recently,the coronavirus disease 2019 has shown excellent attention in the global community regarding health and the *** Health Organization(WHO)and many others advised controlling Corona Virus Disease in *** limited ...
详细信息
Recently,the coronavirus disease 2019 has shown excellent attention in the global community regarding health and the *** Health Organization(WHO)and many others advised controlling Corona Virus Disease in *** limited treatment resources,medical resources,and unawareness of immunity is an essential horizon to *** all resources,wearing a mask is the primary non-pharmaceutical intervention to stop the spreading of the virus caused by Severe Acute Respiratory Syndrome Coronavirus 2(SARS-CoV-2)*** countries made masks mandatory to prevent *** such enforcement,automatic and effective face detection systems are *** study presents a face mask identification approach for static photos and real-time movies that distinguishes between images with and without *** contribute to society,we worked on mask detection of an individual to adhere to the rule and provide awareness to the public or *** paper aims to get detection accuracy using transfer learning from Residual Neural Network 50(ResNet-50)architecture and works on detection *** experiment is tested with other popular pre-trained models such as Deep Convolutional Neural Networks(AlexNet),Residual Neural Networks(ResNet),and Visual Geometry Group Networks(VGG-Net)advanced *** proposed system generates an accuracy of 98.4%when modeled using Residual Neural Network 50(ResNet-50).Also,the precision and recall values are proved as better when compared to the existing *** outstanding work also can be used in video surveillance applications.
The advent of the Software-Defined Networks (SDNs) has caused the control plane on the switches to be moved to a separate part of the data plane. Failure of a single controller deployed in the network disrupts the pro...
详细信息
The advent of the Software-Defined Networks (SDNs) has caused the control plane on the switches to be moved to a separate part of the data plane. Failure of a single controller deployed in the network disrupts the proper function of the network;therefore, we need to look for the multiple controller placement and find a way to plan the star ahead assignment of switches to the controllers. The two challenges to customizing the multiple controller placement problem in the form of star assignment are the same as the significant increase in the worst case of delay after reassigning switches to active controllers in the network and the network search space. Therefore, this search space can be significantly reduced by using standard array decision variables. In this paper, we present an optimal array model for the star capacity-aware delay-based next controller placement problem (SCDNCPP). The purpose of the proposed model is to minimize the maximum, for all switches, of the sum of the worst-case delay from the switch to the nearest first controller with enough capacity and the worst-case delay from the same switch to the nearest second controller with enough capacity. In addition, we formulate the problem with MIP (Mixed Integer Programming) model for multiple controller failure and solve it with CPLEX optimizer, but the execution time of the model is significantly longer. We also use the population-based simulated annealing algorithm to converge the problem rapidly toward the optimal solution and reduce time complexity. The simulation results are estimated with real Internet Zoo topologies. The delay improvement rate of the proposed approach according to the simulation results, in case of two controller failure, performs better than CNCP (Capacitated Next Controller Placement) and RCCPP (Resilient Capacity-aware Controller Placement Problem) approaches as much as 1.73 ms and 2.34 ms on Pameltto topology and 6 ms and 2.81 ms on Deltacom topology, respectively. The improve
autism spectrum disorder (ASD) is a neurological condition that disturbs an individual's capability to attach and communicate with others. It instigates in childhood and continues beyond adolescence and adulthood....
详细信息
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain...
详细信息
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware *** this gap can provide valuable insights for enhancing cybersecurity *** numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware *** the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security *** study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows *** objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows *** the accuracy,efficiency,and suitability of each classifier for real-world malware detection *** the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and *** recommendations for selecting the most effective classifier for Windows malware detection based on empirical *** study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and *** data analysis involves understanding the dataset’s characteristics and identifying preprocessing *** preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for *** training utilizes various
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)netw...
详细信息
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)networks may be vulnerable to several routing ***’s why a network intrusion detection system(NIDS)is needed to guard against routing assaults on RPL-based IoT *** imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network ***,we propose in this paper a novel approach to balance the dataset classes based on metaheuristic optimization applied to locality-sensitive hashing and synthetic minority oversampling technique(LSH-SMOTE).The proposed optimization approach is based on a new hybrid between the grey wolf and dipper throated optimization *** prove the effectiveness of the proposed approach,a set of experiments were conducted to evaluate the performance of NIDS for three cases,namely,detection without dataset balancing,detection with SMOTE balancing,and detection with the proposed optimized LSHSOMTE *** results showed that the proposed approach outperforms the other approaches and could boost the detection *** addition,a statistical analysis is performed to study the significance and stability of the proposed *** conducted experiments include seven different types of attack cases in the RPL-NIDS17 *** on the 2696 CMC,2023,vol.74,no.2 proposed approach,the achieved accuracy is(98.1%),sensitivity is(97.8%),and specificity is(98.8%).
Online Social Networks(OSNs)are based on the sharing of different types of information and on various interactions(comments,reactions,and sharing).One of these important actions is the emotional reaction to the *** di...
详细信息
Online Social Networks(OSNs)are based on the sharing of different types of information and on various interactions(comments,reactions,and sharing).One of these important actions is the emotional reaction to the *** diversity of reaction types available on Facebook(namely FB)enables users to express their feelings,and its traceability creates and enriches the users’emotional identity in the virtual *** paper is based on the analysis of 119875012 FB reactions(Like,Love,Haha,Wow,Sad,Angry,Thankful,and Pride)made at multiple levels(publications,comments,and sub-comments)to study and classify the users’emotional behavior,visualize the distribution of different types of reactions,and analyze the gender impact on emotion *** of these can be achieved by addressing these research questions:who reacts the most?Which emotion is the most expressed?
Extracting large amounts of information and knowledge from a large database is a trivial task. Existing bulk item mining algorithms for an extensive database are systematic and mathematically expensive and cannot be u...
详细信息
With the advent of Industry 4.0(I4.0),predictive maintenance(PdM)methods have been widely adopted by businesses to deal with the condition of their *** the help of I4.0,digital transformation,information techniques,co...
详细信息
With the advent of Industry 4.0(I4.0),predictive maintenance(PdM)methods have been widely adopted by businesses to deal with the condition of their *** the help of I4.0,digital transformation,information techniques,computerised control,and communication networks,large amounts of data on operational and process conditions can be collected from multiple pieces of equipment and used to make an automated fault detection and diagnosis,all with the goal of reducing unscheduled maintenance,improving component utilisation,and lengthening the lifespan of the *** this paper,we use smart approaches to create a PdM planning *** five key steps of the created approach are as follows:(1)cleaning the data,(2)normalising the data,(3)selecting the best features,(4)making a decision about the prediction network,and(5)producing a *** the outset,PdM-related data undergo data cleaning and normalisation to get everything in order and within some kind of *** next step is to execute optimal feature selection in order to eliminate unnecessary *** research presents the golden search optimization(GSO)algorithm,a powerful population-based optimization technique for efficient feature *** first phase of GSO is to produce a set of possible solutions or objects at *** objects will then interact with one another using a straightforward mathematical model to find the best feasible *** to the wide range over which the prediction values fall,machine learning and deep learning confront challenges in providing reliable *** is why we recommend a multilayer hybrid convolution neural network(MLH-CNN).While conceptually similar to VGGNet,this approach uses fewer parameters while maintaining or improving classification correctness by adjusting the amount of network modules and *** projected perfect is evaluated on two datasets to show that it can accurately predict the future state of components for upkeep prepara
This review examines the methods, determinants, and forecasting horizons used in electricity demand forecasting in Türkiye. The study investigates how Türkiye's electricity demand is influenced by econom...
详细信息
暂无评论