work proposes a two-factor authentication method by integrating the second factor into the authentication service in system with a centralized user's database. This approach made it possible to achieve the univers...
详细信息
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of featu...
详细信息
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of features using typical *** a result,a new metaheuristicsbased feature selection method based on the dipper-throated and grey-wolf optimization(DTO-GW)algorithms has been developed in this *** can result when the selection of features is subject to metaheuristics,which can lead to a wide range of ***,we adopted hybrid optimization in our method of optimizing,which allowed us to better balance exploration and harvesting chores more *** propose utilizing the binary DTO-GW search approach we previously devised for selecting the optimal subset of *** the proposed method,the number of features selected is minimized,while classification accuracy is *** test the proposed method’s performance against eleven other state-of-theart approaches,eight datasets from the UCI repository were used,such as binary grey wolf search(bGWO),binary hybrid grey wolf,and particle swarm optimization(bGWO-PSO),bPSO,binary stochastic fractal search(bSFS),binary whale optimization algorithm(bWOA),binary modified grey wolf optimization(bMGWO),binary multiverse optimization(bMVO),binary bowerbird optimization(bSBO),binary hysteresis optimization(bHy),and binary hysteresis optimization(bHWO).The suggested method is superior 4532 CMC,2023,vol.74,no.2 and successful in handling the problem of feature selection,according to the results of the experiments.
Peculiarities of constructing ensemble bagging classifiers for identifying the state of a computer system under conditions of noisy data are studied. Decision trees and multilayer perceptron were used as basic classif...
详细信息
Medical image quality is very important. High quality ensures the standard of medical diagnosis, treatment, and patient life through health care or automated intelligence systems for medical diagnosis, monitoring, and...
详细信息
ISBN:
(数字)9798350353358
ISBN:
(纸本)9798350353365
Medical image quality is very important. High quality ensures the standard of medical diagnosis, treatment, and patient life through health care or automated intelligence systems for medical diagnosis, monitoring, and treatment. The computing difficulties in processing medical images are discussed in the study. Proposing parallel computational models and program implementations based on medical image filtering techniques is one of the main issues. A filter-based parallel computational model is designed. Implementing a multithreaded parallel program verifies the suggested parallel model. An analysis of the effectiveness of medical image filters using a parallel multithreaded computer implementation that generates output images for each type of applied filter and applies filters on a list of compressed medical images. The BlackAndWhiteFilter, UVFilter, BinaryThresholdFilter, and RobertFilter have been applied. Experimental estimates have been analysed for the parallel performance metrics execution time and speedup. The performance estimation and scalability analyses demonstrate the strong scalability of the proposed solution.
orthogonal and quasi-orthogonal matrices with a limited number of element values and structured in some way are of considerable interest for many technical applications related to image processing and signal coding. T...
详细信息
Inspired by the visual system of the fruit fly, we had created a generic building block for neuromorphic hardware that is vital for third generation neural networks. This enables time delay to be parametrized in a che...
详细信息
Fog computing extends the capabilities of cloud computing by enabling computing at the edge of the network, involving devices such as mobile collaborative devices or fixed nodes with integrated storage, computing, and...
详细信息
A particular problem in using artificial intelligence techniques in the sensor grid is the high power consumption. Remote sensors are usually limited by the amount of power available, thus our general goal is to minim...
详细信息
Soft set theory has emerged recently as a new mathematical tool to handle uncertainty. Sometimes decision makers are not sure about the decision-making criteria, where soft set theory provides an idea to deal with suc...
详细信息
the issue of ensuring the reliability of the functioning of global systems of remote online monitoring of the condition of patients is considered. Remote monitoring is in demand when supervision the health status of d...
详细信息
暂无评论