The development of an environmental decision support system (EDSS) by means of two different aims to support the operators' decisions in the drinking water treatment plant (DWTP), equipped with the biggest electro...
详细信息
Evaluating student performance is important for universities and institutions in the current student education landscape because it helps them create models that work better for students. The automation of various fea...
详细信息
In this article e-leaming traffic which is served by system on the hyper convergent platform is considered. It was done the analysis of the known methods of determine the degree of pulsation of traffic. The method for...
详细信息
In this article e-leaming traffic which is served by system on the hyper convergent platform is considered. It was done the analysis of the known methods of determine the degree of pulsation of traffic. The method for calculating of e-learning traffic peakedness is proposed. Simulation and calculation results peakedness is analyzed.
In this paper, a delayed predator-prey model has been developed. Here, on the basis of infectious disease, the prey population has been divided into two sub-populations such as (i) susceptible prey and (ii) infected p...
详细信息
A new approach for segmenting different anatomical regions in dental Computed Tomography (CT) studies is presented in this paper. It is expected that the proposed approach will help automate different tissues regions ...
详细信息
A new approach for segmenting different anatomical regions in dental Computed Tomography (CT) studies is presented in this paper. It is expected that the proposed approach will help automate different tissues regions by providing initial boundary points for deformable models or seed points for split and merge segmentation algorithms. Preliminary results obtained for dental CT studies of dentate and edentulous human-mandible are presented with finite element models divided by tetrahedral elements, which built based on actual CT data combined with triangulation equations. Identification of different anatomical regions set for mandible cortical and cancellous bones by generated 3D models by marching cubes technique.
In this paper, a new approach for computing different anatomical regions in dental Computed Tomography (CT) is presented. The approach consists of two steps. First, a HU threshold window sets to separate between diffe...
详细信息
In this paper, a new approach for computing different anatomical regions in dental Computed Tomography (CT) is presented. The approach consists of two steps. First, a HU threshold window sets to separate between different regions upon their gray-level values; second, a set of objects are generated and texture descriptors are calculated for selected windows from the image data sample. Finally, identification of different anatomical regions set for mandible bones to determine the cystic lesion volume based on numerical methods. Preliminary results obtained for dental CT of female patient aged 14 years old complaining of bilateral swelling in her mandible are presented.
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp...
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comprehensive overview of data poisoning including attack techniques, adversary incentives, impacts on security and reliability, detection methods, defenses, and key research gaps. We examine label flipping, instance injection, backdoors, and other attack categories that enable malicious outcomes ranging from IP theft to accidents in autonomous systems. Promising detection approaches include statistical tests, robust learning, and forensics. However, significant challenges remain in translating academic defenses like adversarial training and sanitization into practical tools ready for operational use. With safety and trustworthiness at stake, more research on benchmarking evaluations, adaptive attacks, fundamental tradeoffs, and real-world deployment of defenses is urgently needed. Understanding vulnerabilities and developing resilient machine learning pipelines will only grow in importance as data integrity is fundamental to developing safe artificial intelligence.
Context: Cyber-physical systems (CPS) are increasingly self-adaptive, i.e. they have the ability to introspect and change their behavior. This self-adaptation process must be considered when modeling the safety and se...
详细信息
The purpose of Generic Evolutionary Algorithms programming Library (GEA1) system is to provide researchers with an easy-to-use, widely applicable and extendable programming library which solves real-world optimization...
The purpose of Generic Evolutionary Algorithms programming Library (GEA1) system is to provide researchers with an easy-to-use, widely applicable and extendable programming library which solves real-world optimization problems by means of evolutionary algorithms. It contains algorithms for various evolutionary methods, implemented genetic operators for the most common representation forms for individuals, various selection methods, and examples on how to use and expand the library. All these functions assure that GEA can be effectively applied on many problems. GraphGEA is a graphical user interface to GEA written with the GTK API. The numerous parameters of the evolutionary algorithm can be set in appropriate dialog boxes. The program also checks the correctness of the parameters and saving/restoring of parameter sets is also possible. The selected evolutionary algorithm can be executed interactively on the specified optimization problem through the graphical user interface of GraphGEA, and the results and behavior of the EA can be observed on several selected graphs and drawings. While the main purpose of GEA is solving optimization problems, that of GraphGEA is education and analysis. It can be of great help for students understanding the characteristics of evolutionary algorithms and researchers of the area can use it to analyze an EA's behavior on particular problems.
暂无评论