Erasable itemset mining is one of the most well-known methods in data mining for optimizing limited materials. After mining erasable itemsets, the manager can rearrange the production plan effectively. However, in rea...
详细信息
In this paper, we consider a computationally efficient learning-based control mechanism dealing with dense reward processing for a zero-sum game. The problem has been formulated as the online learning of the Nash equi...
详细信息
Software is a crucial component in the communication systems,and its security is of paramount ***,it is susceptible to different types of attacks due to potential ***,significant time and effort is required to fix suc...
详细信息
Software is a crucial component in the communication systems,and its security is of paramount ***,it is susceptible to different types of attacks due to potential ***,significant time and effort is required to fix such *** propose an automated program repair method based on controlled text generation ***,we utilize a fine-tuned language model for patch generation and introduce a discriminator to evaluate the generation process,selecting results that contribute most to vulnerability ***,we perform static syntax analysis to expedite the patch verification *** effectiveness of the proposed approach is validated using QuixBugs and Defects4J datasets,demonstrating significant improvements in generating correct patches compared to other existing methods.
Presently, advanced humanoid robotic arms have the ability to work independently, and although most current research can make the robotic arm react appropriately and autonomously to the changing environment, it cannot...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote *** attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are *** paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic *** employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA *** proposed voting classifier categorizes the network intrusions robustly and *** assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack *** dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and *** achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other. In this article, a blo...
详细信息
The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other. In this article, a blockchain-enabled manufacturing collaboration framework is proposed, with a focus on the production capacity matching problem for blockchainbased peer-to-peer(P2P) collaboration. First, a digital model of production capacity description is built for trustworthy and transparent sharing over the blockchain. Second, an optimization problem is formulated for P2P production capacity matching with objectives to maximize both social welfare and individual benefits of all participants. Third, a feasible solution based on an iterative double auction mechanism is designed to determine the optimal price and quantity for production capacity matching with a lack of personal information. It facilitates automation of the matching process while protecting users' privacy via blockchainbased smart contracts. Finally, simulation results from the Hyperledger Fabric-based prototype show that the proposed approach increases social welfare by 1.4% compared to the Bayesian game-based approach, makes all participants profitable,and achieves 90% fairness of enterprises.
Fruit ripeness evaluation is essential for harvest optimization and post-harvest loss prevention. Traditional visual inspection is inefficient. This study employs sensor fusion and AI algorithms to evaluate fruit matu...
详细信息
computer aided control in biomedical applications is gaining more and more popularity due to numerous research studies that have proven the efficiency of automatic control over manual dosing, which is highly susceptib...
详细信息
Recently, with the production of high-capacity computers, artificial intelligence methods have been used in many areas. In particular, in the field of health, artificial intelligence methods are used to detect disease...
详细信息
3D Gaussian Splatting (3DGS) introduces a novel methodology for representing scenes with anisotropic 3D Gaussian primitives, achieving exceptional quality and rendering speed in neural scene representation (NSR). Howe...
详细信息
暂无评论