A high gain, circularly polarized array antenna is proposed with low profile and compact size using T-shaped top loading, t-matching, and a reflector. Composed of 4 individual elements, the array has a −3-dB impedance...
详细信息
Autism spectrum disorder(ASD),classified as a developmental disability,is now more common in children than ever.A drastic increase in the rate of autism spectrum disorder in children worldwide demands early detection ...
详细信息
Autism spectrum disorder(ASD),classified as a developmental disability,is now more common in children than ever.A drastic increase in the rate of autism spectrum disorder in children worldwide demands early detection of autism in *** can seek professional help for a better prognosis of the child’s therapy when ASD is diagnosed under five *** research study aims to develop an automated tool for diagnosing autism in *** computer-aided diagnosis tool for ASD detection is designed and developed by a novel methodology that includes data acquisition,feature selection,and classification *** most deterministic features are selected from the self-acquired dataset by novel feature selection methods before *** Imperialistic competitive algorithm(ICA)based on empires conquering colonies performs feature selection in this *** performance of Logistic Regression(LR),Decision tree,K-Nearest Neighbor(KNN),and Random Forest(RF)classifiers are experimentally studied in this research *** experimental results prove that the Logistic regression classifier exhibits the highest accuracy for the self-acquired *** ASD detection is evaluated experimentally with the Least Absolute Shrinkage and Selection Operator(LASSO)feature selection method and different *** Exploratory Data Analysis(EDA)phase has uncovered crucial facts about the data,like the correlation of the features in the dataset with the class variable.
The static nature of cyber defense systems gives attackers a sufficient amount of time to explore and further exploit the vulnerabilities of information technology *** this paper,we investigate a problem where multiag...
详细信息
The static nature of cyber defense systems gives attackers a sufficient amount of time to explore and further exploit the vulnerabilities of information technology *** this paper,we investigate a problem where multiagent sys-tems sensing and acting in an environment contribute to adaptive cyber *** present a learning strategy that enables multiple agents to learn optimal poli-cies using multiagent reinforcement learning(MARL).Our proposed approach is inspired by the multiarmed bandits(MAB)learning technique for multiple agents to cooperate in decision making or to work *** study a MAB approach in which defenders visit a system multiple times in an alternating fash-ion to maximize their rewards and protect their *** find that this game can be modeled from an individual player’s perspective as a restless MAB *** discover further results when the MAB takes the form of a pure birth process,such as a myopic optimal policy,as well as providing environments that offer the necessary incentives required for cooperation in multiplayer projects.
Person re-identification (ReID) aims to identify pedestrian images with the same identity across non-overlapping camera views. Intra-camera supervised person re-identification (ICS-ReID) is a new paradigm that trains ...
详细信息
Many recent FPGA-based Processor-in-Memory (PIM) architectures have appeared with promises of impressive levels of parallelism but with performance that falls short of expectations due to reduced maximum clock frequen...
详细信息
Process monitoring plays a pivotal role in elucidating the intricate interplay among process, structure, and property in additive manufacturing production. The control of powder spreading affects not only particle adh...
详细信息
Intrusion detection is a prominent factor in the cybersecurity domain that prevents the network from malicious attacks. Cloud security is not satisfactory for securing the user’s information because it is based on st...
详细信息
Given a directed graph G = (V, E) with n vertices, m edges and a designated source vertex s ∈ V, we consider the question of finding a sparse subgraph H of G that preserves the flow from s up to a given threshold λ ...
详细信息
With the continual deployment of power-electronics-interfaced renewable energy resources,increasing privacy concerns due to deregulation of electricity markets,and the diversification of demand-side activities,traditi...
详细信息
With the continual deployment of power-electronics-interfaced renewable energy resources,increasing privacy concerns due to deregulation of electricity markets,and the diversification of demand-side activities,traditional knowledge-based power system dynamic modeling methods are faced with unprecedented ***-driven modeling has been increasingly studied in recent years because of its lesser need for prior knowledge,higher capability of handling large-scale systems,and better adaptability to variations of system operating *** paper discusses about the motivations and the generalized process of datadriven modeling,and provides a comprehensive overview of various state-of-the-art techniques and *** also comparatively presents the advantages and disadvantages of these methods and provides insight into outstanding challenges and possible research directions for the future.
The healthcare system currently relies on the facility to store and process large amounts of health data, supported by efficient management. The Internet of Things (IoT) has driven the growth of Adroit Healthcare, whi...
详细信息
暂无评论