We present a novel approach for test-time adaptation via online self-training, consisting of two components. First, we introduce a statistical framework that detects distribution shifts in the classifier's entropy...
In numerous real-world healthcare applications,handling incomplete medical data poses significant challenges for missing value imputation and subsequent clustering or classification *** approaches often rely on statis...
详细信息
In numerous real-world healthcare applications,handling incomplete medical data poses significant challenges for missing value imputation and subsequent clustering or classification *** approaches often rely on statistical methods for imputation,which may yield suboptimal results and be computationally *** paper aims to integrate imputation and clustering techniques to enhance the classification of incomplete medical data with improved *** classification methods are ill-suited for incomplete medical *** enhance efficiency without compromising accuracy,this paper introduces a novel approach that combines imputation and clustering for the classification of incomplete ***,the linear interpolation imputation method alongside an iterative Fuzzy c-means clustering method is applied and followed by a classification *** effectiveness of the proposed approach is evaluated using multiple performance metrics,including accuracy,precision,specificity,and *** encouraging results demonstrate that our proposed method surpasses classical approaches across various performance criteria.
This study addresses a massive multiuser multiple-input single-output downlink system with a base station equipped with dynamic metasurface antennas (DMAs) serving single-antenna users. Our goal is to jointly optimize...
详细信息
作者:
Huang, Tsung-RenHsu, Shin-MinFu, Li-ChenNational Taiwan University
Department of Psychology Center for Artificial Intelligence & Advanced Robotics Taipei106319 Taiwan National Taiwan University
Center for Artificial Intelligence & Advanced Robotics Department of Electrical Engineering Department of Computer Science and Information Engineering Taipei106319 Taiwan
Being able to recognize emotional intensity is a desirable feature for a facial emotional recognition (FER) system. However, the development of such a feature is hindered by the paucity of intensity-labeled data for m...
详细信息
Brain-machine interfaces (BMIs) can restore motor function to people with paralysis but are currently limited by the accuracy of real-time decoding algorithms. Recurrent neural networks (RNNs) using modern training te...
详细信息
With the emergence of the Internet of Things, traditional vehicular ad hoc networks have evolved into the more sophisticated Internet of Vehicles (IoV). IoV is expected to play a key role in the development of future ...
详细信息
In recent years, emerging nations have shifted their focus to renewable energy sources for electricity production. This shift has happened in both industrialised and underdeveloped countries. The percentage of electri...
详细信息
In recent years, attacks against various Internet-of-Things systems, networks, servers, devices, and applications witnessed a sharp increase, especially with the presence of 35.82 billion IoT devices since 2021;a numb...
详细信息
Concerns related to the proliferation of automated face recognition technology with the intent of solving or preventing crimes continue to mount. The technology being implicated in wrongful arrest following 1-to-many ...
详细信息
In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player ga...
详细信息
In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player game model and derive Nash equilibria in response to different types of insider *** analyzing these Nash equilibria,we provide quantitative solutions to advanced persistent threat problems pertaining to insider ***,we have conducted a comparative assessment of the optimal defense strategy and corresponding defender's costs between two types of insider ***,our findings advocate a more proactive defense strategy against inadvertent insider threats in contrast to malicious ones,despite the latter imposing a higher burden on the *** theoretical results are substantiated by numerical results,which additionally include a detailed exploration of the conditions under which different insiders adopt risky *** conditions can serve as guiding indicators for the defender when calibrating their monitoring intensities and devising defensive strategies.
暂无评论