Artificial music composition is one of the ever rising problems of computer science. Genetic Algorithm has been one of the most useful means in our hands to solve optimization problems. By use of precise assumptions a...
详细信息
Artificial music composition is one of the ever rising problems of computer science. Genetic Algorithm has been one of the most useful means in our hands to solve optimization problems. By use of precise assumptions and adequate fitness function it is possible to change the music composing into an optimization problem. This paper proposes a new genetic algorithm for composing music. Considering entropy of the notes distribution as a factor of fitness function and developing mutation and crossover functions based on harmonic rules and trying to keep the melodies intact during these processes would result in a musical piece pleasant to human ears and interesting for human mind. This algorithm does not have the constraints of the previous algorithms. Restraining mutation and crossover functions with a goal of producing melodies based on acceptable melodies composed by humans, this algorithm is not bound to any genre, instrument or melody. The experimental results of this approach show that it is near to the human composing and the results produced from it are more acceptable than the ones produced by its predecessors.
In data warehousing, Extract, Transform, and Load (ETL) processes are in charge of extracting the data from the data sources that will be contained in the data warehouse. Their design and maintenance is thus a corners...
详细信息
This paper presents the time complexity estimates for the methods of points exponentiation, which are basic for encrypting information flows in computer systems. As a result of numerical experiments, it is determined ...
详细信息
In this article authors proposed the fuzzy controller for the correct diagnosis of the breast pathological states. This mean can be used in medical practice by the cytologist as an additional way of diagnosis confirmi...
详细信息
We address the problem of attack detection and attack correction for multi-input multi-output discrete-time linear time-invariant systems under sensor attacks. More specifically, we consider the situation that a syste...
详细信息
The design of an antenna requires a careful selection of its parameters to retain the desired ***,this task is time-consuming when the traditional approaches are employed,which represents a significant *** the other h...
详细信息
The design of an antenna requires a careful selection of its parameters to retain the desired ***,this task is time-consuming when the traditional approaches are employed,which represents a significant *** the other hand,machine learning presents an effective solution to this challenge through a set of regression models that can robustly assist antenna designers to find out the best set of design parameters to achieve the intended *** this paper,we propose a novel approach for accurately predicting the bandwidth of metamaterial *** proposed approach is based on employing the recently emerged guided whale optimization algorithm using adaptive particle swarm optimization to optimize the parameters of the long-short-term memory(LSTM)deep *** optimized network is used to retrieve the metamaterial bandwidth given a set of *** addition,the superiority of the proposed approach is examined in terms of a comparison with the traditional multilayer perceptron(ML),Knearest neighbors(K-NN),and the basic LSTM in terms of several evaluation criteria such as root mean square error(RMSE),mean absolute error(MAE),and mean bias error(MBE).Experimental results show that the proposed approach could achieve RMSE of(0.003018),MAE of(0.001871),and MBE of(0.000205).These values are better than those of the other competing models.
The article is devoted to the analysis of an image contour, the algorithms of contours characteristic points determination and algorithms of contours approximation in local coordinates on the example of tumours cells ...
详细信息
The article is devoted to the analysis of an image contour, the algorithms of contours characteristic points determination and algorithms of contours approximation in local coordinates on the example of tumours cells images of a man.
The modern development of speech synthesis technologies and convolutional neural networks (CNN) creates new opportunities and challenges in the field of voice recognition. One of the key tasks is to ensure the securit...
详细信息
ISBN:
(数字)9798350384499
ISBN:
(纸本)9798350384505
The modern development of speech synthesis technologies and convolutional neural networks (CNN) creates new opportunities and challenges in the field of voice recognition. One of the key tasks is to ensure the security and authenticity of audio information, especially in the context of information warfare and disinformation campaigns. In this context, the ability to recognize and identify generated voices becomes particularly important. This study aims to develop an intelligent method for recognizing real and generated Ukrainian-language voices using convolutional neural networks. The proposed method is based on the careful collection and preparation of data, the development and training of a CNN model, and its validation on test samples. Special attention is paid to ensuring the balance of the dataset, which is crucial for preventing model bias and improving its ability to generalize to unknown data. The model shows high performance in detecting real and generated voices, making this approach useful for local applications, particularly in Ukraine.
The problem of reliability of new object of distributed hardware software (DHS) multi-agent system (MAS) is considered. DHS MAS is determined as a system that is based on agent technologies and consists of both agents...
详细信息
The problem of reliability of new object of distributed hardware software (DHS) multi-agent system (MAS) is considered. DHS MAS is determined as a system that is based on agent technologies and consists of both agents and hardware components required for execution of agents and for interaction of agents with an environment. Reliability improvement, fault-recovery and several reliability assessment approaches for DHS MAS are presented. The reliability improvement methodology is built upon replication of unique functional components and redundancy of universal components. The fault-recovery methodology defines a set of fault-recovery procedures required for restoration of consistent system configuration after failures of its components. Methodology for operability function formation was developed to enable utilization of logical-and- probabilistic methods for reliability assessment. Another approach for reliability assessment is based on Markovian model and system state graph and was developed to overcome limitations of logical-andprobabilistic methods that are suitable only for systems with hot standby. The state graph based approach allows reliability assessment for DHS MAS with cold standby and different operating modes of system components. The state graph based approach is also applicable for a case when probability of failure of one of components depends on states of other components. New failure model for determination of failure rates of system components in accordance with system state is introduced. computing experiments described in the article have validated developed methodologies.
暂无评论