Boolean and relational operations, which are defined for solving mathematically logical problems, are always required in computing models. Membrane computing is a kind of distributed parallel computing model. In this ...
详细信息
Boolean and relational operations, which are defined for solving mathematically logical problems, are always required in computing models. Membrane computing is a kind of distributed parallel computing model. In this paper, we design different membranes for implementing primary Boolean and relational operations respectively. And based on these membranes, a membrane system can be constructed by a present algorithm for evaluating a logical expression. Some examples are given to illustrate how to perform the Boolean, relational operations and evaluate the logical expression correctly in these membrane systems.
Hyperspectral image classification (HSIC) presents significant challenges due to spectral redundancy and spatial discontinuity, both of which can negatively impact classification performance. To mitigate these issues,...
详细信息
Arithmetic operations and expression evaluations are fundamental in computing models. This paper firstly designs arithmetic membranes without priority rules for basic arithmetic operations, and then proposes an algori...
详细信息
Arithmetic operations and expression evaluations are fundamental in computing models. This paper firstly designs arithmetic membranes without priority rules for basic arithmetic operations, and then proposes an algorithm to construct expression P systems based on several of such membranes after designing synchronous and asynchronous transmission strategies among the membranes. For any arithmetic expression, an expression P system can be built to evaluate it effectively. Finally, we discuss different parallelism strategies through which different expression P systems can be built for an arithmetic expression.
Ensuring the user interface (UI) compatibility of web applications across diverse client-side configurations, including various operating systems and browsers, is a significant challenge due to the extensive range of ...
详细信息
ISBN:
(数字)9798331533038
ISBN:
(纸本)9798331533045
Ensuring the user interface (UI) compatibility of web applications across diverse client-side configurations, including various operating systems and browsers, is a significant challenge due to the extensive range of possible combinations. Traditional tools often struggle to address this complexity, leading to visual inconsistencies and malfunctions. To improve compatibility testing, we propose a meta-model that initiates the process with a checklist covering critical configurations across different browsers. This checklist is then translated into Interaction Flow Modeling Language (IFML) constructs, enabling a model-driven approach to compatibility assessment. By leveraging this checklist-IFML integration, we systematically generate test cases that target compatibility issues more effectively. Our approach is validated through the Laptop-Web Case Study, where we assess compatibility by comparing checklist items with IFML constructs within the case study’s domain model. The results show that our approach enhances the accuracy and efficiency of compatibility testing, addressing a core gap in current methods. This research introduces a structured, model-driven method for compatibility testing, providing a more reliable framework for identifying and mitigating UI compatibility issues in web applications across varying client-side configurations.
A popular biometric identification method, renowned for its dependability and individuality in personal identification, is fingerprint recognition. This article presents an efficient fingerprint identification system ...
详细信息
ISBN:
(数字)9798331515683
ISBN:
(纸本)9798331515690
A popular biometric identification method, renowned for its dependability and individuality in personal identification, is fingerprint recognition. This article presents an efficient fingerprint identification system that significantly reduces processing times for 100,000 fingerprints from 8 minutes to less than 5 seconds by utilizing multithreading, ANSI 378 templates, and Source AFIS. The system overcomes the time-consuming image-to-template conversion procedure and increases overall storage efficiency by utilizing parallel processing and preformatted templates (ANSI/ISO). The fingerprint matching system incorporates Directional Field, CNN models for identifying fingerprint types, and Finger Code methods to classify fingerprints, improving precision and efficiency.
Domain adaptation aims to learn a prediction model that performs well in a target domain with unlabeled data by harnessing the distributionally different labeled data from a source domain. In this paper, we design a s...
Domain adaptation aims to learn a prediction model that performs well in a target domain with unlabeled data by harnessing the distributionally different labeled data from a source domain. In this paper, we design a simple yet powerful neural network approach named joint distribution neural matching (JOINT) to address the challenge of joint distribution difference/mismatch in domain adaptation. Our JOINT approach matches the source joint distribution and the target one in the activation space of a neural network by minimizing an estimate of the Jensen–Shannon (JS) divergence between the two joint distributions. The estimated JS divergence is derived in an explicit form, which frees our approach from solving a minimax adversarial problem when matching the distributions. Experiments on four representative large-scale visual recognition datasets show that our JOINT approach outperforms the state-of-the-art under both unsupervised and semi-supervised domain adaptation settings. Our code will be available at https://***/TitanRisen/JOINT-CODE .
The timely management of an unruptured aneurysm can prevent hemorrhage. Multiple anatomical, morphological, and hemodynamic features associated with an aneurysm can predict the risk of rupture and classify the nature ...
详细信息
ISBN:
(数字)9798331533038
ISBN:
(纸本)9798331533045
The timely management of an unruptured aneurysm can prevent hemorrhage. Multiple anatomical, morphological, and hemodynamic features associated with an aneurysm can predict the risk of rupture and classify the nature of the aneurysm as either ruptured or unruptured. However, considering all features may create ambiguities in the model due to inter-dependencies, such as the correlation between aneurysm height and width to aneurysm area. In computer-aided medical diagnostics, focusing on relevant features that diagnose the disease is more crucial than using an abundance of features that may not contribute to the diagnosis and may cause unnecessary complexity. The use of independent or sparsely correlated features improves the accuracy of the classifier. The proposed research analyzes the interdependency of features by calculating the correlation between features. Based on the analyses, the high correlation threshold is determined through rigorous experimentation. From the highly correlated features, one feature is selected. Consequently, the reduced feature set is recommended. The reduced feature set performs better with simpler classifiers. Instead of choosing a classifier that struggles with a broad range of features, an appropriately optimized feature set can enhance performance and improve accuracy. The proposed approach is tested on a publicly available dataset of aneurysms, leading to an improvement in classification accuracy from 82.6% to 87%, due to the use of an appropriate feature set. Moreover, the best model was evaluated using two different explainable AI frameworks to assess the contribution of each feature in prediction. However, the conflicting feature prioritization in each explainable framework suggests that these models prioritize different features for the same trained model, leading to ambiguity. This inconsistency indicates that the explainable models lack generalization and fail to consistently analyze feature importance.
Decision support system (DSS) is a computer-based tool used to improve decision-making capabilities for any organization, using analysis of the available *** heart-kidney (HK) model proposed in this paper as a DSS sim...
详细信息
Most federated learning-based recommender systems allow clients to access a well-trained high-quality model locally, which provides adversaries with the opportunity to infringe the legitimate copyright of the model. I...
详细信息
Most federated learning-based recommender systems allow clients to access a well-trained high-quality model locally, which provides adversaries with the opportunity to infringe the legitimate copyright of the model. In response, we study an emerging and important problem, i.e., copyright protection of a federated recommendation model, which has not yet been addressed in the community of federated learning or recommender systems. We propose the first backdoor-based ownership verification scheme for federated recommendation (OVFR), which enables the server to claim its ownership for a given suspicious recommendation model. First, we propose to generate a trigger set tailored to recommendation scenarios. In particular, we generate some fake users and items, and then construct a set of fake users with fake interaction records as a trigger set. Moreover, we ensure that the distribution of the popularity of the fake items follows a long-tailed distribution for the effectiveness of the incorporated watermarking. To provide robustness assurance, we propose two different hybrid strategies to make the embeddings of the fake items similar to those of the real items. Second, we focus on effectively learning from a trigger set for recommendation scenarios. In particular, we design an MSE loss function and a contrastive loss function for incorporating the backdoor-based watermarking into the item embeddings, since the item embeddings are often more valuable and easier to be accessed than other parameters of a federated recommendation model. We then design a contrastive loss function to reduce the risk of the fake items being detected. Extensive experiments on three public datasets show the effectiveness of our OVFR in terms of ownership verification, model performance, and robustness.
暂无评论