In this work, we aim to evaluate the performance of Machine Learning models in the classification of Alzheimer's patients into disease stages using two feature selection methods proposed in our previous work. The ...
Quantum computation and optimization have recently garnered considerable attention, with a noticeable focus on their floating-point and arithmetic designs. In classical computing, numerical optimization problems are c...
详细信息
This work carried out a measurement study of the Ethereum Peer-to-Peer(P2P)network to gain a better understanding of the underlying *** was applied because it pioneered distributed applications,smart contracts,and ***...
详细信息
This work carried out a measurement study of the Ethereum Peer-to-Peer(P2P)network to gain a better understanding of the underlying *** was applied because it pioneered distributed applications,smart contracts,and ***,its application layer language“Solidity”is widely used in smart contracts across different public and private *** this end,we wrote a new Ethereum client based on Geth to collect Ethereum node ***,various web scrapers have been written to collect nodes’historical data fromthe Internet Archive and the Wayback Machine *** collected data has been compared with two other services that harvest the number of *** has collectedmore than 30% more than the other *** data trained a neural network model regarding time series to predict the number of online nodes in the *** findings show that there are less than 20% of the same nodes daily,indicating thatmost nodes in the network change *** poses a question of the stability of the ***,historical data shows that the top ten countries with Ethereum clients have not changed since *** popular operating system of the underlying nodes has shifted from Windows to Linux over time,increasing node *** results have also shown that the number of Middle East and North Africa(MENA)Ethereum nodes is neglected compared with nodes recorded from other *** opens the door for developing new mechanisms to encourage users from these regions to contribute to this ***,the model has been trained and demonstrated an accuracy of 92% in predicting the future number of nodes in the Ethereum network.
Time-synchronization (TS) formation control for unmanned surface vehicles (USVs) presents several advantages, including precise execution of tasks, broadened combat capabilities, and improved information fusion qualit...
详细信息
Time-synchronization (TS) formation control for unmanned surface vehicles (USVs) presents several advantages, including precise execution of tasks, broadened combat capabilities, and improved information fusion quality. To achieve this performance, a time-synchronized formation control method is presented that takes into account direct topology, external disturbances, and system uncertainties (EDSU). In contrast to prior formation control strategies, we introduce the formalized time-synchronized formation control framework, where all state components of the formation system concurrently converge to the equilibrium point at a uniform time constant, independently of their initial states. To counteract the EDSU, a fixed-time disturbance observer is designed to guarantee the convergence of all observer error components to zero. System stability is corroborated through the application of Lyapunov-like theory. Simulations and comparative experiments on three USVs are conducted to demonstrate the proposed method's superiority. IEEE
Localization of sensor nodes in the internet of underwater things(IoUT)is of considerable significance due to its various applications,such as navigation,data tagging,and detection of underwater ***,in this paper,we p...
详细信息
Localization of sensor nodes in the internet of underwater things(IoUT)is of considerable significance due to its various applications,such as navigation,data tagging,and detection of underwater ***,in this paper,we propose a hybrid Bayesian multidimensional scaling(BMDS)based localization technique that can work on a fully hybrid IoUT network where the nodes can communicate using either optical,magnetic induction,and acoustic *** communication technologies are already used for communication in the underwater environment;however,lacking localization *** and magnetic induction communication achieves higher data rates for short *** the contrary,acoustic waves provide a low data rate for long-range underwater *** proposed method collectively uses optical,magnetic induction,and acoustic communication-based ranging to estimate the underwater sensor nodes’final ***,we also analyze the proposed scheme by deriving the hybrid Cramer-Rao lower bound(H-CRLB).Simulation results provide a complete comparative analysis of the proposed method with the literature.
Recently, stochastic geometry has been applied to provide tractable performance analysis for low earth orbit (LEO) satellite networks. However, existing works mainly focus on analyzing the 'coverage probability...
详细信息
We present a novel trajectory traversability estimation and planning algorithm for robot navigation in complex outdoor environments. We incorporate multimodal sensory inputs from an RGB camera, 3D LiDAR, and the robot...
详细信息
Accurate and timely diagnosis of pulmonary diseases is critical in the field of medical imaging. While deep learning models have shown promise in this regard, the current methods for developing such models often requi...
详细信息
Accurate and timely diagnosis of pulmonary diseases is critical in the field of medical imaging. While deep learning models have shown promise in this regard, the current methods for developing such models often require extensive computing resources and complex procedures, rendering them impractical. This study focuses on the development of a lightweight deep-learning model for the detection of pulmonary diseases. Leveraging the benefits of knowledge distillation (KD) and the integration of the ConvMixer block, we propose a novel lightweight student model based on the MobileNet architecture. The methodology begins with training multiple teacher model candidates to identify the most suitable teacher model. Subsequently, KD is employed, utilizing the insights of this robust teacher model to enhance the performance of the student model. The objective is to reduce the student model's parameter size and computational complexity while preserving its diagnostic accuracy. We perform an in-depth analysis of our proposed model's performance compared to various well-established pre-trained student models, including MobileNetV2, ResNet50, InceptionV3, Xception, and NasNetMobile. Through extensive experimentation and evaluation across diverse datasets, including chest X-rays of different pulmonary diseases such as pneumonia, COVID-19, tuberculosis, and pneumothorax, we demonstrate the robustness and effectiveness of our proposed model in diagnosing various chest infections. Our model showcases superior performance, achieving an impressive classification accuracy of 97.92%. We emphasize the significant reduction in model complexity, with 0.63 million parameters, allowing for efficient inference and rapid prediction times, rendering it ideal for resource-constrained environments. Outperforming various pre-trained student models in terms of overall performance and computation cost, our findings underscore the effectiveness of the proposed KD strategy and the integration of the Conv
Automatic Modulation Recognition (AMR) plays a critical role in wireless communication and can be applied in various applications such as spectrum monitoring and signal surveillance. Recently, different AMR approaches...
详细信息
The recent developments in smart cities pose major security issues for the Internet of Things(IoT)*** security issues directly result from inappropriate security management protocols and their implementation by IoT ga...
详细信息
The recent developments in smart cities pose major security issues for the Internet of Things(IoT)*** security issues directly result from inappropriate security management protocols and their implementation by IoT gadget ***-attackers take advantage of such gadgets’vulnerabilities through various attacks such as injection and Distributed Denial of Service(DDoS)*** this background,Intrusion Detection(ID)is the only way to identify the attacks and mitigate their *** recent advancements in Machine Learning(ML)and Deep Learning(DL)models are useful in effectively classifying *** current research paper introduces a new Coot Optimization Algorithm with a Deep Learning-based False Data Injection Attack Recognition(COADL-FDIAR)model for the IoT *** presented COADL-FDIAR technique aims to identify false data injection attacks in the IoT *** accomplish this,the COADL-FDIAR model initially preprocesses the input data and selects the features with the help of the Chi-square *** detect and classify false data injection attacks,the Stacked Long Short-Term Memory(SLSTM)model is exploited in this ***,the COA algorithm effectively adjusts the SLTSM model’s hyperparameters effectively and accomplishes a superior recognition *** proposed COADL-FDIAR model was experimentally validated using a standard dataset,and the outcomes were scrutinized under distinct *** comparative analysis results assured the superior performance of the proposed COADL-FDIAR model over other recent approaches with a maximum accuracy of 98.84%.
暂无评论