This paper presents a numerical integration study for spherical near field (NF) to far field (FF) transformations. The trapezoidal and Simpson 1/3 numerical integration methods are employed in the NF to FF transformat...
详细信息
The university course timetabling problem (UCTTP) is one of the university's real-world challenging problems. The practical timetable must be scheduled so that it is suitable for lecturers, students, and available...
详细信息
In this paper,a two-step control method is proposed,leveraging the generalized Halanay inequality and existing finite-time stability theorems,to achieve finite-time synchronization for a class of neural networks with ...
In this paper,a two-step control method is proposed,leveraging the generalized Halanay inequality and existing finite-time stability theorems,to achieve finite-time synchronization for a class of neural networks with bounded time-varying *** the first step,the system state is attenuated from V (t0) to γV (t0) using the generalized Halanay inequality,where0<γ 1 is a free *** the second step,by applying existing finite-time stability theorems,the system state further decays from γV (t0) to *** on the above ideas,two novel finite-time stability lemmas for the error system are presented,and the convergence rate as well as the settling time is ***,the value of γ that results in the shortest settling time for the error system is also *** the help of the derived lemmas,several sufficient algebraic criteria are established to achieve finite-time synchronization between the considered delayed neural *** results of this paper not only improve the existing two-step control method but also overcome the limitations of certain one-step finite-time control ***,the validity and practical applicability of the obtained theoretical results are demonstrated through two numerical examples and an image protection experiment.
1Introduction In the field of robotic-human interactions,soft robotics offers enhanced safety and adaptability.A major challenge in this area is the integration of soft actuators with pump systems,which often increase...
详细信息
1Introduction In the field of robotic-human interactions,soft robotics offers enhanced safety and adaptability.A major challenge in this area is the integration of soft actuators with pump systems,which often increases the system volume and *** study presents the development and testing of a robotic finger powered by electrohydrodynamic(EHD)*** leveraging the electric field-induced flow of dielectric fluids.
Educational institutions face inherent uncertainties in student performance, stakeholder priorities, and data analysis. This paper explores how cloud computing, with its data storage, analytics, and collaboration tool...
详细信息
Three-phase back-to-back converters are widely applied in various industrial, commercial, and domestic applications, such as AC motor drives. Due to the non-sinusoidal voltages they generate, a common mode voltage (CM...
详细信息
In data mining and machine learning,feature selection is a critical part of the process of selecting the optimal subset of features based on the target *** are 2n potential feature subsets for every n features in a da...
详细信息
In data mining and machine learning,feature selection is a critical part of the process of selecting the optimal subset of features based on the target *** are 2n potential feature subsets for every n features in a dataset,making it difficult to pick the best set of features using standard ***,in this research,a new metaheuristics-based feature selection technique based on an adaptive squirrel search optimization algorithm(ASSOA)has been *** using metaheuristics to pick features,it is common for the selection of features to vary across runs,which can lead to *** of this,we used the adaptive squirrel search to balance exploration and exploitation duties more evenly in the optimization *** the selection of the best subset of features,we recommend using the binary ASSOA search strategy we developed *** to the suggested approach,the number of features picked is reduced while maximizing classification accuracy.A ten-feature dataset from the University of California,Irvine(UCI)repository was used to test the proposed method’s performance *** other state-of-the-art approaches,including binary grey wolf optimization(bGWO),binary hybrid grey wolf and particle swarm optimization(bGWO-PSO),bPSO,binary stochastic fractal search(bSFS),binary whale optimization algorithm(bWOA),binary modified grey wolf optimization(bMGWO),binary multiverse optimization(bMVO),binary bowerbird optimization(bSBO),binary hybrid GWO and genetic algorithm 4028 CMC,2023,vol.74,no.2(bGWO-GA),binary firefly algorithm(bFA),and *** results confirm the superiority and effectiveness of the proposed algorithm for solving the problem of feature selection.
The task of identifying key skills from job vacancies descriptions is considered in the article. The source data consists of vacancy texts from the 'Jobs in Russia' portal, in which skill-related entities were...
详细信息
The Internet has grown in importance and impact over the years, causing people to become more reliant on it. The Internet has evolved into a major vector for cybercrime because to its ever-increasing user base. Over t...
详细信息
ISBN:
(纸本)9798350352931
The Internet has grown in importance and impact over the years, causing people to become more reliant on it. The Internet has evolved into a major vector for cybercrime because to its ever-increasing user base. Over the last decade, the number of these computing systems - including desktops, laptops, smartphones, and the Internet of Things (IoT) - has skyrocketed. Among them, cell phones are practically integral to modern life. The popularity of web-based assaults has skyrocketed with the exponential growth in the number of individuals using the Internet. These web-based assaults are increasingly being combatted by security corporations. Unfortunately, new forms of these assaults are appearing all the time, making it hard for older security measures to stay up. Artificial intelligence (AI) is a source of optimism in the current cybersecurity landscape, offering a potential solution to the ever-changing digital dangers. The fast development of AI over the last decade has given rise to this optimism, because it is now impacting the expansion of every industry. With AI bringing so many advantages in every field, online security is one sector that just cannot afford to ignore it. This planned effort's work represents an advance in that direction. Critical online security issues have been the focus of this proposed work's study, which aims to address these issues using AI. Web security issues for desktop and mobile devices have been addressed in the proposed work. The planned work's contributions to online security are as follows: The 'MalCrawler' web crawler is a targeted tool for finding and exploring the web. This crawler makes it easy to gather websites, particularly ones that are harmful. It does a better job of collecting dangerous websites than a typical crawler. Additionally, it is built to circumvent the evasion strategies used by rogue websites. The crawler's ability to gather webpages - particularly dangerous ones - in order to provide datasets for ML-based an
Ovarian cysts are one of the most common gynecologic disorders encountered in clinical practice. The pelvic computed tomography (CT) scan is a commonly employed examination method used to detect ovarian cyst, which sh...
详细信息
暂无评论