We present a way the pattern-recognition MARF system can be used as a foundation for algorithms to quickly adapt to intelligent systems (IS) challenges of securing maritime borders by de-tecting rogue rendezvous or pi...
详细信息
ISBN:
(纸本)9781617385872
We present a way the pattern-recognition MARF system can be used as a foundation for algorithms to quickly adapt to intelligent systems (IS) challenges of securing maritime borders by de-tecting rogue rendezvous or pickups done by vessels at territorial waters by analyzing the simulated sensor assets data through a case study of the IS challenge for Canadian borders. The approach allows overall simplicity and data reduction needed to do the challenge increasing the detection speed while maintaining high accuracy.
In this paper, we present a new hybrid binary version of bat and enhanced particle swarm optimization algorithm in order to solve feature selection problems. The proposed algorithm is called Hybrid Binary Bat Enhanced...
详细信息
Up to 53% of the time spent on testing current Intel microprocessors is needed to test on-chip caches, due to the high complexity of memory tests and to the large amount of transistors dedicated to such memories. This...
详细信息
Air pollution by particulate matter (PM) in urban environment is an ongoing problem with increasing severity. With the gradual evolution of electromobility and low-emission heat sources, the focus is shifting to non-e...
详细信息
The article discusses the reasons for the failure of software development projects. Several suggested reasons are mentioned, including scheduling problems, cost overruns, and constantly-changing user requirements. The...
详细信息
The article discusses the reasons for the failure of software development projects. Several suggested reasons are mentioned, including scheduling problems, cost overruns, and constantly-changing user requirements. The expense and difficulty of developing software systems is discussed, noting that minimal understanding is gained from the results of past software development projects; project managers (PMs) must balance pressures from stakeholders such as their company's upper management, marketing department, and accounting department; and the influence of such pressures upon the cost and quality of the final software product.
The prevalence of social media and mobile computing has led to intensive user engagement in the emergent Cyber-Physical-Social-Thinking(CPST)***,the easy access,the lack of governance,and excessive use has generated a...
详细信息
The prevalence of social media and mobile computing has led to intensive user engagement in the emergent Cyber-Physical-Social-Thinking(CPST)***,the easy access,the lack of governance,and excessive use has generated a raft of new behaviors within CPST,which affects users’physical,social,and mental *** this paper,we conceive the Cyber-Syndrome concept to denote the collection of cyber disorders due to excessive or problematic Cyberspace interactions based on CPST *** we characterize the Cyber-Syndrome concept in terms of Maslow’s theory of Needs,from which we establish an in-depth theoretical understanding of Cyber-Syndrome from its etiology,formation,symptoms,and ***,we propose an entropy-based Cyber-Syndrome control mechanism for its computation and *** goal of this study is to give new insights into this rising phenomenon and offer guidance for further research and development.
Breast cancer is become the most prevailing and fastest growing disease. In medical imaging, the use of machine learning and deep learning algorithms is essential. Classification of the tumor to predict the chemothera...
详细信息
Scheduling tasks under resource constraints is essential for project success, and this research focuses on scheduling tasks efficiently to minimize completion time. To tackle this problem, two optimization techniques ...
详细信息
The paper presents a Construction Database Model (CDM) used for the conceptual level modelling of design objects. A primary intention of the CDM model is modelling hierarchically structured objects and construction de...
详细信息
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop...
详细信息
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this ***,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its ***,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation ***,it is used toward secure communication application *** it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)***,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance.
暂无评论