The growing demand for reliable and sustainable energy has driven researchers and engineers to explore renewable energy sources to complement traditional power grids. Wind energy conversion systems (WECS), particularl...
详细信息
This review investigates the effectiveness of exploiting the massive Artificial Intelligence (AI) technology in the diagnosis of prostate cancer histopathological images. It focuses on studying and analyzing the curre...
详细信息
The rapid growth of machine learning(ML)across fields has intensified the challenge of selecting the right algorithm for specific tasks,known as the Algorithm Selection Problem(ASP).Traditional trial-and-error methods...
详细信息
The rapid growth of machine learning(ML)across fields has intensified the challenge of selecting the right algorithm for specific tasks,known as the Algorithm Selection Problem(ASP).Traditional trial-and-error methods have become impractical due to their resource *** Machine Learning(AutoML)systems automate this process,but often neglect the group structures and sparsity in meta-features,leading to inefficiencies in algorithm recommendations for classification *** paper proposes a meta-learning approach using Multivariate Sparse Group Lasso(MSGL)to address these *** method models both within-group and across-group sparsity among meta-features to manage high-dimensional data and reduce multicollinearity across eight meta-feature *** Fast Iterative Shrinkage-Thresholding Algorithm(FISTA)with adaptive restart efficiently solves the non-smooth optimization *** validation on 145 classification datasets with 17 classification algorithms shows that our meta-learning method outperforms four state-of-the-art approaches,achieving 77.18%classification accuracy,86.07%recommendation accuracy and 88.83%normalized discounted cumulative gain.
Underwater wireless sensor networks can monitor ocean information, which provides a new approach to marine environmental monitoring, disaster warning and resource exploration. However, the development of underwater wi...
详细信息
In today's software testing community, quality assessment remains critical, with mutation testing standing as a cornerstone technique for evaluating the effectiveness of test cases. This method involves introducin...
详细信息
It has been observed that individuals prefer to favour information that strengthens their beliefs or values, while information that contradicts them causes unpleasant feelings and is more likely to be ignored. This is...
详细信息
Person re-identification (Re-ID) is a classical computer vision task and has significant applications for public security and information forensics. Recently, long-term Re-ID with clothes-changing has attracted increa...
详细信息
Hypergraphs generalize graphs in such a way that edges may connect any number of nodes. If all edges are adjacent to the same number of nodes, the hypergraph is called uniform. Thus, a graph is a 2-uniform hypergraph....
详细信息
The main contribution of this paper is to propose a methodology for the electromagnetic design of split axial segmentation switched reluctance generators (SRGs) to optimize power and torque. This paper investigates th...
详细信息
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile *** networks are sufficiently scaled to interconnect billions of users and *** i...
详细信息
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile *** networks are sufficiently scaled to interconnect billions of users and *** in academia and industry are focusing on technological advancements to achieve highspeed transmission,cell planning,and latency reduction to facilitate emerging applications such as virtual reality,the metaverse,smart cities,smart health,and autonomous *** continuously improves its network functionality to support these *** input multiple output(MIMO)technology offers spectral efficiency,dependability,and overall performance in *** article proposes a secure channel estimation technique in MIMO topology using a norm-estimation model to provide comprehensive insights into protecting NextG network components against adversarial *** technique aims to create long-lasting and secure NextG networks using this extended *** viability of MIMO applications and modern AI-driven methodologies to combat cybersecurity threats are explored in this ***,the proposed model demonstrates high performance in terms of reliability and accuracy,with a 20%reduction in the MalOut-RealOut-Diff metric compared to existing state-of-the-art techniques.
暂无评论