This paper investigates covert communications in a multi-relay Internet of Things (IoT) system with multiple energy harvesting jammers, where a transmitter (Alice) attempts to covertly transmit confidential messages t...
详细信息
This paper investigates the resource sharing problem in a multi-unmanned aerial vehicle (UAV) wireless network by utilizing the multi-agent reinforcement learning (MARL) method. Specifically, the considered multi-UAV ...
详细信息
Monitoring sugar concentration during fermentation is crucial for producing high-quality alcoholic beverages. Traditional methods for measuring sugar concentration can be costly and time-consuming, especially for smal...
详细信息
In this paper,a combined robust fault detection and isolation scheme is studied for satellite system subject to actuator faults,external disturbances,and parametric *** proposed methodology incorporates a residual gen...
详细信息
In this paper,a combined robust fault detection and isolation scheme is studied for satellite system subject to actuator faults,external disturbances,and parametric *** proposed methodology incorporates a residual generation module,including a bank of filters,into an intelligent residual evaluation ***,residual filters are designed based on an improved nonlinear differential algebraic approach so that they are not affected by external *** residual evaluation module is developed based on the suggested series and parallel ***,a new ensemble classification scheme defined as blended learning integrates heterogeneous classifiers to enhance the performance.A wide range of simulations is carried out in a high-fidelity satellite simulator subject to the constant and time-varying actuator faults in the presence of disturbances,manoeuvres,uncertainties,and *** obtained results demonstrate the effectiveness of the proposed robust fault detection and isolation method compared to the traditional nonlinear differential algebraic approach.
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain...
详细信息
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware *** this gap can provide valuable insights for enhancing cybersecurity *** numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware *** the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security *** study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows *** objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows *** the accuracy,efficiency,and suitability of each classifier for real-world malware detection *** the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and *** recommendations for selecting the most effective classifier for Windows malware detection based on empirical *** study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and *** data analysis involves understanding the dataset’s characteristics and identifying preprocessing *** preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for *** training utilizes various
A capsule neural network faces significant challenges in achieving high accuracy on complex datasets due to its high computational complexity and limited ability to represent features. To overcome these limitations, t...
详细信息
Emotion Recognition in Conversations(ERC)is fundamental in creating emotionally ***-BasedNetwork(GBN)models have gained popularity in detecting conversational contexts for ERC ***,their limited ability to collect and ...
详细信息
Emotion Recognition in Conversations(ERC)is fundamental in creating emotionally ***-BasedNetwork(GBN)models have gained popularity in detecting conversational contexts for ERC ***,their limited ability to collect and acquire contextual information hinders their *** propose a Text Augmentation-based computational model for recognizing emotions using transformers(TA-MERT)to address *** proposed model uses the Multimodal Emotion Lines Dataset(MELD),which ensures a balanced representation for recognizing human *** used text augmentation techniques to producemore training data,improving the proposed model’s *** encoders train the deep neural network(DNN)model,especially Bidirectional Encoder(BE)representations that capture both forward and backward contextual *** integration improves the accuracy and robustness of the proposed ***,we present a method for balancing the training dataset by creating enhanced samples from the original *** balancing the dataset across all emotion categories,we can lessen the adverse effects of data imbalance on the accuracy of the proposed *** results on the MELD dataset show that TA-MERT outperforms earlier methods,achieving a weighted F1 score of 62.60%and an accuracy of 64.36%.Overall,the proposed TA-MERT model solves the GBN models’weaknesses in obtaining contextual data for ***-MERT model recognizes human emotions more accurately by employing text augmentation and transformer-based *** balanced dataset and the additional training samples also enhance its *** findings highlight the significance of transformer-based approaches for special emotion recognition in conversations.
Neutrosophic Sets and Systems (NSS) has become an important Journal for neutrosophic theory and its applications in uncertainty modeling and decision sciences. In 2023, NSS celebrated its 10th anniversary, marking a d...
详细信息
Face authentication is an important biometric authentication method commonly used in security *** is vulnerable to different types of attacks that use authorized users’facial images and videos captured from social me...
详细信息
Face authentication is an important biometric authentication method commonly used in security *** is vulnerable to different types of attacks that use authorized users’facial images and videos captured from social media to perform spoofing attacks and dynamic movements for penetrating secur-ity *** paper presents an innovative challenge-response emotions authentication model based on the horizontal ensemble *** proposed model provides high accurate face authentication process by challenging the authorized user using a random sequence of emotions to provide a specific response for every authentication trial with a different sequence of *** proposed model is applied to the KDEF dataset using 10-fold *** improvements are made to the proposed ***,the VGG16 model is applied to the seven common ***,the system usability is enhanced by analyzing and selecting only the four common and easy-to-use ***,the horizontal ensemble technique is applied to enhance the emotion recognition accuracy and minimize the error during authen-tication ***,the Horizontal Ensemble Best N-Losses(HEBNL)is applied using challenge-response emotion to improve the authentication effi-ciency and minimize the computational *** successive improvements implemented on the proposed model led to an improvement in the accuracy from 92.1%to 99.27%.
The evaluation of generative models in Machine Reading Comprehension (MRC) presents distinct difficulties, as traditional metrics like BLEU, ROUGE, METEOR, Exact Match, and F1 score often struggle to capture the nuanc...
暂无评论