In order to achieve a highly accurate estimation of solar energy resource potential,a novel hybrid ensemble-learning approach,hybridizing Advanced Squirrel-Search Optimization Algorithm(ASSOA)and support vector regres...
详细信息
In order to achieve a highly accurate estimation of solar energy resource potential,a novel hybrid ensemble-learning approach,hybridizing Advanced Squirrel-Search Optimization Algorithm(ASSOA)and support vector regression,is utilized to estimate the hourly tilted solar irradiation for selected arid regions in ***-term measured meteorological data,including mean-air temperature,relative humidity,wind speed,alongside global horizontal irradiation and extra-terrestrial horizontal irradiance,were obtained for the two cities of Tamanrasset-and-Adrar for two *** computational algorithms were considered and analyzed for the suitability of *** two new algorithms,namely Average Ensemble and Ensemble using support vector regression were developed using the hybridization *** accuracy of the developed models was analyzed in terms of five statistical error metrics,as well as theWilcoxon rank-sum and ANOVA *** the previously selected algorithms,K Neighbors Regressor and support vector regression exhibited good ***,the newly proposed ensemble algorithms exhibited even better *** proposed model showed relative root mean square errors lower than 1.448%and correlation coefficients higher than *** was further verified by benchmarking the new ensemble against several popular swarm intelligence *** is concluded that the proposed algorithms are far superior to the commonly adopted ones.
This study explores methods to efficiently summarize extensive Arabic texts, addressing the growing need to condense large volumes of content across various fields. Three primary techniques are evaluated: Word Frequen...
详细信息
ISBN:
(数字)9798350367775
ISBN:
(纸本)9798350367782
This study explores methods to efficiently summarize extensive Arabic texts, addressing the growing need to condense large volumes of content across various fields. Three primary techniques are evaluated: Word Frequency Analysis, K-means Clustering based on Sentence Proximity, and the PageRank Algorithm. The research finds the PageRank Algorithm to be the most effective, delivering higher compression ratios while maintaining strong recall and precision metrics. In particular, the PageRank method achieved the highest compression ratio of 0.562 while maintaining a population standard deviation of 2.0, compared to other techniques. Evaluation metrics such as population standard deviation, F1 score, and compression ratio support these findings. The study also examines advanced approaches like fuzzy logic-based methods, transformers, and multi-document summarization, aiming to enhance Arabic text summarization.
Various machine learning techniques have been proposed to improve the effectiveness of Intrusion Detection systems (IDS), where IDS is one of the important parts of the network that functions to maintain network secur...
详细信息
ISBN:
(数字)9798331539603
ISBN:
(纸本)9798331539610
Various machine learning techniques have been proposed to improve the effectiveness of Intrusion Detection systems (IDS), where IDS is one of the important parts of the network that functions to maintain network security. With its various capabilities and reputation, Support Vector Machine (SVM) is often applied in various classification cases. However, it has constraints with accuracy and computing time when it comes to data that has large dimensions. Utilizing metaheuristic techniques is one possibility that researchers can use to solve this problem. To overcome this, in this study, we will evaluate the performance of SVM for the IDS case by utilizing the metaheuristic Grey Wolf Optimization (GWO) algorithm. From the experiments with three different iteration models, the best results of the combination of SVM and GWO were found in a model with 10 GWO iterations and 10 populations with an accuracy of 97.47% using 15 features out of 48 original features of the UKM-IDS20 dataset.
In the industry, the need to optimize daily tasks became mainly a requirement to stay competitive. The Facility Layout Problem (FLP) arises from this need and is the most used technique to improved manufacturing proce...
详细信息
Dear editor,This letter presents a deep learning-based prediction model for the quality-of-service(QoS)of cloud ***,to improve the QoS prediction accuracy of cloud services,a new QoS prediction model is proposed,which...
详细信息
Dear editor,This letter presents a deep learning-based prediction model for the quality-of-service(QoS)of cloud ***,to improve the QoS prediction accuracy of cloud services,a new QoS prediction model is proposed,which is based on multi-staged multi-metric feature fusion with individual *** multi-metric features include global,local,and individual *** results show that the proposed model can provide more accurate QoS prediction results of cloud services than several state-of-the-art methods.
Blood is vital for transporting oxygen, nutrients, and hormones to all body parts as it circulates through arteries and veins. It removes carbon dioxide, regulates body temperature, and maintains the body's immune...
详细信息
Sports Science is an interdisciplinary and multidisciplinary science that strives to increase athletic performance and endurance. Sport Science recognizes and prevents injuries. Sensors and statistics formalize Sports...
详细信息
Security is one of the key challenges in container orchestration, especially in complex environments. This paper explores the security aspects of implementing containerized applications using Docker within a Kubernete...
详细信息
ISBN:
(数字)9798331515799
ISBN:
(纸本)9798331515805
Security is one of the key challenges in container orchestration, especially in complex environments. This paper explores the security aspects of implementing containerized applications using Docker within a Kubernetes cluster. The first part of the paper describes Docker, Kubernetes, and various ways of applying them within DevOps methodology. It then presents potential vulnerabilities during the implementation of these technologies, as well as vulnerabilities specific to Docker and Kubernetes. Subsequently, some solutions for securing a Kubernetes environment are described.
A 10-A automotive buck converter is designed and realized on a four layer printed circuit board. The output network is designed in the electromagnetic solver to account for the trace and package parasitic elements. Th...
详细信息
Android currently dominates the smartphone market, accounting for an impressive market share of over 70%. However, because of its widespread acceptance, mobile operating systems have become a prime target for bad acto...
Android currently dominates the smartphone market, accounting for an impressive market share of over 70%. However, because of its widespread acceptance, mobile operating systems have become a prime target for bad actors looking to profit from them. Particularly Android has been subjected to an increasing barrage of malware assaults, including the infamous Android Banking Trojans. This study investigates the effectiveness of static analysis in locating Android banking malware in order to counter this threat. It does so by utilizing a wide range of features, including permissions, application programming interface (API) calls, opcodes, API packages, system commands, intents, strings, services, receivers, and activities. The study suggests using machine learning techniques to assess the detection of Android malware by utilizing various sets of classifiers in order to achieve this goal. The study also uses a feature selection approach to determine which features are most useful for telling malicious code apart from good code. 500 samples of malicious code and 500 samples of benign code make up the dataset that was used. The XGboost algorithm outperforms others in terms of accuracy, achieving an impressive accuracy value of 99.5% in malware detection after conducting a thorough comparison of various classifier sets. These results demonstrate the potential of static analysis and machine learning as useful tools in fending off the growing threats posed by Android malware.
暂无评论