Arrhythmia has been classified using a variety of *** of the dynamic nature of electrocardiogram(ECG)data,traditional handcrafted approaches are difficult to execute,making the machine learning(ML)solutions more *** w...
详细信息
Arrhythmia has been classified using a variety of *** of the dynamic nature of electrocardiogram(ECG)data,traditional handcrafted approaches are difficult to execute,making the machine learning(ML)solutions more *** with cardiac arrhythmias can benefit from competent monitoring to save their *** arrhythmia classification and prediction have greatly improved in recent *** are a category of conditions in which the heart's electrical activity is abnormally rapid or *** year,it is one of the main reasons of mortality for both men and women,*** the classification of arrhythmias,this work proposes a novel technique based on optimized feature selection and optimized K-nearest neighbors(KNN)*** proposed method makes advantage of the UCI repository,which has a 279-attribute high-dimensional cardiac arrhythmia *** proposed approach is based on dividing cardiac arrhythmia patients into 16 groups based on the electrocardiography dataset’s *** purpose is to design an efficient intelligent system employing the dipper throated optimization method to categorize cardiac arrhythmia *** method of comprehensive arrhythmia classification outperforms earlier methods presented in the *** achieved classification accuracy using the proposed approach is 99.8%.
The advent of Programmable Wireless Environments (PWEs) has transformed the wireless propagation phenomenon into a software-defined resource, leveraging software-defined metasurfaces (SDMs). These new technologies hav...
详细信息
In recent years, there has been a proliferation of Internet of Things (IoT) devices, and so has been the attacks on them. In this paper we will propose a methodology to detect Distributed Denial of Service (DDoS) atta...
In recent years, there has been a proliferation of Internet of Things (IoT) devices, and so has been the attacks on them. In this paper we will propose a methodology to detect Distributed Denial of Service (DDoS) attacks on IoT devices using Machine Learning for Microcontrollers. We will discuss a model which we made for Arduino Nano 33 BLE Sense using Machine Learning for Microcontrollers. Additionally, we will discuss results of our proposal in detecting DDoS attacks on IoT devices. Lastly, we will describe the feasibility of our model on IoT devices.
Many Internet protocol (IP) lookup algorithms have been formulated to improve network performance. This study reviewed and experimentally evaluated technologies for trie-based methods that reduce memory access, memory...
详细信息
Visible Light Communication (VLC) is a promising enabling technology for the next-generation wireless networks, as it complements radio-frequency (RF)-based communications by providing wider bandwidth, higher data rat...
详细信息
Internet of Things (IoT) produces massive amounts of data that need to be processed and saved securely. The strong features of Blockchain makes it as a best candidate for storing the data received from IoT sensors. Ho...
详细信息
Nowadays, massive amounts of multimedia contents are exchanged in our daily life, while tampered images are also flooding the social networks. Tampering detection is therefore becoming increasingly important for multi...
详细信息
As the new generation of power scheme, smart grid is proposed to overcome the shortcomings of traditional systems, such as low efficiency and reliability. In this article, a novel lattice-based secure primitive for pr...
详细信息
This can be one of the most magnificent advantages realized from applying blockchain technology in a forensic investigation context, namely, a transformative approach to address challenges embedded within legal and cr...
详细信息
This study aims to seek the odor source using a multi-agent *** main challenge of the odor source seeking is to search the optimal extremum in the presence of multiple local extrema in a gradient complex *** this,an a...
详细信息
ISBN:
(数字)9789887581536
ISBN:
(纸本)9781665482561
This study aims to seek the odor source using a multi-agent *** main challenge of the odor source seeking is to search the optimal extremum in the presence of multiple local extrema in a gradient complex *** this,an adaptive-extremum seeking control(adaptive-ESC) algorithm has been *** are navigated to the vicinity of the source based on an estimated gradient using *** the proposed algorithm,both the integral gain and the amplitude of the perturbation signal are adjusted *** local convergence of the algorithm has been proved using averaging *** performance of the proposed algorithm is validated through simulations by employing a multi-agent system.
暂无评论