In this article,we study the existence and non-existence of weak solutions to the following quasilinear elliptic problem with principal part having degenerate coercivity and nonlinear term involving gradie,■where??RN...
详细信息
In this article,we study the existence and non-existence of weak solutions to the following quasilinear elliptic problem with principal part having degenerate coercivity and nonlinear term involving gradie,■where??RN(N≥3) is a bounded smooth domain,1
Wandering is a significant indicator in the clinical diagnosis of dementia and other related diseases for *** monitoring of long-term continuous movement in indoor setting for detection of wandering movement is challe...
详细信息
Wandering is a significant indicator in the clinical diagnosis of dementia and other related diseases for *** monitoring of long-term continuous movement in indoor setting for detection of wandering movement is challenging because most elders are prone to forget to carry or wear sensors that collect motion information daily due to their declining ***-Fi as an emerging sensing modality has been widely used to monitor human indoor movement in a noninvasive *** order to continuously monitor individuals’indoor motion and reliably identify wandering movement in a non-invasive manner,in this work,we develop a LSTMbased deep classification method that is able to differentiate the wandering-causedWi-Fi signal change from the ***,we first use the off-the-shelf Wi-Fi devices to capture a resident’s indoor motion information,enabling to collect a group ofWi-Fi signal streams,which will be split into variablesize ***,the deep network LSTM is adopted to develop wandering detection method that is able to classify every variable-size segment of Wi-Fi signals into categories according to the well-known wandering spatiotemporal ***,experimental evaluation conducted on a group of realworld Wi-Fi signal streams shows that our proposed LSTMbased detection method is workable and effective to identify indoor wandering behavior,obtaining an average value of 0.9286,0.9618,0.9634 and 0.9619 for accuracy,precision,recall and F-1 score,respectively.
The injective chromatic number χi(G) of a graph G is the minimum number of colors needed to color the vertices of G such that different vertices with the same neighbor are colored differently. In this here, we get so...
详细信息
The coloring theory of graphs is a very important direction in graph theory. The graph coloring problem has a strong application background. Many practical problems such as timetabling problems, frequency allocation p...
详细信息
In reality, the laborious nature of label annotation leads to the widespread existence of limited labeled data. Moreover, multi-scale data have received widespread attention due to its rich knowledge representation. H...
详细信息
The development of information technology brings diversification of data sources and large-scale data sets and calls for the exploration of distributed learning algorithms. In distributed systems, some local machines ...
详细信息
The development of information technology brings diversification of data sources and large-scale data sets and calls for the exploration of distributed learning algorithms. In distributed systems, some local machines may behave abnormally and send arbitrary information to the central machine(known as Byzantine failures), which can invalidate the distributed algorithms based on the assumption of faultless systems. This paper studies Byzantine-robust distributed algorithms for support vector machines(SVMs) in the context of binary classification. Despite a vast literature on Byzantine problems, much less is known about the theoretical properties of Byzantine-robust SVMs due to their unique challenges. In this paper, we propose two distributed gradient descent algorithms for SVMs. The median and trimmed mean operations in aggregation can effectively defend against Byzantine failures. Theoretically, we show the convergence of the proposed estimators and provide the statistical error rates. After a certain number of iterations, our estimators achieve near-optimal rates. Simulation studies and real data analysis are conducted to demonstrate the performance of the proposed Byzantine-robust distributed algorithms.
Functional medicine imaging has been successfully applied to capture functional changes in pathological tissues of the body in recent years. SPECT nuclear medicine functional imaging has the potential to acquire infor...
详细信息
Cardiovascular disease remains the leading cause of death worldwide over the past two decades. Because of a large number of clinical data and the complexity of the disease, it is often challenging to diagnose and make...
详细信息
In recent years,machine learning has made great progress in intrusion detection,network protection,anomaly detection,and other issues in ***,these traditional machine learning algorithms usually require a lot of data ...
详细信息
In recent years,machine learning has made great progress in intrusion detection,network protection,anomaly detection,and other issues in ***,these traditional machine learning algorithms usually require a lot of data to learn and have a low recognition rate for unknown *** them,“one-shot learning”,“few-shot learning”,and“zero-shot learning”are challenges that cannot be ignored for traditional machine *** more intractable problem in cyberspace security is the changeable attack *** a new attack mode appears,there are few or even zero samples that can be ***-learning comes from imitating human problem-solving methods as humans can quickly learn unknown things based on their existing knowledge when *** purpose is to quickly obtain a model with high accuracy and strong generalization through less data *** article first divides the meta-learning model into five research directions based on different principles of *** are model-based,metric-based,optimization-based,online-learning-based,or stacked ***,the current problems in the field of cyberspace security are categorized into three branches:cyber security,information security,and artificial intelligence security according to different ***,the application research results of various meta-learning models on these three branches are *** the same time,based on the characteristics of strong generalization,evolution,and scalability of meta-learning,we contrast and summarize its advantages in solving ***,the prospect of future deep application of meta-learning in the field of cyberspace security is summarized.
Bone scan images has important clinical application value for the early diagnosis and treatment of skeletal lesions in the whole-body. In order to realize classification of multiple diseases (i.e., normal, bone metast...
详细信息
暂无评论