Embedded machine learning has presented the ability to increase the effectiveness of embedded systems by offering a new means to process and adapt to complex data enabling them to detect patterns, anomalies, and repet...
详细信息
As a result of its aggressive nature and late identification at advanced stages, lung cancer is one of the leading causes of cancer-related deaths. Lung cancer early diagnosis is a serious and difficult challenge that...
详细信息
As optimization problems continue to grow in complexity,the need for effective metaheuristic algorithms becomes increasingly ***,the challenge lies in identifying the right parameters and strategies for these *** this...
详细信息
As optimization problems continue to grow in complexity,the need for effective metaheuristic algorithms becomes increasingly ***,the challenge lies in identifying the right parameters and strategies for these *** this paper,we introduce the adaptive multi-strategy Rabbit Algorithm(RA).RA is inspired by the social interactions of rabbits,incorporating elements such as exploration,exploitation,and adaptation to address optimization *** employs three distinct subgroups,comprising male,female,and child rabbits,to execute a multi-strategy *** parameters,including distance factor,balance factor,and learning factor,strike a balance between precision and computational *** offer practical recommendations for fine-tuning five essential RA parameters,making them versatile and *** is capable of autonomously selecting adaptive parameter settings and mutation strategies,enabling it to successfully tackle a range of 17 CEC05 benchmark functions with dimensions scaling up to *** results underscore RA’s superior performance in large-scale optimization tasks,surpassing other state-of-the-art metaheuristics in convergence speed,computational precision,and ***,RA has demonstrated its proficiency in solving complicated optimization problems in real-world engineering by completing 10 problems in CEC2020.
The emergence of multimodal disease risk prediction signifies a pivotal shift towards healthcare by integrating information from various sources and enhancing the reliability of predicting susceptibility to specific d...
详细信息
Organisms on Earth evolve and coexist with natural Electromagnetic Fields(EMFs).Although many reports have suggested the potential anti-neoplastic effects of EMFs with specific parameters,the studies on the influence ...
详细信息
Organisms on Earth evolve and coexist with natural Electromagnetic Fields(EMFs).Although many reports have suggested the potential anti-neoplastic effects of EMFs with specific parameters,the studies on the influence of natural EMFs on cancers are still ***,an EMF emitter has been developed to investigate the effects of the extremely-low frequency SR-mimicking EMF(SREMF)on cancer and normal cell *** numerical simulation has revealed that the emitter with specific parameters is able to enhance EMF intensity and uniformity on the designated plane above the *** importantly,honeycomb-like emitter array can generate a stronger EMF intensity on the 20 mm plane above the *** colony formation assays have demonstrated that SREMF generated by the honeycomb-like emitter array can significantly inhibit Hela cell proliferation in a cell-density-dependent *** morphological changes of SREMF-exposed Hela cells suggest that the anti-proliferative effect of SREMF may be caused by apoptosis *** contrast,no detrimental effect is observed for SREMF-treated normal cells,which probably can be explained by the evolutionary ***,this work can not only contribute to understanding the impact of natural EMF on creatures,but also afford a novel strategy to personalized cancer prevention and treatment.
Embedded virtualization is a key enabler for system designers to meet SWaP-C requirements for mission critical systems that execute various military, aerospace, medical, and commercial applications. The demand is now ...
详细信息
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received c...
详细信息
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received considerable attention in transmitting data and ensuring data confidentiality among cloud servers and users. Various traditional image retrieval techniques regarding security have developed in recent years but they do not apply to large-scale environments. This paper introduces a new approach called Triple network-based adaptive grey wolf (TN-AGW) to address these challenges. The TN-AGW framework combines the adaptability of the Grey Wolf Optimization (GWO) algorithm with the resilience of Triple Network (TN) to enhance image retrieval in cloud servers while maintaining robust security measures. By using adaptive mechanisms, TN-AGW dynamically adjusts its parameters to improve the efficiency of image retrieval processes, reducing latency and utilization of resources. However, the image retrieval process is efficiently performed by a triple network and the parameters employed in the network are optimized by Adaptive Grey Wolf (AGW) optimization. Imputation of missing values, Min–Max normalization, and Z-score standardization processes are used to preprocess the images. The image extraction process is undertaken by a modified convolutional neural network (MCNN) approach. Moreover, input images are taken from datasets such as the Landsat 8 dataset and the Moderate Resolution Imaging Spectroradiometer (MODIS) dataset is employed for image retrieval. Further, the performance such as accuracy, precision, recall, specificity, F1-score, and false alarm rate (FAR) is evaluated, the value of accuracy reaches 98.1%, the precision of 97.2%, recall of 96.1%, and specificity of 917.2% respectively. Also, the convergence speed is enhanced in this TN-AGW approach. Therefore, the proposed TN-AGW approach achieves greater efficiency in image retrieving than other existing
Numerous methods are analysed in detail to improve task schedulingand data security performance in the cloud environment. The methodsinvolve scheduling according to the factors like makespan, waiting time,cost, deadli...
详细信息
Numerous methods are analysed in detail to improve task schedulingand data security performance in the cloud environment. The methodsinvolve scheduling according to the factors like makespan, waiting time,cost, deadline, and popularity. However, the methods are inappropriate forachieving higher scheduling performance. Regarding data security, existingmethods use various encryption schemes but introduce significant serviceinterruption. This article sketches a practical Real-time Application CentricTRS (Throughput-Resource utilization–Success) Scheduling with Data Security(RATRSDS) model by considering all these issues in task scheduling anddata security. The method identifies the required resource and their claim timeby receiving the service requests. Further, for the list of resources as services,the method computes throughput support (Thrs) according to the number ofstatements executed and the complete statements of the service. Similarly, themethod computes Resource utilization support (Ruts) according to the idletime on any duty cycle and total servicing time. Also, the method computesthe value of Success support (Sus) according to the number of completions forthe number of allocations. The method estimates the TRS score (ThroughputResource utilization Success) for different resources using all these supportmeasures. According to the value of the TRS score, the services are rankedand scheduled. On the other side, based on the requirement of service requests,the method computes Requirement Support (RS). The selection of service isperformed and allocated. Similarly, choosing the route according to the RouteSupport Measure (RSM) enforced route security. Finally, data security hasgets implemented with a service-based encryption technique. The RATRSDSscheme has claimed higher performance in data security and scheduling.
The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical *** main objective of nonlinear filtering is to i...
详细信息
The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical *** main objective of nonlinear filtering is to infer the states of a nonlinear dynamical system of interest based on the available noisy measurements. In recent years, the advance of network communication technology has not only popularized the networked systems with apparent advantages in terms of installation,cost and maintenance, but also brought about a series of challenges to the design of nonlinear filtering algorithms, among which the communication constraint has been recognized as a dominating concern. In this context, a great number of investigations have been launched towards the networked nonlinear filtering problem with communication constraints, and many samplebased nonlinear filters have been developed to deal with the highly nonlinear and/or non-Gaussian scenarios. The aim of this paper is to provide a timely survey about the recent advances on the sample-based networked nonlinear filtering problem from the perspective of communication constraints. More specifically, we first review three important families of sample-based filtering methods known as the unscented Kalman filter, particle filter,and maximum correntropy filter. Then, the latest developments are surveyed with stress on the topics regarding incomplete/imperfect information, limited resources and cyber ***, several challenges and open problems are highlighted to shed some lights on the possible trends of future research in this realm.
This study aims to optimize hydrogen (H2) production via ethanol steam reforming (ESR) and water gas shift reaction (WGSR) pathways, focusing on minimizing CO, CO2, and CH4 emissions while maximizing H2 yield. Employi...
详细信息
暂无评论