This research focuses on creating a Drug Information and Recommendation System using Amazon Web Services (AWS) for sentiment analysis of pharmaceutical reviews. The methodology encompasses data collection, preprocessi...
详细信息
Evolutionary Algorithms (EAs) are the solution approaches for solving optimization problems using the classical generate-and-test method. These algorithms are widely used by the practitioners for solving the optimizat...
详细信息
The great challenges faced by modern power systems require a fresh look at the conventional operation paradigm. The significant challenges faced by modern power systems require an innovative method for the conventiona...
详细信息
The great challenges faced by modern power systems require a fresh look at the conventional operation paradigm. The significant challenges faced by modern power systems require an innovative method for the conventional operation paradigm. We claim that the decarbonization of the power grid and extensive electrification of numerous sectors of human activity can only be fostered by a self-adaptable and smart power grid that manifests similar qualities to those of the Internet. The Internet is constructed on a layered architecture that facilitates technology innovations and its intelligence is distributed throughout a hierarchy of networks. In this paper, the fundamental differences between the network data flows and power flows are examined, and the basic requirements for an innovative operation paradigm are highlighted. The current power grid is operated in a highly inflexible, centralized manner to meet increased security goals. A new highly flexible, distributed architecture can be realized by distributing the operation responsibility in smaller areas or even in grid components that can make autonomous decisions. The characteristics of such a power grid are presented, and the key features and advances for the on-going transition to a sustainable power system are identified. Finally, a case study on distributed voltage control is presented and discussed.
The paper discusses the high computational costs associated with convolutional neural networks (CNNs) in real-world applications due to their complex structure, primarily in hidden layers. To overcome this issue, the ...
详细信息
Wireless sensor networks have been adopted widely in various application and these networks play crucial role in numerous real-time monitoring systems. However, the event occurrence, detection of event and localizing ...
详细信息
Chronic Kidney Disease (CKD) afflicts approximately 20% of the global population, underscoring the pressing need for precise detection and diagnosis. Accurate kidney segmentation in medical imaging is pivotal for capt...
详细信息
The information spread uses a social media platform, where one user intends to share information with others intentionally or non-intentionally. The rapid spread of information on social media platforms is a complex p...
详细信息
Understanding the prevalence and severity of accidental falls among the elderly is crucial. Even for those living independently, falls are frequent and can lead to severe injuries, often being a primary cause of elder...
详细信息
Dear Editor,This letter is concerned with prescribed-time Nash equilibrium(PTNE)seeking problem in a pursuit-evasion game(PEG)involving agents with second-order *** order to achieve the prior-given and user-defined co...
详细信息
Dear Editor,This letter is concerned with prescribed-time Nash equilibrium(PTNE)seeking problem in a pursuit-evasion game(PEG)involving agents with second-order *** order to achieve the prior-given and user-defined convergence time for the PEG,a PTNE seeking algorithm has been developed to facilitate collaboration among multiple pursuers for capturing the evader without the need for any global ***,it is theoretically proved that the prescribedtime convergence of the designed algorithm for achieving Nash equilibrium of ***,the effectiveness of the PTNE method was validated by numerical simulation results.A PEG consists of two groups of agents:evaders and *** pursuers aim to capture the evaders through cooperative efforts,while the evaders strive to evade *** is a classic noncooperative *** has attracted plenty of attention due to its wide application scenarios,such as smart grids[1],formation control[2],[3],and spacecraft rendezvous[4].It is noteworthy that most previous research on seeking the Nash equilibrium of the game,where no agent has an incentive to change its actions,has focused on asymptotic and exponential convergence[5]-[7].
In recent days the usage of android smartphones has increased exten-sively by *** are several applications in different categories bank-ing/finance,social engineering,education,sports andfitness,and many more *** androi...
详细信息
In recent days the usage of android smartphones has increased exten-sively by *** are several applications in different categories bank-ing/finance,social engineering,education,sports andfitness,and many more *** android stack is more vulnerable compared to other mobile plat-forms like IOS,Windows,or Blackberry because of the open-source *** the Existing system,malware is written using vulnerable system calls to bypass signature detection important drawback is might not work with zero-day exploits and stealth *** attackers target the victim with various attacks like adware,backdoor,spyware,ransomware,and zero-day exploits and create threat hunts on the day-to-day *** the existing approach,there are various tradi-tional machine learning classifiers for building a decision support system with limitations such as low detection rate and less feature *** important contents taken for building model from android applications like Intent Filter,Per-mission Signature,API Calls,and System commands are taken from the manifestfi*** function parameters of various machine and deep learning classifiers like Nave Bayes,k-Nearest Neighbors(k-NN),Support Vector Machine(SVM),Ada Boost,and Multi-Layer Perceptron(MLP)are done for effective *** our pro-posed work,we have used an unsupervised learning multilayer perceptron with multiple target labels and built a model with a better accuracy rate compared to logistic regression,and rank the best features for detection of applications and clas-sify as malicious or benign can be used as threat model by online antivirus scanners.
暂无评论