In response to the problem of the filtering error of the CKF algorithm increasing linearly with the dimensionality of the state space, resulting in difficulty in propagating multiplicative noise, and the instability o...
详细信息
In traditional visual simultaneous localization and mapping (vSLAM) systems, feature points are critical for feature matching and pose estimation. However, visual odometry keyframes often contain many dynamic points, ...
详细信息
As society progresses, liquid identification plays an increasingly important role in human life. But for now, minority of existing liquid identification solutions on the market can meet daily requirements of being ubi...
详细信息
Remote sensing (RS) images are frequently observed from multiviews. In this paper, we propose the tensor canonical correlation analysis network (TCCANet) to tackle the multiview RS recognition problem. Particularly, T...
详细信息
Cluster assignment is crucial for analyzing single-cell RNA sequencing (scRNA-seq) data, essential for studying cell diversity and biological functions at the single-cell level. Deep learning-based clustering methods ...
详细信息
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing *** comp...
详细信息
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing *** computing has traditionally played an important role in establishing ***,fog computing has recently emerged as a new field complementing cloud computing due to its enhanced mobility,location awareness,heterogeneity,scalability,low latency,and geographic ***,IoT networks are vulnerable to unwanted assaults because of their open and shared *** a result,various fog computing-based security models that protect IoT networks have been developed.A distributed architecture based on an intrusion detection system(IDS)ensures that a dynamic,scalable IoT environment with the ability to disperse centralized tasks to local fog nodes and which successfully detects advanced malicious threats is *** this study,we examined the time-related aspects of network traffic *** presented an intrusion detection model based on a twolayered bidirectional long short-term memory(Bi-LSTM)with an attention mechanism for traffic data classification verified on the UNSW-NB15 benchmark *** showed that the suggested model outperformed numerous leading-edge Network IDS that used machine learning models in terms of accuracy,precision,recall and F1 score.
Circular RNAs (circRNAs) are non-coding RNA molecules that play a significant role in cell regulation and disease occurrence. In recent years, the use of computational methods to predict circRNAs associated with disea...
详细信息
Cross-domain object detection poses significant challenges due to the susceptibility of object detection models to data variance, particularly the domain shifts that can occur between different domains. To address the...
详细信息
The blades of wind turbines located at high latitudes are often covered with ice in late autumn and winter,where this affects their capacity for power generation as well as their *** identifying the icing of the blade...
详细信息
The blades of wind turbines located at high latitudes are often covered with ice in late autumn and winter,where this affects their capacity for power generation as well as their *** identifying the icing of the blades of wind turbines in remote areas is thus important,and a general model is needed to this *** paper proposes a universal model based on a Deep Neural Network(DNN)that uses data from the Supervisory control and Data Acquisition(SCADA)*** datasets from SCADA are first preprocessed through undersampling,that is,they are labeled,normalized,and *** features of icing of the blades of a turbine identified in previous studies are then used to extract training data from the training dataset.A middle feature is proposed to show how a given feature is correlated with icing on the *** indicators for the model,including a reward function,are also designed to assess its predictive ***,the most suitable model is used to predict the testing data,and values of the reward function and the predictive accuracy of the model are *** proposed method can be used to relate continuously transferred features with a binary status of icing of the blades of the turbine by using variables of the middle *** results here show that an integrated indicator systemis superior to a single indicator of accuracy when evaluating the prediction model.
暂无评论