The phenomena of data explosion in different areas of life require enhanced methods to performing big data analysis. This paper proposes the Hybrid Intelligent Machine Learning System (HIMLS) which work through the co...
详细信息
ISBN:
(数字)9798350350067
ISBN:
(纸本)9798350350074
The phenomena of data explosion in different areas of life require enhanced methods to performing big data analysis. This paper proposes the Hybrid Intelligent Machine Learning System (HIMLS) which work through the combination of multiple machine learning approaches to improve the efficacy of big data analysis. HIMLS applies the benefits of both supervised and unsupervised learning, integrates deep learning models and ensemble methods to solve the difficulties which are from high-dimension learning and heterogeneous data. As a result of combining feature selection with the process of dimensionality reduction HIMLS moderates the curse of dimensionality which enhances the models’ predictive capability while lowering the computational requirements. It is proved that the system works on actual big data implementation, exhibits a better solution in terms of the accuracy of the model, size, and stability aspects in contrast to the conventional machine learning approaches. This research also analyses the effects that different techniques of hyperparameters optimization select and the involvement of distributed computing systems for speeding up analytics. Thus the study infers HIMLS as a suitable solution to the shortcomings characterized by current big data analytical techniques, giving an efficient method for harnessing big data solutions.
Colorization is the process of adding color to grayscale images using computer algorithms. There are several approaches to color an image, including precise image segmentation algorithms, deep learning algorithms, and...
Colorization is the process of adding color to grayscale images using computer algorithms. There are several approaches to color an image, including precise image segmentation algorithms, deep learning algorithms, and manually colored local color expansion methods. However, one common problem with these approaches is the occurrence of “color bleeding”, where colors from one region of the image spill over into adjacent regions. In this paper, we propose a new manually colored local color expansion algorithm that considers the intensity value difference and distance difference between the central pixel in the window and its neighbor pixels comprehensively. Combined with side window filtering, our algorithm significantly reduces the occurrence of colors bleeding at the edges of the colored image. The experiments demonstrate the effectiveness of the proposed algorithm.
In this research, we have projected and carried out a novel fishbone network that shows better performance in the term of minimizing the packet delay with respect to sink speed. Previous study implies that sector angl...
详细信息
In this research, we have projected and carried out a novel fishbone network that shows better performance in the term of minimizing the packet delay with respect to sink speed. Previous study implies that sector angle affects greatly on designing fishbone network. Finite Set of nodes arranges to sense the physical condition of any system is called wireless sensor. Our designed fishbone network can be potentially applied for a wireless sensing system to formulate a whole network. The network is a novel design which has been finalized by comparing sector angle. Analysis takes place by varying packet delay according to sink speed. Future analysis takes place for Quality of Service (QoS) and Quality of Experience (QoE). Latency of Packet and its size is the measurement criteria of any network or service is called Quality of Service (QoS). On the other hand the user experience of using the designed network is called Quality of Experience (QoE). Our designed network has been analyzed in TCP Tracer to find out the latency or packet delay for different users. The user data has been shorted and equated among them for latency with different no of packets. Our proposed spiral fishbone network shows better QoS and QoE. In future more nodes can be added to design extended fishbone network for wireless.
In the era of Internet of Everything (IoE), there is an explosive growth in data volumes and the data usually with time series characteristics. Therefore, how to deal with time series data to improve prediction accura...
In the era of Internet of Everything (IoE), there is an explosive growth in data volumes and the data usually with time series characteristics. Therefore, how to deal with time series data to improve prediction accuracy remains a critical issue. In this paper, an efficient hybrid scheme combining linear and nonlinear models is proposed to greatly improve the prediction performance and simplify the hyperparameter selection process. Gradient-based least mean square (GD-LMS) is introduced for adaptive linear section, while a hyperparameter-determined long short-term memory (LSTM) is used for nonlinear section. In particular, an improved sparrow search algorithm combining opposition-based learning and Cauchy variance (ISSA) is used to construct the optimal hyperparameters for the two-layer LSTM. computer simulations with the UMass weather dataset reveal that the proposed scheme considerably outperforms three benchmarking methods in terms of data prediction accuracy and robustness.
Cyber-Physical Systems such as those in the SCADA architecture and the entire industrial control system networks have now become essential components of the cyberspace due to their integration with modern IT networks....
Cyber-Physical Systems such as those in the SCADA architecture and the entire industrial control system networks have now become essential components of the cyberspace due to their integration with modern IT networks. Cyber attackers have taken advantage of these vulnerable critical assets that have suddenly found themselves in an unprepared situation enabled by the Internet of Things Paradigm. Intrusions into the new CyberSCADA networks seem to go unabated as the proprietary communication protocols in these systems lack security mechanisms to help intrusion detection and analysis. In addition, existing network analyzers are weak in identifying granular details from traffic in these legacy networks that could help track, detect and investigate intrusions. This study performed a passive fingerprinting exercise on captured network data using Grassmarlin and identified useful metadata of critical network devices. The results demonstrate that fingerprints, metadata and critical assets' inventory on Grassmarlin would help industry-based cybersecurity personnel improve intrusion detections on CyberSCADA networks.
The occurrences of bugs are not isolated events, rather they may interact, affect each other, and trigger other latent bugs. Identifying and understanding bug correlations could help developers localize bug origins, p...
详细信息
it then selects the node with the smallest distance and adds it to the set of visited nodes. The heuristic function estimates the distance between each node and the goal node, allowing the algorithm to explore nodes t...
it then selects the node with the smallest distance and adds it to the set of visited nodes. The heuristic function estimates the distance between each node and the goal node, allowing the algorithm to explore nodes that are likely to lead to the goal node first.. Once the graph is constructed, you can apply Dijkstra algorithm. Traditional algorithms, such as Dijkstra and Floyd-War shall, have been used to solve this problem efficiently, but their performance can be affected by the complexity and size of the network.
Ubiquitination is a prevalent and reversible post-translational modification (PTM) that controls apoptosis and plays a crucial role in protein breakdown and cell disorders. Ubiquitination also involved in the control ...
详细信息
ISBN:
(数字)9798331519094
ISBN:
(纸本)9798331519100
Ubiquitination is a prevalent and reversible post-translational modification (PTM) that controls apoptosis and plays a crucial role in protein breakdown and cell disorders. Ubiquitination also involved in the control of a number of physiological mechanisms such as cellular proliferation, gene transcription, intracellular signaling, DNA correction, and synthesis. However, experimental identification of ubiquitination sites prediction is time-consuming and costly, so it is an urgent need to construct effective predictors. In this paper, a novel predictor called UbiSite-DeepWET has been developed to accurately predict ubiquitination sites from sequences using a convolutional neural network (CNN) model. First, we perform nine feature extraction method, namely Amino Acid Composition (AAC), Dipeptide Compostion (DPC), Composition of k-spaced Amino Acid Pairs (CKSAAP), Pseudo-Amino Acid Composition (PAAC), Amino Acid index (AAindex) database, Word2Vec, GloVe and fastText, to represent protein sequence patterns. Secondly, SHapley Additive exPlanations (SHAP) are used to remove unnecessary and irrelevant features for predicting ubiquitination sites. Finally, the best features are fed into the CNN classifier to build the UbiSite-DeepWET model for identifying the protein ubiquitination sites. Five-fold cross validation shows that the AUC values of Set1-Set6 datasets are 0.8846, 0.7764, 0.7881, 0.7740, 0.6870 and 0.7238, respectively. The Adaptive synthetic sampling approach (ADASYN) is applied in Set4 to Set6 unbalanced datasets, and the AUC values are 0.9929, 0.9975 and 0.9971, respectively. Additionally, we have created three independent test (IT) datasets which the AUC values are 0.8529, 0.6215 and 0.6001, respectively. The results demonstrate that the proposed technique UbiSite-DeepWET outperforms conventional ubiquitination prediction methods and offers new guidance for the identification of ubiquitination sites.
Deep learning methods for material property prediction have been widely explored to advance materials discovery. However, the prevailing pre-train then fine-tune paradigm often fails to address the inherent diversity ...
详细信息
E-administration is performing administrative works via computer and its associated technologies such as the Internet. It is administrative efforts that center on the exchange of information and providing services to ...
详细信息
E-administration is performing administrative works via computer and its associated technologies such as the Internet. It is administrative efforts that center on the exchange of information and providing services to people and the business sector at high speed and low cost through computers and networks with the assurance of maintaining information security. It is based on the positive investment in information technology and communication in administrative practices. This paper presents the design of the e-administration platform that adopts the concept of cryptography for identity management. The architectural framework of the platform comprises subcomponents for service and forms identification, business process redesign, service architecture, amalgamation, and deployment. The cryptography model for securing the platform was designed based on the combination of authentication criteria presented in the Rijndael-Advanced Encryption Standard (AES), Lattice-based cryptography (LBC), and Secure Hash Algorithm (SHA512). It is required that a record be encrypted prior to its commitment to the database via a double encryption method. The AES algorithm-based encryption’s output will form the input to the LBC algorithm to obtain the final output.
暂无评论