Deep neural networks are vulnerable to adversarial examples, which can fool classifiers by adding small perturbations. Various adversarial attack methods have been proposed in the past several years, and most of them ...
详细信息
As consumer electronics increasingly rely on secure digital transactions, ensuring transaction security remains a formidable challenge, largely due to the severe class imbalance between legitimate and fraudulent trans...
详细信息
Matching-based networks have achieved state-of-the-art performance for video object segmentation (VOS) tasks by storing every-k frames in an external memory bank for future inference. Storing the intermediate frames’...
详细信息
Many studies show that bearings are the most vulnerable components in low-voltage motors. While advanced bearing diagnostic systems exist, their cost can be a barrier for non-critical machinery due to the potential wa...
详细信息
ISBN:
(数字)9798350378078
ISBN:
(纸本)9798350378085
Many studies show that bearings are the most vulnerable components in low-voltage motors. While advanced bearing diagnostic systems exist, their cost can be a barrier for non-critical machinery due to the potential wait time to see a return on investment. This research explores the feasibility of using basic signal processing techniques on vibration data for bearing condition monitoring. The primary goal is to analyze benchmark data from the Case Western Reserve University (CWRU) dataset and establish a baseline performance for this data-driven approach. The results suggest that, with appropriate signal processing, it's possible to achieve early detection of bearing faults, leading to more efficient time-to-fault identification with higher detection accuracies ranging from 83 % to 100 % for each method.
software defects may cause severe crashes in the system, leading to the software's high maintenance costs. Early identification of these defects would lead to high-quality software, thus saving time and money. Thi...
详细信息
ISBN:
(纸本)9781665464666
software defects may cause severe crashes in the system, leading to the software's high maintenance costs. Early identification of these defects would lead to high-quality software, thus saving time and money. This study proposes five feature selection approaches based on evolutionary computing algorithms, each coupled with a majority voting ensemble for software defect prediction. The objective is to improve the existing process by targeting the metric selection stage. The study was conducted on thirty open-source defect datasets. The proposed feature selection techniques were applied on a within-project defect prediction model and a heterogeneous defect prediction model. The Friedman and the Wilcoxon Signed-rank test concluded that the proposed techniques were promising and generated results comparable to some other state-of-the-art feature selection methodologies.
Unlike traditional distributed machine learning, federated learning stores data locally for training and then aggregates the models on the server, which solves the data security problem that may arise in traditional d...
详细信息
The automated generation of radiology reports has attracted significant attention in the field of bioinformatics. Currently, the main limitations of this task include insufficient utilization of prior medical knowledg...
The automated generation of radiology reports has attracted significant attention in the field of bioinformatics. Currently, the main limitations of this task include insufficient utilization of prior medical knowledge, lack of efficient knowledge fusion algorithms, and less distinctiveness between different generated reports. To address these issues, we propose a novel algorithm for radiology report generation, which includes Structured Knowledge-Enhanced Multi-modal Attention (SKEMA) and Dual-Branch Contrastive Learning (DBCL) for the first time. SKEMA aims to effectively bridge the gap between visual and prior knowledge by leveraging the high-order adjacency matrix of the knowledge graph to weightedly fuse image features and knowledge features. We enhance both features through masking, and use the original features and augmented features as positive and negative samples in the dual-branch contrastive learning (DBCL). DBCL increases the differences between positive and negative samples to avoid generating templated results, and enhances the robustness of the model. Finally, we conducted experiments to demonstrate the effectiveness of our model on two public radiology datasets, IU-Xray and MIMIC-CXR. Our model outperformed previous baseline methods on both datasets and achieved excellent evaluation scores.
The existing property registry management does not have a well-defined protocol for verifying and validating transactions that occur within the domain. These transactions rely on handwritten signatures, an unreliable ...
详细信息
ISBN:
(纸本)9798350398106
The existing property registry management does not have a well-defined protocol for verifying and validating transactions that occur within the domain. These transactions rely on handwritten signatures, an unreliable methodology for determining an asset’s ownership. The legal system governs this process. However, several disputes have occurred due to improper validation and verification when registering properties, changing custody, and maintaining the chain of ownership. Trades have been made by including a lower value than the actual asset value, which will reduce the tax owed to the government and will lead to the failure of these departments. There are no appropriate mechanisms to resolve common disputes that arise within the domain. The courts must resolve these disputes using the same recurring traditional procedure, which will take years or decades to conclude. The main objective of this research is to develop a secure property registration mechanism by creating a digital protocol using a decentralized blockchain network. In addition, the research will focus on developing a minimum asset value calculator using machine learning and geographic information system, verifying the authenticity of the generated digital documents, and creating digital deeds for new and old paper-based records.
Combinatorial optimization is a well-established area in operations research and computerscience. Until recently, its methods have focused on solving problem instances in isolation, ignoring that they often stem from...
详细信息
Combinatorial optimization is a well-established area in operations research and computerscience. Until recently, its methods have focused on solving problem instances in isolation, ignoring that they often stem from related data distributions in practice. However, recent years have seen a surge of interest in using machine learning, especially graph neural networks (GNNs), as a key building block for combinatorial tasks, either directly as solvers or by enhancing exact solvers. The inductive bias of GNNs effectively encodes combinatorial and relational input due to their invariance to permutations and awareness of input sparsity. This paper presents a conceptual review of recent key advancements in this emerging field, aiming at optimization and machine learning researchers.
Infrastructure for smart cities is presently being built, mostly because of the (IoT) platform, which connects a wide variety of things by using the website's underlying infrastructure. As a result, it is possible...
详细信息
Infrastructure for smart cities is presently being built, mostly because of the (IoT) platform, which connects a wide variety of things by using the website's underlying infrastructure. As a result, it is possible to employ a uniform platform to automate the services that are delivered. Smart city infrastructure, on the other hand, is susceptible to cyberattacks owing to security flaws in IoT networks. Distributing denial of service (DDoS) and replay assaults, for example, violate the requirements for certification in smart cities. The lack of citations in this part backs up many of the statements it makes. Who needs a citation? Both assaults have the potential to substantially damage smart city infrastructure, which might also cost money and even result in human fatalities. This paper covers the creation of a blended deep- learning algorithm for replay and DDoS intrusion prevention on a growth-oriented smart city platform. This is made possible by combining proven machine-learning approaches with more recent advances in artificial intelligence. We simulate scattered denial of service and replay attacks on three datasets acquired from real-world smart cities to assess the efficacy of the proposed hybrid strategy on environmental, smart river, and smart soil dataset. The suggested model has shown excellent rates of accuracy. The ecosystem collection has an accuracy level of 98.37%, the smart riverbed dataset must have an accuracy of 98.13%, and the smart mud dataset must have an accuracy of 99.51%. The findings demonstrated that the proposed model outperformed past instances of evolutionary computation and machine learning techniques employed in the corpus of academic literature.
暂无评论