According to the enterprise data, this paper establishes the cluster analysis model and the hierarchical analysis model based on TOPSIS to help banks analyze their credit risk and make credit decisions. First of all, ...
According to the enterprise data, this paper establishes the cluster analysis model and the hierarchical analysis model based on TOPSIS to help banks analyze their credit risk and make credit decisions. First of all, we preprocess the data, and divide 99 enterprises into six categories based on credit rating, ticket rejection rate and enterprise profit proportion. Secondly, with quota and interest rate as the first level indicators, strength, supply and demand stability, risk and reputation as the second level indicators, the scores of six categories of enterprises under quota and interest rate are determined by subjective and objective weighting method. Then the Credit Strategies of different types of enterprises are determined by the score. Considering the default rate of enterprises, the “0-1“ programming model is established. Finally, the objective evaluation and promotion of the model are carried out.
Recently,COVID-19 has posed a challenging threat to researchers,scientists,healthcare professionals,and administrations over the globe,from its diagnosis to its *** researchers are making persistent efforts to derive ...
详细信息
Recently,COVID-19 has posed a challenging threat to researchers,scientists,healthcare professionals,and administrations over the globe,from its diagnosis to its *** researchers are making persistent efforts to derive probable solutions formanaging the pandemic in their *** of the widespread and effective ways to detect COVID-19 is to utilize radiological images comprising X-rays and computed tomography(CT)*** the same time,the recent advances in machine learning(ML)and deep learning(DL)models show promising results in medical ***,the convolutional neural network(CNN)model can be applied to identifying abnormalities on chest *** the epidemic of COVID-19,much research is led on processing the data compared with DL techniques,particularly *** study develops an improved fruit fly optimization with a deep learning-enabled fusion(IFFO-DLEF)model for COVID-19 detection and *** major intention of the IFFO-DLEF model is to investigate the presence or absence of *** do so,the presented IFFODLEF model applies image pre-processing at the initial *** addition,the ensemble of three DL models such as DenseNet169,EfficientNet,and ResNet50,are used for feature ***,the IFFO algorithm with a multilayer perceptron(MLP)classification model is utilized to identify and classify *** parameter optimization of the MLP approach utilizing the IFFO technique helps in accomplishing enhanced classification *** experimental result analysis of the IFFO-DLEF model carried out on the CXR image database portrayed the better performance of the presented IFFO-DLEF model over recent approaches.
This project's aim is to monitor the electrical activity of the user's muscle cells using the QNET Myoelectric Board and NI ELVIS II+ board. An opto-isolated sensor and a grounding strap are included in this e...
详细信息
Melanoma is a malicious form of skin cancer and can develop wounds on the entire human body which can lead to the victim's demise at the advanced level. The timely and accurate detection of melanoma moles can prev...
详细信息
ISBN:
(数字)9798331518844
ISBN:
(纸本)9798331518851
Melanoma is a malicious form of skin cancer and can develop wounds on the entire human body which can lead to the victim's demise at the advanced level. The timely and accurate detection of melanoma moles can prevent the victims from painful treatment and surgeries. However., immense similarity among the healthy and diseased areas and massive variations in the mass, contour., and shades of the melanoma moles complicate the recognition process. Here., we have employed a deep learning (DL) framework named the CornerNet model for the localization and categorization of skin lesions. The Hourglass-oriented CornerNet approach is used for deep features calculations which are later grouped by the one-step object recognizer network of the employed solution. The approach is tested on a standard data sample called the ISIC-2016 database and secured the average mAP and IOU values of 0.916., and 0.921 with an accuracy value of 90.08%. The model testing confirmed that our solution is vigorous for melanoma mole detection and cataloging.
Due to the susceptibility of MEMS devices to temperature variations owing to their micro-mechanical structures, it becomes imperative to perform temperature drift correction to enhance the accuracy of measurement outc...
Due to the susceptibility of MEMS devices to temperature variations owing to their micro-mechanical structures, it becomes imperative to perform temperature drift correction to enhance the accuracy of measurement outcomes. Translate to English: When analyzing real experimental data, by contrasting the zero-offset outputs of MEMS at the same temperature and under different temperature variations, it is deduced that the zero-offset output of MEMS is associated with the temperature slope. This study proposes the utilization of input units that encompass temperature variation rate information in lieu of single-valued inputs, and employs the Support Vector Regression (SVR) method to model and forecast the static zero-offset output as a function of temperature variations. Experimental results demonstrate a substantial reduction in the mean squared error (MSE) on the testing set when compared to scenarios where temperature variation rate is not considered, with the MSE decreasing by orders of magnitude.
In this paper, we propose a method for robot grasping based on reinforcement learning. A six-degree-of-freedom robot is used to execute the grasping action, and an RGB-D camera is used as a sensing module to collect t...
详细信息
We employ a game-theoretic approach to mitigate stealthy spoofing attacks on an aerial cyber-physical system. The attacker's objective is to drive the vehicle away from its nominal trajectory while misleading the ...
详细信息
ISBN:
(数字)9798350382655
ISBN:
(纸本)9798350382662
We employ a game-theoretic approach to mitigate stealthy spoofing attacks on an aerial cyber-physical system. The attacker's objective is to drive the vehicle away from its nominal trajectory while misleading the system operator of the adversarial deviation. We characterize this as a dual actuation-deception attack; the former involves corrupting the vehicle's actuating input, and the latter is done by spoofing the measurable output; that is, the acceleration effort and the Global Navigation Satellite System (GNSS) sensor reading, respectively. The attack is designed to be stealthy, implying that its effect on the system's trajectory is indiscernible from that of a naturally occurring disturbance. The defender aims to counter such an attack and steer the aerial vehicle back towards its nominal path. We couple receding horizon control and game-theoretic methods to derive optimal attack and defense policies.
Previous research has shown that using sand as an explosive barrier material to design super-large explosion containment vessels is the most ideal. Therefore, it is essential to analyze the dynamic strain variation of...
详细信息
District Heating (DH) systems are essential for energy-efficient urban heating. However, despite the advancements in automated fault detection and diagnosis (FDD), DH still faces challenges in operational faults that ...
详细信息
Generating coherent and credible explanations remains a significant challenge in the field of AI. In recent years, researchers have delved into the utilization of entailment trees to depict explanations, which exhibit...
详细信息
暂无评论