Feature Selection(FS)is an important data management technique that aims to minimize redundant information in a *** work proposes DENGO,an improved version of the Northern Goshawk Optimization(NGO),to address the FS *...
详细信息
Feature Selection(FS)is an important data management technique that aims to minimize redundant information in a *** work proposes DENGO,an improved version of the Northern Goshawk Optimization(NGO),to address the FS *** NGO is an efficient swarm-based algorithm that takes its inspiration from the predatory actions of the northern *** order to overcome the disadvantages that NGO is prone to local optimum trap,slow convergence speed and low convergence accuracy,two strategies are introduced in the original NGO to boost the effectiveness of ***,a learning strategy is proposed where search members learn by learning from the information gaps of other members of the population to enhance the algorithm's global search ability while improving the population ***,a hybrid differential strategy is proposed to improve the capability of the algorithm to escape from the trap of the local optimum by perturbing the individuals to improve convergence accuracy and *** prove the effectiveness of the suggested DENGO,it is measured against eleven advanced algorithms on the CEC2015 and CEC2017 benchmark functions,and the obtained results demonstrate that the DENGO has a stronger global exploration capability with higher convergence performance and ***,the proposed DENGO is used for FS,and the 29 benchmark datasets from the UCL database prove that the DENGO-based FS method equipped with higher classification accuracy and stability compared with eight other popular FS methods,and therefore,DENGO is considered to be one of the most prospective FS ***'s code can be obtained at https://***/matlabcentral/fileexchange/158811-project1.
Wheat is the most widely grown crop in the world,and its yield is closely related to global food *** number of ears is important for wheat breeding and yield ***,automated wheat ear counting techniques are essential f...
详细信息
Wheat is the most widely grown crop in the world,and its yield is closely related to global food *** number of ears is important for wheat breeding and yield ***,automated wheat ear counting techniques are essential for breeding high-yield varieties and increasing grain ***,all existing methods require position-level annotation for training,implying that a large amount of labor is required for annotation,limiting the application and development of deep learning technology in the agricultural *** address this problem,we propose a count-supervised multiscale perceptive wheat counting network(CSNet,count-supervised network),which aims to achieve accurate counting of wheat ears using quantity *** particular,in the absence of location information,CSNet adopts MLP-Mixer to construct a multiscale perception module with a global receptive field that implements the learning of small target attention maps between wheat ear *** conduct comparative experiments on a publicly available global wheat head detection dataset,showing that the proposed count-supervised strategy outperforms existing position-supervised methods in terms of mean absolute error(MAE)and root mean square error(RMSE).This superior performance indicates that the proposed approach has a positive impact on improving ear counts and reducing labeling costs,demonstrating its great potential for agricultural counting *** code is available at .
With the widespread use of machine learning(ML)technology,the operational efficiency and responsiveness of power grids have been significantly enhanced,allowing smart grids to achieve high levels of automation and ***...
详细信息
With the widespread use of machine learning(ML)technology,the operational efficiency and responsiveness of power grids have been significantly enhanced,allowing smart grids to achieve high levels of automation and ***,tree ensemble models commonly used in smart grids are vulnerable to adversarial attacks,making it urgent to enhance their *** address this,we propose a robustness enhancement method that incorporates physical constraints into the node-splitting decisions of tree *** algorithm improves robustness by developing a dataset of adversarial examples that comply with physical laws,ensuring training data accurately reflects possible attack scenarios while adhering to physical *** our experiments,the proposed method increased robustness against adversarial attacks by 100%when applied to real grid data under physical *** results highlight the advantages of our method in maintaining efficient and secure operation of smart grids under adversarial conditions.
Inner product functional encryption (IPFE) offers strong privacy protection for smart devices by outputting only the results of function computations, minimizing data leakage. This makes it well-suited for privacy-pre...
详细信息
Cloud computing, as a promising service platform, has gained significant popularity in addressing emerging data privacy issues in applications such as machine learning and data mining. Researchers have proposed the ve...
详细信息
This paper aims to investigate the problem of gaze object prediction in single images. We propose an application-friendly network based on CLIP for gaze object prediction. To avoid domain bias, we utilize a shallow fe...
详细信息
Anomaly detection(AD)in time series data is widely applied across various industries for monitoring and security applications,emerging as a key research focus within the field of deep *** many methods based on differe...
详细信息
Anomaly detection(AD)in time series data is widely applied across various industries for monitoring and security applications,emerging as a key research focus within the field of deep *** many methods based on different normality assumptions performwell in specific scenarios,they often neglected the overall normality *** feature extraction methods incorporate pre-training processes but they may not be suitable for time series anomaly detection,leading to decreased ***,real-world time series samples are rarely free from noise,making them susceptible to outliers,which further impacts detection *** address these challenges,we propose a novel anomaly detection method called Robust One-Class Classification Detection(ROC).This approach utilizes an autoencoder(AE)to learn features while constraining the context vectors fromthe AE within a sufficiently small hypersphere,akin to One-Class Classification(OC)*** simultaneously optimizing two hypothetical objective functions,ROC captures various aspects of *** categorize the input raw time series into clean and outlier sequences,reducing the impact of outliers on compressed feature *** results on publicdatasets indicate that our approach outperforms existing baselinemethods and substantially improves model robustness.
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of ***,decentralized threshold key management schemes have become a...
详细信息
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of ***,decentralized threshold key management schemes have become a research focus for blockchain private key *** security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset *** threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public *** design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public *** proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart *** to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities.
Music recommendation algorithms, from the perspective of real-time, can be classified into two categories: offline recommendation algorithms and online recommendation algorithms. To improve music recommendation accura...
详细信息
Music recommendation algorithms, from the perspective of real-time, can be classified into two categories: offline recommendation algorithms and online recommendation algorithms. To improve music recommendation accuracy, especially for the new music(users have no historic listening records on it), and real-time recommendation ability, and solve the interest drift problem simultaneously, we propose a hybrid music recommendation model based on personalized measurement and game theory. This model can be separated into two parts: an offline recommendation part(OFFLRP) and an online recommendation part(ONLRP). In the offline part, we emphasize users personalization. We introduce two metrics named user pursue-novelty degree(UPND) and music popularity(MP) to improve the traditional items-based collaborative filtering algorithm. In the online part, we try to solve the interest drift problem, which is a thorny problem in the offline part. We propose a novel online recommendation algorithm based on game theory. Experiments verify that the hybrid music recommendation model has higher new music recommendation accuracy, decent dynamical personalized recommendation ability, and real-time recommendation capability, and can substantially mitigate the problem of interest drift.
Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and *** special structure of WSN brings both convenience and *** example,a malicious participa...
详细信息
Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and *** special structure of WSN brings both convenience and *** example,a malicious participant can launch attacks by capturing a physical ***,node authentication that can resist malicious attacks is very important to network ***,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for *** our scheme,all nodes are managed by utilizing the identity information stored on the ***,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection *** experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network.
暂无评论