Performance evaluation of shipboard electronic systems entails debugging the systems in a laboratory environment, placing them in service and relving on svstem operators to provide feedback. General testing can be per...
Performance evaluation of shipboard electronic systems entails debugging the systems in a laboratory environment, placing them in service and relving on svstem operators to provide feedback. General testing can be performed at selected sites by system designers, but each site where equipment is to be installed can offer unique problems. It is impossible to predict all the scenarios. Unique problems are more the rule than the exception when equipment is destined for Navy ships. Ship deployments make for difficult logistics when sending test teams to evaluate system failures. So, out of necessity, if newly installed equipment receives the proper inputs and generates the proper outputs, it is accepted and becomes the sailor's responsibilitv to maintain. In cases where documentation is ambiguous or incomplete, it is left to the sailor's ingenuity to continue testing and training on equipment. This is generallv obtained through computer simulations and back-to-back testing which can provide results for ideal conditions, but does not take the dynamics of interference into account. Remote site testing is the only way to get a true representation of equipment performance and training problems. Electronic system operators on board Navy vessels are fortunate, thev have help. There exists an organization available near major naval ports worldwide whose existence is to test electronic systems performance. The testing utilizes electronic systems as they would normally be configured for operations. This organization is the Shipboard Electronic Svstem Evaluation Facility (SESEF).
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp...
详细信息
Cities have become increasingly interdependent. Yet we continue to think of the urban landscape in terms of mutually exclusive, monocentric regions. Data from New England suggest a richer, overlapping geography of met...
Cities have become increasingly interdependent. Yet we continue to think of the urban landscape in terms of mutually exclusive, monocentric regions. Data from New England suggest a richer, overlapping geography of metropolitan-area commuting fields. New ways of conceptualizing flow-based systems are needed to understand urban settlement patterns better.
Because of the increased market opening and massive data collection brought about by globalization, the need of maintaining control over customs procedures has increased. However, the integration and processing of cus...
详细信息
ISBN:
(数字)9798350391183
ISBN:
(纸本)9798350391190
Because of the increased market opening and massive data collection brought about by globalization, the need of maintaining control over customs procedures has increased. However, the integration and processing of customs data are complicated by its extreme imbalance. Finding autonomous, computationally sophisticated solutions for customs handling is therefore crucial. The study described in this paper aims to propose an artificial intelligence-based method for customs fraud detection through data analytics. A machine learning-based approach for detecting customs fraud is proposed. The research methodology includes data preprocessing, data analytics, combining results, and deriving precise solutions from results obtained. The aim is to extract meaningful information from a dataset. For the purpose of classifying customs fraud, seven algorithms for machine-learning-kNN, SGD, Constant, Logistic Regression, Random Forest, Neural Network, and Naive Bayes-are chosen and empirically assessed.
The websites of the universities of Africa's most populous country Nigeria were examined. The goal was to unearth the reasons why external hyperlinks are placed on these sites and identify any peculiarities by geo...
详细信息
We present an analysis of the feasibility of executing a parallel bioinspired model of laser dynamics, based on cellular automata (CA), on the usual target platform of this kind of applications: a heterogeneous non-de...
详细信息
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of featu...
详细信息
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of features using typical *** a result,a new metaheuristicsbased feature selection method based on the dipper-throated and grey-wolf optimization(DTO-GW)algorithms has been developed in this *** can result when the selection of features is subject to metaheuristics,which can lead to a wide range of ***,we adopted hybrid optimization in our method of optimizing,which allowed us to better balance exploration and harvesting chores more *** propose utilizing the binary DTO-GW search approach we previously devised for selecting the optimal subset of *** the proposed method,the number of features selected is minimized,while classification accuracy is *** test the proposed method’s performance against eleven other state-of-theart approaches,eight datasets from the UCI repository were used,such as binary grey wolf search(bGWO),binary hybrid grey wolf,and particle swarm optimization(bGWO-PSO),bPSO,binary stochastic fractal search(bSFS),binary whale optimization algorithm(bWOA),binary modified grey wolf optimization(bMGWO),binary multiverse optimization(bMVO),binary bowerbird optimization(bSBO),binary hysteresis optimization(bHy),and binary hysteresis optimization(bHWO).The suggested method is superior 4532 CMC,2023,vol.74,no.2 and successful in handling the problem of feature selection,according to the results of the experiments.
T he VPN and SSL were both designed to negotiate telecom-munication security. The VPN is the Virtual Private Network; the SSL is the Secure Socket Layer or, more properly, Transport Layer Security.
T he VPN and SSL were both designed to negotiate telecom-munication security. The VPN is the Virtual Private Network; the SSL is the Secure Socket Layer or, more properly, Transport Layer Security.
We analyzed the methods and means of quality monitoring of the functioning of natural protective forest stands along the railroad tracks. On the basis of experimental studies, we identified the factors of horizontal a...
详细信息
We analyzed the methods and means of quality monitoring of the functioning of natural protective forest stands along the railroad tracks. On the basis of experimental studies, we identified the factors of horizontal and vertical structure of protective consortive ecotones (PCE), influencing the effectiveness of protection of the railroad tracks and the natural environment as a whole. We propose structures of basic modules for the quality monitoring system over the functioning of the PCE along the railroad tracks on the basis of the generalized structure of information systems (IS), smart measuring instruments of which can be automatically synthesized by MEMS technology. There was developed a mathematical model of tree diameter growth taking into account the effect of photosynthesis, which will allow predicting the index of PCE condition.
暂无评论