Video captioning is the process of automatically generating natural language descriptions of video content. Historically, most video captioning methods have relied on extending Sequence-to-Sequence (Seq2Seq) models. H...
详细信息
The global navigation satellite system-based technology has inherent limitations due to its reliance on radio signals. In contrast, visual localization operates independently of radio communication, presenting a viabl...
详细信息
Machine learning algorithms generally assume that the data are balanced in nature. However, medical datasets suffer from the curse of dimensionality and class imbalance problems. The medical datasets are obtained from...
详细信息
Machine learning algorithms generally assume that the data are balanced in nature. However, medical datasets suffer from the curse of dimensionality and class imbalance problems. The medical datasets are obtained from the patient information which creates an imbalance in class distribution as the number of normal persons is more than the number of patients and contains a large number of features to represent a sample. It tends to the machine learning algorithms biased toward the majority class which degrades their classification performance for minority class samples and increases the computation overhead. Therefore, oversampling, feature selection and feature weighting-based four strategies are proposed to deal with the problems of class imbalance and high dimensionality. The key idea behind the proposed strategies is to generate a balanced sample space along with the optimal weighted feature space of the most relevant and discriminative features. The Synthetic Minority Oversampling Technique is utilized to generate the synthetic minority class samples and reduce the bias toward the majority class. An Improved Elephant Herding Optimization algorithm is applied to select the optimal features and weights for reducing the computation overhead and improving the interpretation ability of the learning algorithms by providing weights to relevant features. In addition, thirteen methods are developed from the proposed strategies to deal with the problems of high-dimensionality and imbalanced data. The optimized k-Nearest Neighbor (k-NN) learning algorithm is utilized to perform classification. The performance of the proposed methods is evaluated and compared for sixteen high-dimensional imbalanced medical datasets. Further, Freidman’s mean rank test is applied to show the statistical difference between the proposed methods. Experimental and statistical results show that the proposed Feature Weighting followed by the Feature Selection (FW–FS) method performed significantly b
In recent years,intelligent robots are extensively applied in the field of the industry and intelligent rehabilitation,wherein the human-robot interaction(HRI)control strategy is a momentous part that needs to be ***,...
详细信息
In recent years,intelligent robots are extensively applied in the field of the industry and intelligent rehabilitation,wherein the human-robot interaction(HRI)control strategy is a momentous part that needs to be ***,the efficacy and robustness of the HRI control algorithm in the presence of unknown external disturbances deserve to be *** deal with these urgent issues,in this study,artificial systems,computational experiments and a parallel execution intelligent control framework are constructed for the HRI *** upper limb-robotic exoskeleton system is re-modelled as an artificial *** on surface electromyogram-based subject's active motion intention in the practical system,a non-convex function activated anti-disturbance zeroing neurodynamic(NC-ADZND)controller is devised in the artificial system for parallel interaction and HRI control with the practical ***,the linear activation function-based zeroing neurodynamic(LAF-ZND)controller and proportionalderivative(posterior deltoid(PD))controller are presented and *** results substantiate the global convergence and robustness of the proposed controller in the presence of different external *** addition,the simulation results verify that the NC-ADZND controller is better than the LAF-ZND and the PD controllers in respect of convergence order and anti-disturbance characteristics.
The network security analyzers use intrusion detection systems(IDSes)to distinguish malicious traffic from benign *** deep learning-based(DL-based)IDSes are proposed to auto-extract high-level features and eliminate t...
详细信息
The network security analyzers use intrusion detection systems(IDSes)to distinguish malicious traffic from benign *** deep learning-based(DL-based)IDSes are proposed to auto-extract high-level features and eliminate the time-consuming and costly signature extraction ***,this new generation of IDSes still needs to overcome a number of challenges to be employed in practical *** of the main issues of an applicable IDS is facing traffic concept drift,which manifests itself as new(i.e.,zero-day)attacks,in addition to the changing behavior of benign users/***,a practical DL-based IDS needs to be conformed to a distributed(i.e.,multi-sensor)architecture in order to yield more accurate detections,create a collective attack knowledge based on the observations of different sensors,and also handle big data challenges for supporting high throughput *** paper proposes a novel multi-agent network intrusion detection framework to address the above shortcomings,considering a more practical scenario(i.e.,online adaptable IDSes).This framework employs continual deep anomaly detectors for adapting each agent to the changing attack/benign patterns in its local *** addition,a federated learning approach is proposed for sharing and exchanging local knowledge between different ***,the proposed framework implements sequential packet labeling for each flow,which provides an attack probability score for the flow by gradually observing each flow packet and updating its *** evaluate the proposed framework by employing different deep models(including CNN-based and LSTM-based)over the CICIDS2017 and CSE-CIC-IDS2018 *** extensive evaluations and experiments,we show that the proposed distributed framework is well adapted to the traffic concept *** precisely,our results indicate that the CNNbased models are well suited for continually adapting to the traffic concept drift(i.e.,achieving
Due to an increase in the number of users and a high demand for high data rates, researchers have resorted to boosting the capacity and spectral efficiency of the next-generation wireless communication. With a limited...
详细信息
Converters rely on passive filtering as a crucial element due to the high-frequency operational characteristics of power *** filtering methods involve a dual inductor-capacitor(LC)cell or an inductor-capacitor-inducto...
详细信息
Converters rely on passive filtering as a crucial element due to the high-frequency operational characteristics of power *** filtering methods involve a dual inductor-capacitor(LC)cell or an inductor-capacitor-inductor(LCL)***,capacitors are susceptible to wear-out mechanisms and failure ***,the necessity for monitoring and regular replacement adds to an elevated cost of ownership for such *** utilization of an active output power filter can be used to diminish the dimensions of the LC filter and the electrolytic dc-link capacitor,even though the inclusion of capacitors remains an indispensable part of the *** paper introduces capacitorless solid-state power filter(SSPF)for single-phase dc-ac *** proposed configuration is capable of generating a sinusoidal ac voltage without relying on *** proposed filter,composed of a planar transformer and an H-bridge converter operating at high frequency,injects voltage harmonics to attain a sinusoidal output *** design parameters of the planar transformer are incorporated,and the impact of magnetizing and leakage inductances on the operation of the SSPF is *** analysis,supported by simulation and experimental results,are provided for a design example for a single-phase *** total harmonic distortion observed in the output voltage is well below the IEEE 519 *** system operation is experimentally tested under both steady-state and dynamic conditions.A comparison with existing technology is presented,demonstrating that the proposed topology reduces the passive components used for filtering.
Early attack detection is essential to ensure the security of complex networks,especially those in critical *** is particularly crucial in networks with multi-stage attacks,where multiple nodes are connected to extern...
详细信息
Early attack detection is essential to ensure the security of complex networks,especially those in critical *** is particularly crucial in networks with multi-stage attacks,where multiple nodes are connected to external sources,through which attacks could enter and quickly spread to other network *** attack graphs(BAGs)are powerful models for security risk assessment and mitigation in complex networks,which provide the probabilistic model of attackers’behavior and attack progression in the *** attack detection techniques developed for BAGs rely on the assumption that network compromises will be detected through routine monitoring,which is unrealistic given the ever-growing complexity of *** paper derives the optimal minimum mean square error(MMSE)attack detection and monitoring policy for the most general form of *** exploiting the structure of BAGs and their partial and imperfect monitoring capacity,the proposed detection policy achieves the MMSE optimality possible only for linear-Gaussian state space models using Kalman *** adaptive resource monitoring policy is also introduced for monitoring nodes if the expected predictive error exceeds a user-defined *** and efficient matrix-form computations of the proposed policies are provided,and their high performance is demonstrated in terms of the accuracy of attack detection and the most efficient use of available resources using synthetic Bayesian attack graphs with different topologies.
In this paper, a DC microgrid (DCMG) integrated with a set of nano-grids (NG) is studied. DCMG exchanges predetermined active and reactive power with the upstream network. DCMG and NGs are coordinately controlled and ...
详细信息
In this paper, a DC microgrid (DCMG) integrated with a set of nano-grids (NG) is studied. DCMG exchanges predetermined active and reactive power with the upstream network. DCMG and NGs are coordinately controlled and managed in such a way the exchanged P-Q power with external grid are kept on scheduled level following all events and operating conditions. The proposed control system, in addition to the ability of mutual support between DCMG and NGs, makes NGs support each other in critical situations. On the other hand, in all operating conditions, DCMG not only feeds three-phase loads with time-varying active and reactive power on the grid side but also injects constant active power into the grid. During events, NGs support each other, NGs support DCMG, and DCMG supports NGs. Such control strategies are realized by the proposed control method to increase resilience of the system. For these purposes, all resources and loads in DCMG and NGs are equipped with individual controllers. Then, a central control unit analyzes, monitors, and regularizes performance of individual controllers in DCMG and NGs. Nonlinear simulations show the proposed model can effectively control DCMG and NGs under normal and critical conditions.
This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)*** steganography,a technique of embedding hidden information in digital photographs,should ideally ac...
详细信息
This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)*** steganography,a technique of embedding hidden information in digital photographs,should ideally achieve the dual purposes of maximum data hiding and maintenance of the integrity of the cover media so that it is least *** contemporary methods of steganography are at best a compromise between these *** this paper,we present our approach,entitled Ant Colony Optimization(ACO)-Least Significant Bit(LSB),which attempts to optimize the capacity in steganographic *** approach makes use of a grayscale cover image to hide the confidential data with an additional bit pair per byte,both for integrity verification and the file checksumof the secret *** approach encodes confidential information into four pairs of bits and embeds it within uncompressed grayscale *** ACO algorithm uses adaptive exploration to select some pixels,maximizing the capacity of data embedding whileminimizing the degradation of visual *** evaporation is introduced through iterations to avoid stagnation in solution *** levels of pheromone are modified to reinforce successful pixel *** results obtained through the ACO-LSB method reveal that it clearly improves image steganography capabilities by providing an increase of up to 30%in the embedding capacity compared with traditional approaches;the average Peak Signal to Noise Ratio(PSNR)is 40.5 dB with a Structural Index Similarity(SSIM)of *** approach also demonstrates very high resistance to detection,cutting down the rate by 20%.Implemented in MATLAB R2023a,the model was tested against one thousand publicly available grayscale images,thus providing robust evidence of its effectiveness.
暂无评论