The output power prediction of wind power plants is an important guarantee to improve the utilization rate of wind energy and reduce wind curtailment. However, due to the strong randomness of wind energy, the ultra-sh...
详细信息
CHD (Coronary Heart Disease) is one of the leading causes of cardiovascular disease deaths. Invasive coronary arteriography is one of the widely used approaches to diagnose CHD. However, the time cost and expenses for...
详细信息
Nasopharyngeal carcinoma (NPC) is an endemic disease within specific regions in the world. Radiotherapy is the standard treatment for NPC and accurate segmentation of primary gross tumor volume (GTV) is a critical pro...
详细信息
ISBN:
(数字)9781728194295
ISBN:
(纸本)9781728194301
Nasopharyngeal carcinoma (NPC) is an endemic disease within specific regions in the world. Radiotherapy is the standard treatment for NPC and accurate segmentation of primary gross tumor volume (GTV) is a critical process of continue therapy. In this paper we proposed a ResSE-UNet network and a Ternary Cross-Entropy (TCE) loss function for delineation of GTV. ResSE-UNet employed ResSE blocks to replace convolutional blocks in the original UNet to extract better features, and reduced the number of down-sampling processing to keep relatively high resolution of the images. TCE combined dice loss and Binary cross-entropy loss for larger gradient and better stability in training. The experimental results showed that among all combinations of networks and loss functions, the ResSE-UNet with TCE loss achieved the best segmentation performance, i.e. about 0.84 DSC can be obtained.
One of several traditional megaprojects is underground construction, given its long building time high building expense and possible risks. In tunnel engineering, trench boring devices are generally used to increase w...
One of several traditional megaprojects is underground construction, given its long building time high building expense and possible risks. In tunnel engineering, trench boring devices are generally used to increase work performance and safety. During the tunnelling process, system has recorded vast volumes of tracking data to ensure building safety. The processing of vast real-time surveillance data also lacks successful techniques, and, in many situations, it must be performed manually that pose possible safety hazards. This paper suggests an approach for hybrid data mining (DM) to automatically process the TBM data for real-time tracking. Three separate DM strategies are merged in order to improve the operation of mining also to help security management. The sequential pattern method is executed to remove connections between TBM parameters in order to give people the expertise needed for an irregular on-site judging. A random forest model is built to identify training data in order to complement knowledge needed for building decision-making system. Finally, neural network models measure the penetration rate (ROP) in order to detect irregular data and to alert early. In the case of a tunnel project in China, the suggested technique was applied, and the findings of the application concluded that the approach offered a reliable and effective way of evaluating TBM protection management data in real time during buildings.
Blockchain's decentralized characteristic is recognized as a potential technology to deliver secure and safe resources. However, the existing blockchain networks cannot fulfil the transaction given the limited ban...
Blockchain's decentralized characteristic is recognized as a potential technology to deliver secure and safe resources. However, the existing blockchain networks cannot fulfil the transaction given the limited bandwidth for practical application demand. In this article, the cubic design of the conventional public blockchain is strengthened with the Directed Graph Probabilistic model. In the current structure, blocks of the lightweight structure are ordered in grades and width. We develop protocols to position newly created blocks in order to make them more effective and secure. It increases confidentiality and time for authentication of transactions in contrast with standard blockchain protocols and enjoys the accuracy and liveliness of blockchain. This paper introduces two potential methods for targeting opposition parties and we also show that the procedure against them is safe and stable. Experiments will generate three hundred inputs every second that is 64 times the output of Bitcoin's transaction. This time Bitcoin's production will hit 27 times its Ethereum's.
Firstly, the design problem of command and control structure before battle is described, and the workload of task command and control complexity measurement decision entity is defined. Secondly, a mathematical model i...
Firstly, the design problem of command and control structure before battle is described, and the workload of task command and control complexity measurement decision entity is defined. Secondly, a mathematical model is established with the optimization objective of minimizing the root mean square of workload. In order to solve the mathematical model, the adaptive quantum genetic algorithm is proposed by combining the quantum genetic algorithm with the adaptive strategy. Finally, the effectiveness of the algorithm is verified by experimental simulation.
An imbalanced dataset is a dataset that has a majority class which is a class has far more example distributions than other classes. It is difficult to deal with unbalanced datasets in classification problems, and man...
详细信息
An imbalanced dataset is a dataset that has a majority class which is a class has far more example distributions than other classes. It is difficult to deal with unbalanced datasets in classification problems, and many classification algorithms do not perform well in unbalanced datasets. In this paper, we present our logistic regression analysis with Python on imbalanced datasets and determine different thresholds for classification according to the data proportion of imbalanced datasets.
The Internet of Vehicles (IoV) is an application of the Internet of things (IoT). It faces two main security problems: (1) the central server of the IoV may not be powerful enough to support the centralized authentica...
详细信息
Missing data imputation is a fundamental task for reducing uncertainty and vagueness in medical dataset. Fuzzy-rough set has taken very important role to accurate representation original information. This paper propos...
ISBN:
(数字)9781728123486
ISBN:
(纸本)9781728123493
Missing data imputation is a fundamental task for reducing uncertainty and vagueness in medical dataset. Fuzzy-rough set has taken very important role to accurate representation original information. This paper proposes Fitted fuzzy-rough imputation algorithms called Fitted FRNNI and Fitted VQNNI by introducing weight coefficients to balance fuzzy similarly relations among training and testing instances. Meanwhile, modification fuzzy decisions of nearest neighbors based on lower/upper approximations are studied. Performance analysis is conducted including classification accuracy analysis, the impact of k parameter and weight coefficient of a and β to evaluate the proposed Fitted FRNNI and VQNNI algorithms. Experimental results on 13 benchmark datasets show that the proposed algorithms outperform current leading algorithms.
暂无评论