-
15601
Klasifikasi Ulasan Palsu Menggunakan Borderline Over Sampling (BOS) dan Support Vector Machine (SVM) (Studi Kasus : Ulasan Tempat Makan)
Published 2022-02-01“…However, many of these spam review datasets are imbalanced and thus may affect classification results. In this study, BOS algorithm was used to overcome data imbalances, and SVM algorithm for the classification of spam reviews. …”
Get full text
Article -
15602
Investigation of the use of a sensor bracelet for the presymptomatic detection of changes in physiological parameters related to COVID-19: an interim analysis of a prospective coho...
Published 2022-06-01“…Our proposed RNN algorithm identified 68% of COVID-19 positive participants 2 days prior to SO and will be further trained and validated in a randomised, single-blinded, two-period, two-sequence crossover trial.Trial registration numberISRCTN51255782; Pre-results.…”
Get full text
Article -
15603
Supply Capability Evaluation of Intelligent Manufacturing Enterprises Based on Improved BP Neural Network
Published 2022-01-01“…In this paper, based on the traditional backpropagation (BP) neural network, combined with the improved particle swarm optimization (PSO) algorithm, and on the basis of the supplier evaluation index system, the supplier efficiency evaluation model of intelligent manufacturing enterprises based on DPMPSO-BP neural network is constructed. …”
Get full text
Article -
15604
Hidden Markov model based P2P flow identification technique
Published 2012-06-01“…To identify various P2P flows accurately in real-time,a hidden Markov model(HMM)based P2P flow identification technique was proposed.This approach made use of packet size,inter-arrival time and arrival order to construct flow identification model,in which discrete random variable was used to depict the characteristics of HMM state.A framework called HMM-FIA was proposed,which could identify various P2P flows simultaneously.Meanwhile,the algorithm for selecting the number of HMM state was designed.In a controllable experimental circumstance in the campus network,HMM-FIA was utilized to identify P2P flows and was compared with other identification methods.The results show that discrete random variable can decrease the model constructing time and improve the time-cost and accuracy in identifying unknown flows,HMM-FIA can correctly identify the packet flows produced by various P2P protocols and it can be adaptive to different network circumstance.…”
Get full text
Article -
15605
Surrogate Assisted Design Optimization of an Air Turbine
Published 2014-01-01“…A Reynolds-averaged Navier Stokes solver was used to evaluate the objective function responses, and these responses along with the design variables were used to construct the Kriging variants and RSA functions. A hybrid genetic algorithm was used to find the optimal point in the design space. …”
Get full text
Article -
15606
Application of Fast P2P Traffic Recognition Technology Based on Decision Tree in the Detection of Network Traffic Data
Published 2022-01-01“…Based on the research of traffic identification in recent years, a fast P2P network traffic anomaly identification algorithm based on decision tree model is proposed, which improves the efficiency and accuracy of network traffic application identification and network traffic anomaly data identification.…”
Get full text
Article -
15607
A New Spectral Local Linearization Method for Nonlinear Boundary Layer Flow Problems
Published 2013-01-01“…We propose a simple and efficient method for solving highly nonlinear systems of boundary layer flow problems with exponentially decaying profiles. The algorithm of the proposed method is based on an innovative idea of linearizing and decoupling the governing systems of equations and reducing them into a sequence of subsystems of differential equations which are solved using spectral collocation methods. …”
Get full text
Article -
15608
Trusted cloud platform management model based onTPMalliance
Published 2016-02-01“…It usedTPMand authentication encryption technology to solve trusted transmission problem of data among nodes inTPMalliance, and a management strategy of time-based treeTPMalliance was proposed, including node configuration protocol, node registration protocol, node logout protocol, node state real-time monitor protocol, trusted nodes management network repair protocol, node update protoc explains the production algorithm of time-based tree, analyses the effectiveness of the time cost of building trusted node management network and monitoring of node state. …”
Get full text
Article -
15609
Influence of Parameter on Dynamic Load and Load Sharing Characteristic of Split Torque-combine Power Gear Transmission System
Published 2019-05-01“…By applying the fourth order Runge-Kutta algorithm to solve the system dimensionless dynamical equations, dynamic load characteristic is analyzed under the excitations of backlash, general transmission error and time-varying mesh stiffness. …”
Get full text
Article -
15610
Beamforming and resource optimization in UAV integrated sensing and communication network with edge computing
Published 2023-09-01“…To address the dependence of traditional integrated sensing and communication network mode on ground infrastructure, the unmanned aerial vehicle (UAV) with edge computing server and radar transceiver was proposed to solve the problems of high-power consumption, signal blocking, and coverage blind spots in complex scenarios.Firstly, under the conditions of satisfying the user’s transmission power, radar estimation information rate and task offloading proportion limit, the system energy consumption was minimized by jointly optimizing UAV radar beamforming, computing resource allocation, task offloading, user transmission power, and UAV flight trajectory.Secondly, the non-convex optimization problem was reformulated as a Markov decision process, and the proximal policy optimization method based deep reinforcement learning was used to achieve the optimal solution.Simulation results show that the proposed algorithm has a faster training speed and can reduce the system energy consumption effectively while satisfying the sensing and computing delay requirements.…”
Get full text
Article -
15611
ANN Approach to Predict the Flow Stress of CMn (Nb-Ti-V) Micro Alloyed Steel
Published 2019-07-01“…The ANN model was trained with Levenberg-Marquardt (LM) algorithm. The optimal LM neural network model with two hidden layer network with ten neurons in the ?…”
Get full text
Article -
15612
Design of PI Controller for Voltage Controller of Four-Phase Interleaved Boost Converter Using Particle Swarm Optimization
Published 2020-01-01“…The metaheuristic optimizations, particle swarm optimization (PSO), genetic algorithm (GA), and Tabu search (TS) are applied to find the optimal gains for the proposed control system. …”
Get full text
Article -
15613
Gait Correlation Analysis Based Human Identification
Published 2014-01-01“…By background subtracting algorithm, the moving silhouette figure can be extracted from the walking images sequence. …”
Get full text
Article -
15614
AXIAL TENSILE STRENGTH ANALYSIS OF UNBONDED FLEXIBLE PIPE CONTAINING COMPOSITE TENSILE ARMORS
Published 2020-01-01“…As offshore oil industry moves into ultra-deep water,replacing the steel tensile armors of unbonded flexible pipe with composite is becoming a scheme that can effectively reduce weight and provide better mechanical properties.The anisotropic parameters of composite are obtained by meso-mechanical method,then a model of axisymmetric structure response for composite flexible pipe with composite armored layer is established,which is based on both thick-wall cylinder theory and the differential equation of curved beam,and also the algorithm of cyclic iterative is combined.Failure models of different type of flexible pipes are obtained,and iso-strength method is used for composite armored pipe.A case study shows that composite armors can effectively enhance the tensile strength of unbonded flexible pipe while effectively reduce the overall weight.Results state that volume fraction,elastic modulus and strength of fiber are the important parameters which affect the axial stiffness and tensile strength of unbonded flexible pipe.…”
Get full text
Article -
15615
Multi-objective optimization placement strategy for SDN security controller considering Byzantine attributes
Published 2021-06-01“…By giving the software defined network distributed control plane Byzantine attributes, its security can be effectively improved.In the process of realizing Byzantine attributes, the number and location of controllers, and the connection relationship between switches and controllers can directly affect the key network performance.Therefore, a controller multi-objective optimization placement strategy for SDN security controllers considering Byzantine attributes was proposed.Firstly, a Byzantine controller placement problem (MOSBCPP) model that comprehensively considered interaction delay, synchronization delay, load difference and the number of controllers was constructed.Then, a solution algorithm based on NASG-II was designed for this model, which included the initialization function, the mutation function, the fast non-dominated sorting function and the elite strategy selection function.Simulation results show that this strategy can effectively reduce interaction delay, synchronization delay, load difference and the number of controllers, while improving control plane security.…”
Get full text
Article -
15616
Leading causes of fever in patients with liver function disorders
Published 2010-02-01“…Article presents pathophysiological mechanisms of development of fever. The algorithm of assessment of patient with disorder of liver function and fever is submitted.Original positions. …”
Get full text
Article -
15617
FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining
Published 2014-01-01“…The class imbalance problem is handled by finding legal as well as fraud transaction patterns for each customer by using frequent itemset mining. A matching algorithm is also proposed to find to which pattern (legal or fraud) the incoming transaction of a particular customer is closer and a decision is made accordingly. …”
Get full text
Article -
15618
A Stochastic and Optimized Energy Efficient Clustering Protocol for Wireless Sensor Networks
Published 2014-03-01“…The performance of the proposed scheme is compared with the clustering-based routing protocols, Low-Energy Adaptive Clustering Hierarchy (LEACH), LEACH-Centralized (LEACH-C), and Adaptive and Energy Efficient Clustering (AEEC) algorithm. Simulation results show that it significantly reduces energy consumption and improves network lifetime. …”
Get full text
Article -
15619
Strength Analysis for Cage of Planetary Wheel Needle Roller Bearing
Published 2021-12-01“…Aiming to solving the problem of cage failure under revolution-rotation,based on the dynamics theory of rolling bearing,the dynamics differential equations of needle roller bearing coupled with revolution-rotation working condition are established,and GSTIFF variable step length integral algorithm is adopted to solve the bearing. Cage stress is used to evaluate cage strength,and the influence of bearing working conditions on cage stress is studied to guide cage material selection. …”
Get full text
Article -
15620
Communication-efficient federated learning method via redundant data elimination
Published 2023-05-01“…To address the influence of limited network bandwidth of edge devices on the communication efficiency of federated learning, and efficiently transmit local model update to complete model aggregation, a communication-efficient federated learning method via redundant data elimination was proposed.The essential reasons for generation of redundant update parameters and according to non-IID properties and model distributed training features of FL were analyzed, a novel sensitivity and loss function tolerance definitions for coreset was given, and a novel federated coreset construction algorithm was proposed.Furthermore, to fit the extracted coreset, a novel distributed adaptive sparse network model evolution mechanism was designed to dynamically adjust the structure and the training model size before each global training iteration, which reduced the number of communication bits between edge devices and the server while also guarantees the training model accuracy.Experimental results show that the proposed method achieves 17% reduction in communication bits transmission while only 0.5% degradation in model accuracy compared with state-of-the-art method.…”
Get full text
Article