期刊文献+
共找到116,489篇文章
< 1 2 250 >
每页显示 20 50 100
CL2ES-KDBC:A Novel Covariance Embedded Selection Based on Kernel Distributed Bayes Classifier for Detection of Cyber-Attacks in IoT Systems
1
作者 Talal Albalawi P.Ganeshkumar 《Computers, Materials & Continua》 SCIE EI 2024年第3期3511-3528,共18页
The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed wo... The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks.In this framework,a Covariance Linear Learning Embedding Selection(CL2ES)methodology is used at first to extract the features highly associated with the IoT intrusions.Then,the Kernel Distributed Bayes Classifier(KDBC)is created to forecast attacks based on the probability distribution value precisely.In addition,a unique Mongolian Gazellas Optimization(MGO)algorithm is used to optimize the weight value for the learning of the classifier.The effectiveness of the proposed CL2ES-KDBC framework has been assessed using several IoT cyber-attack datasets,The obtained results are then compared with current classification methods regarding accuracy(97%),precision(96.5%),and other factors.Computational analysis of the CL2ES-KDBC system on IoT intrusion datasets is performed,which provides valuable insight into its performance,efficiency,and suitability for securing IoT networks. 展开更多
关键词 IoT security attack detection covariance linear learning embedding selection kernel distributed bayes classifier mongolian gazellas optimization
下载PDF
A preliminary site selection system for underground hydrogen storage in salt caverns and its application in Pingdingshan,China
2
作者 Liangchao Huang Yanli Fang +6 位作者 Zhengmeng Hou Yachen Xie Lin Wu Jiashun Luo Qichen Wang Yilin Guo Wei Sun 《Deep Underground Science and Engineering》 2024年第1期117-128,共12页
Large‐scale underground hydrogen storage(UHS)provides a promising method for increasing the role of hydrogen in the process of carbon neutrality and energy transition.Of all the existing storage deposits,salt caverns... Large‐scale underground hydrogen storage(UHS)provides a promising method for increasing the role of hydrogen in the process of carbon neutrality and energy transition.Of all the existing storage deposits,salt caverns are recognized as ideal sites for pure hydrogen storage.Evaluation and optimization of site selection for hydrogen storage facilities in salt caverns have become significant issues.In this article,the software CiteSpace is used to analyze and filter hot topics in published research.Based on a detailed classification and analysis,a“four‐factor”model for the site selection of salt cavern hydrogen storage is proposed,encompassing the dynamic demands of hydrogen energy,geological,hydrological,and ground factors of salt mines.Subsequently,20 basic indicators for comprehensive suitability grading of the target site were screened using the analytic hierarchy process and expert survey methods were adopted,which provided a preliminary site selection system for salt cavern hydrogen storage.Ultimately,the developed system was applied for the evaluation of salt cavern hydrogen storage sites in the salt mines of Pingdingshan City,Henan Province,thereby confirming its rationality and effectiveness.This research provides a feasible method and theoretical basis for the site selection of UHS in salt caverns in China. 展开更多
关键词 analytic hierarchy process(AHP) evaluation index hydrogen storage salt cavern site selection
下载PDF
Research on Partner Selection in Enterprise Innovation Ecosystem
3
作者 Shuang Luo Junxi Gao Weiwei Deng 《Proceedings of Business and Economic Studies》 2024年第1期99-103,共5页
In the face of fierce market competition,enterprises must ensure the competitiveness of their products or services through technological innovation.However,the complexity of technology often surpasses the capabilities... In the face of fierce market competition,enterprises must ensure the competitiveness of their products or services through technological innovation.However,the complexity of technology often surpasses the capabilities of individual enterprises,leading them to deepen cooperation with other organizations.The entities within the enterprise innovation ecosystem depend on each other,collaborate closely,and rely on core enterprises to integrate resources,thereby creating system value and enhancing competitiveness.The purpose of this paper is to explore the process of selecting appropriate ecosystem partners.It begins by providing an overview of relevant concepts,characteristics,selection factors,and methods.Subsequently,it analyzes the roles,resources,and synergy evolution of the entities within the ecosystem.An evaluation system encompassing operation,core,synergy,and development capability is then established.This system comprises 16 indicators,including organization scale and reputation,and is accompanied by a hierarchical evaluation model.Finally,the validity of the evaluation system is confirmed through empirical analysis,utilizing the Analytic Hierarchy Process(AHP)and the fuzzy comprehensive evaluation method. 展开更多
关键词 Enterprise innovation ecosystem Partner selection Core enterprise
下载PDF
Feature Selection with Deep Reinforcement Learning for Intrusion Detection System 被引量:1
4
作者 S.Priya K.Pradeep Mohan Kumar 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3339-3353,共15页
An intrusion detection system(IDS)becomes an important tool for ensuring security in the network.In recent times,machine learning(ML)and deep learning(DL)models can be applied for the identification of intrusions over... An intrusion detection system(IDS)becomes an important tool for ensuring security in the network.In recent times,machine learning(ML)and deep learning(DL)models can be applied for the identification of intrusions over the network effectively.To resolve the security issues,this paper presents a new Binary Butterfly Optimization algorithm based on Feature Selection with DRL technique,called BBOFS-DRL for intrusion detection.The proposed BBOFSDRL model mainly accomplishes the recognition of intrusions in the network.To attain this,the BBOFS-DRL model initially designs the BBOFS algorithm based on the traditional butterfly optimization algorithm(BOA)to elect feature subsets.Besides,DRL model is employed for the proper identification and classification of intrusions that exist in the network.Furthermore,beetle antenna search(BAS)technique is applied to tune the DRL parameters for enhanced intrusion detection efficiency.For ensuring the superior intrusion detection outcomes of the BBOFS-DRL model,a wide-ranging experimental analysis is performed against benchmark dataset.The simulation results reported the supremacy of the BBOFS-DRL model over its recent state of art approaches. 展开更多
关键词 Intrusion detection security reinforcement learning machine learning feature selection beetle antenna search
下载PDF
A general evaluation system for optimal selection performance of radar clutter model
5
作者 YANG Wei ZHANG Liang +2 位作者 YANG Liru ZHANG Wenpeng SHEN Qinmu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第6期1520-1525,共6页
The optimal selection of radar clutter model is the premise of target detection,tracking,recognition,and cognitive waveform design in clutter background.Clutter characterization models are usually derived by mathemati... The optimal selection of radar clutter model is the premise of target detection,tracking,recognition,and cognitive waveform design in clutter background.Clutter characterization models are usually derived by mathematical simplification or empirical data fitting.However,the lack of standard model labels is a challenge in the optimal selection process.To solve this problem,a general three-level evaluation system for the model selection performance is proposed,including model selection accuracy index based on simulation data,fit goodness indexs based on the optimally selected model,and evaluation index based on the supporting performance to its third-party.The three-level evaluation system can more comprehensively and accurately describe the selection performance of the radar clutter model in different ways,and can be popularized and applied to the evaluation of other similar characterization model selection. 展开更多
关键词 radar clutter clutter characterization model model selection performance evaluation.
下载PDF
An Extended Fuzzy-DEMATEL System for Factor Analyses on Social Capital Selection in the Renovation of Old Residential Communities
6
作者 Guoshuai Sun Xiuru Tang +1 位作者 Shuping Wan Jiao Feng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第2期1041-1067,共27页
China has been promoting the renovation of old residential communities vigorously.Due to the financial pressure of the government and the sustainability of the renovation of old residential communities,public-private ... China has been promoting the renovation of old residential communities vigorously.Due to the financial pressure of the government and the sustainability of the renovation of old residential communities,public-private partnerships(PPP)have already gained attention.The selection of social capital is key to improving the efficiency of the PPP model in renovating old residential communities.In order to determine the influencing factors of social capital selection in the renovation of old residential communities,this paper aims to find an effective approach and analyze these factors.In this paper,a fuzzy decision-making and trial evaluation laboratory(fuzzy-DEMATEL)technique is extended and amore suitable systemis developed for the selection of social capital using the existing group decisionmaking theory.In the first stage,grounded theory is used to extract the unabridged key influencing factors for social capital selection in the renovation of old residential communities.Secondly,by considering the impact of expert weights,the key influencing factors are identified.The interactions within these influencing factors are discussed and the credibility of the results is verified by sensitivity analysis.Finally,these key influencing factors are sorted by importance.Based on the results,the government should focus on a technical level,organizationalmanagement abilities,corporate reputation,credit status,etc.This study provides the government with a theoretical basis and a methodology for evaluating social capital selection. 展开更多
关键词 Social capital selection fuzzy-DEMATEL influencing factors renovation of old residential communities grounded theory
下载PDF
Performance Analysis of Intrusion Detection System in the IoT Environment Using Feature Selection Technique
7
作者 Moody Alhanaya Khalil Hamdi Ateyeh Al-Shqeerat 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期3709-3724,共16页
The increasing number of security holes in the Internet of Things(IoT)networks creates a question about the reliability of existing network intrusion detection systems.This problem has led to the developing of a resea... The increasing number of security holes in the Internet of Things(IoT)networks creates a question about the reliability of existing network intrusion detection systems.This problem has led to the developing of a research area focused on improving network-based intrusion detection system(NIDS)technologies.According to the analysis of different businesses,most researchers focus on improving the classification results of NIDS datasets by combining machine learning and feature reduction techniques.However,these techniques are not suitable for every type of network.In light of this,whether the optimal algorithm and feature reduction techniques can be generalized across various datasets for IoT networks remains.The paper aims to analyze the methods used in this research and whether they can be generalized to other datasets.Six ML models were used in this study,namely,logistic regression(LR),decision trees(DT),Naive Bayes(NB),random forest(RF),K-nearest neighbors(KNN),and linear SVM.The primary detection algorithms used in this study,Principal Component(PCA)and Gini Impurity-Based Weighted Forest(GIWRF)evaluated against three global ToN-IoT datasets,UNSW-NB15,and Bot-IoT datasets.The optimal number of dimensions for each dataset was not studied by applying the PCA algorithm.It is stated in the paper that the selection of datasets affects the performance of the FE techniques and detection algorithms used.Increasing the efficiency of this research area requires a comprehensive standard feature set that can be used to improve quality over time. 展开更多
关键词 Machine learning internet of things intrusion detection system feature selection technique
下载PDF
Selection of Surgical Approach and Clinical Significance of Lower Cervical Spine Injuries Guided by SLIC Scoring System
8
作者 Xinming Yang Xuyang Zhang +5 位作者 Yongli Jia Yanlin Yin Peinan Zhang Xingchong Du Yeming Wang Chen Chen 《Surgical Science》 2023年第12期695-704,共10页
Objective: To explore the feasibility and clinical significance of surgical approach selection for cervical spine injury guided by SLIC scoring system. Methods: The clinical data of 75 patients with lower cervical inj... Objective: To explore the feasibility and clinical significance of surgical approach selection for cervical spine injury guided by SLIC scoring system. Methods: The clinical data of 75 patients with lower cervical injury surgery from January 2020 to November 2022 were retrospectively analyzed, including 48 males and 27 females. Age: 28 - 65 years old. Causes of injury: 39 cases of traffic accidents, 15 cases of ice and snow sports, 12 cases of falling from high places, 9 cases of heavy objects. There were 12 cases of C3-4, 33 cases of C4-5, 21 cases of C5-6, and 9 cases of C6-7. Time from injury to medical treatment: 4 h - 2 d. Cervical spine X-ray, MRI, MDCT examination and preoperative SLIC score were performed on admission. Anterior approach was performed by subtotal cervical vertebrae resection or discectomy, titanium Cage or cage supported bone grafting and anterior titanium plate fixation. Posterior approach was performed with cervical laminoplasty, lateral mass or pedicle screw fixation and fusion. The combined anterior-posterior operation was performed by the anterior methods+ posterior methods. The time from injury to surgery is 12 h to 3 d. The function before and after operation was evaluated by JOA efficacy evaluation criteria. The correlation between the three surgical approaches and postoperative efficacy and SLIC score was compared. SPSS 22.0 software was used for statistical analysis of the data. Results: In this group of 75 patients, 32 cases of anterior operation, 22 cases of posterior operation and 21 cases of combined operation were followed up for no less than 12 months. There was no significant difference in age, gender, injury cause, injury segment, time from injury to treatment, and time from injury to operation among the three surgical approaches, which were comparable. The SLIC scores of mild, moderate and severe injuries of anterior surgery, posterior surgery and combined anterior and posterior surgery, They were (5.26 ± 1.24, 5.86 ± 1.67, 8.25 ± 0.21), (5.57 ± 1.43, 5.99 ± 1.85, 9.00 ± 0.25), (0, 5.98 ± 0.33, 9.44 ± 0.34), respectively. By comparing the SLIC scores and JOA scores of anterior surgery and posterior surgery, there was no difference in SLIC scores and JOA scores between the two groups for mild and moderate injuries (P > 0.05). However, the JOA scores at 3 months, 6 months and 12 months after surgery were different from those before surgery, and the postoperative efficacy and JOA scores were significantly improved (P & lt;0.05), indicating that the two surgical methods had the same therapeutic effect, that is, anterior or posterior surgery could be used to treat mild or moderate injuries (P > 0.05). There were differences in SLIC scores among the three surgical approaches for severe injury (P 0.05). The postoperative efficacy and JOA score of combined anterior-posterior approach were significantly improved compared with those before operation (P Conclusion: SLIC score not only provides accurate judgment for conservative treatment or surgical treatment of cervical spine injury, but also provides evidence-based medical basis and reference value for the selection of surgical approach and surgical method. According to the SLIC score, the surgical approach is safe and feasible. When the SLIC score is 4 - 7, anterior surgery is selected for type A injury, and posterior surgery is selected for type B injury. When the SLIC score is ≥8, combined anterior-posterior surgery should be selected. It is of great significance for clinical formulation of precision treatment strategy. 展开更多
关键词 Cervical Spine Injury Lower Cervical Injury Classification Score Surgical Route selection Clinical Significance
下载PDF
Selection of Wind Turbine Systems for the Sultanate of Oman
9
作者 M.A.A.Younis Anas Quteishat 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期343-359,共17页
The Sultanate of Oman has been dealing with a severe renewable energy issue for the past few decades,and the government has struggled to find a solution.In addition,Oman’s strategy for converting power generation to ... The Sultanate of Oman has been dealing with a severe renewable energy issue for the past few decades,and the government has struggled to find a solution.In addition,Oman’s strategy for converting power generation to sources of renewable energy includes a goal of 60 percent of national energy demands being met by renewables by 2040,including solar and wind turbines.Furthermore,the use of small-scale energy from wind devices has been on the rise in recent years.This upward trend is attributed to advancements in wind turbine technology,which have lowered the cost of energy from wind.To calculate the internal and external factors that affect the small-scale energy of wind technologies,the study used a fuzzy analytical hierarchy process technique for order of preference by similarity to an ideal solution.As a result,in the decision model,four criteria,seventeen sub-criteria,and three resources of renewable energy were calculated as options from the viewpoint of the Sultanate of Oman.This research is based on an examination of statistics on energy produced by wind turbines at various locations in the Sultanate of Oman.Further,six distinct miniature wind turbines were investigated for four different locations.The outcomes of this study indicate that the tiny wind turbine has a lot of potential in the Sultanate of Oman for applications such as homes,schools,college campuses,irrigation,greenhouses,communities,and small businesses.The government should also use renewable energy resources to help with the renewable energy issue and make sure that the country has enough renewable energy for its long-term growth. 展开更多
关键词 Multi criteria decision making model fuzzy theory fuzzy sets renewable energy wind turbine supplier selection
下载PDF
Strategies of selective electroreduction of aqueous nitrate to N_(2) in chloride-free system:A critical review
10
作者 Fukuan Li Weizhe Zhang +2 位作者 Peng Zhang Ao Gong Kexun Li 《Green Energy & Environment》 SCIE EI CAS CSCD 2024年第2期198-216,共19页
Electroreduction of nitrate has been gaining wide attention in recent years owing to it's beneficial for converting nitrate into benign N_(2) from the perspective of electrocatalytic denitrification or into value-... Electroreduction of nitrate has been gaining wide attention in recent years owing to it's beneficial for converting nitrate into benign N_(2) from the perspective of electrocatalytic denitrification or into value-added ammonia from the perspective of electrocatalytic NH_(3) synthesis.By reason of the undesired formation of ammonia is dominant during electroreduction of nitrate-containing wastewater,chloride has been widely used to improve N_(2) selectivity.Nevertheless,selective electroreduction of nitrate to N2 gas in chloride-containing system poses several drawbacks.In this review,we focus on the key strategies for efficiently enhancing N_(2) selectivity of electroreduction of nitrate in chloride-free system,including optimal selection of elements,combining an active metal catalyst with another metal,manipulating the crystalline morphology and facet orientation,constructing core–shell structure catalysts,etc.Before summarizing the strategies,four possible reaction pathways of electro-reduction of nitrate to N_(2) are discussed.Overall,this review attempts to provide practical strategies for enhancing N2 selectivity without the aid of electrochlorination and highlight directions for future research for designing appropriate electrocatalyst for final electrocatalytic denitrifi-cation. 展开更多
关键词 NITRATE CHLORIDE ELECTROREDUCTION SELECTIVITY NITROGEN
下载PDF
A Portfolio Selection Method Based on Pattern Matching with Dual Information of Direction and Distance
11
作者 Xinyi He 《Applied Mathematics》 2024年第5期313-330,共18页
Pattern matching method is one of the classic classifications of existing online portfolio selection strategies. This article aims to study the key aspects of this method—measurement of similarity and selection of si... Pattern matching method is one of the classic classifications of existing online portfolio selection strategies. This article aims to study the key aspects of this method—measurement of similarity and selection of similarity sets, and proposes a Portfolio Selection Method based on Pattern Matching with Dual Information of Direction and Distance (PMDI). By studying different combination methods of indicators such as Euclidean distance, Chebyshev distance, and correlation coefficient, important information such as direction and distance in stock historical price information is extracted, thereby filtering out the similarity set required for pattern matching based investment portfolio selection algorithms. A large number of experiments conducted on two datasets of real stock markets have shown that PMDI outperforms other algorithms in balancing income and risk. Therefore, it is suitable for the financial environment in the real world. 展开更多
关键词 Online Portfolio selection Pattern Matching Similarity Measurement
下载PDF
Mechanism of selective laser trabeculoplasty:a systemic review
12
作者 Yu-Feng Chen Wen Zeng 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2024年第5期963-968,共6页
Although selective laser trabeculoplasty(SLT)is a recognized method for the treatment of glaucoma,the exact changes in the target tissue and mechanism for its intraocular pressure lowing effect are still unclear.The p... Although selective laser trabeculoplasty(SLT)is a recognized method for the treatment of glaucoma,the exact changes in the target tissue and mechanism for its intraocular pressure lowing effect are still unclear.The purpose of this review is to summarize the potential mechanisms of SLT on trabecular meshwork both in vivo and in vitro,so as to reveal the potential mechanism of SLT.SLT may induce immune or inflammatory response in trabecular meshwork(TM)induced by possible oxidative damage etc,and remodel extracellular matrix.It may also induce monocytes to aggregate in TM tissue,increase Schlemm’s canal(SC)cell conductivity,disintegrate cell junction and promote permeability through autocrine and paracrine forms.This provides a theoretical basis for SLT treatment in glaucoma. 展开更多
关键词 MECHANISMS selective laser trabeculoplasty GLAUCOMA trabecular meshwork
下载PDF
Evaluating the performance of genomic selection on purebred population by incorporating crossbred data in pigs
13
作者 Jun Zhou Qing Lin +10 位作者 Xueyan Feng Duanyang Ren Jinyan Teng Xibo Wu Dan Wu Xiaoke Zhang Xiaolong Yuan Zanmou Chen Jiaqi Li Zhe Zhang Hao Zhang 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期639-648,共10页
Genomic selection(GS)has been widely used in livestock,which greatly accelerated the genetic progress of complex traits.The population size was one of the significant factors affecting the prediction accuracy,while it... Genomic selection(GS)has been widely used in livestock,which greatly accelerated the genetic progress of complex traits.The population size was one of the significant factors affecting the prediction accuracy,while it was limited by the purebred population.Compared to directly combining two uncorrelated purebred populations to extend the reference population size,it might be more meaningful to incorporate the correlated crossbreds into reference population for genomic prediction.In this study,we simulated purebred offspring(PAS and PBS)and crossbred offspring(CAB)base on real genotype data of two base purebred populations(PA and PB),to evaluate the performance of genomic selection on purebred while incorporating crossbred information.The results showed that selecting key crossbred individuals via maximizing the expected genetic relationship(REL)was better than the other methods(individuals closet or farthest to the purebred population,CP/FP)in term of the prediction accuracy.Furthermore,the prediction accuracy of reference populations combining PA and CAB was significantly better only based on PA,which was similar to combine PA and PAS.Moreover,the rank correlation between the multiple of the increased relationship(MIR)and reliability improvement was 0.60-0.70.But for individuals with low correlation(Cor(Pi,PA or B),the reliability improvement was significantly lower than other individuals.Our findings suggested that incorporating crossbred into purebred population could improve the performance of genetic prediction compared with using the purebred population only.The genetic relationship between purebred and crossbred population is a key factor determining the increased reliability while incorporating crossbred population in the genomic prediction on pure bred individuals. 展开更多
关键词 PIGS crossbred population genomic selection reference population construction relationship
下载PDF
Multi-Strategy Assisted Multi-Objective Whale Optimization Algorithm for Feature Selection
14
作者 Deng Yang Chong Zhou +2 位作者 Xuemeng Wei Zhikun Chen Zheng Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第8期1563-1593,共31页
In classification problems,datasets often contain a large amount of features,but not all of them are relevant for accurate classification.In fact,irrelevant features may even hinder classification accuracy.Feature sel... In classification problems,datasets often contain a large amount of features,but not all of them are relevant for accurate classification.In fact,irrelevant features may even hinder classification accuracy.Feature selection aims to alleviate this issue by minimizing the number of features in the subset while simultaneously minimizing the classification error rate.Single-objective optimization approaches employ an evaluation function designed as an aggregate function with a parameter,but the results obtained depend on the value of the parameter.To eliminate this parameter’s influence,the problem can be reformulated as a multi-objective optimization problem.The Whale Optimization Algorithm(WOA)is widely used in optimization problems because of its simplicity and easy implementation.In this paper,we propose a multi-strategy assisted multi-objective WOA(MSMOWOA)to address feature selection.To enhance the algorithm’s search ability,we integrate multiple strategies such as Levy flight,Grey Wolf Optimizer,and adaptive mutation into it.Additionally,we utilize an external repository to store non-dominant solution sets and grid technology is used to maintain diversity.Results on fourteen University of California Irvine(UCI)datasets demonstrate that our proposed method effectively removes redundant features and improves classification performance.The source code can be accessed from the website:https://github.com/zc0315/MSMOWOA. 展开更多
关键词 Multi-objective optimization whale optimization algorithm multi-strategy feature selection
下载PDF
Cloud Datacenter Selection Using Service Broker Policies:A Survey
15
作者 Salam Al-E’mari Yousef Sanjalawe +2 位作者 Ahmad Al-Daraiseh Mohammad Bany Taha Mohammad Aladaileh 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期1-41,共41页
Amid the landscape of Cloud Computing(CC),the Cloud Datacenter(DC)stands as a conglomerate of physical servers,whose performance can be hindered by bottlenecks within the realm of proliferating CC services.A linchpin ... Amid the landscape of Cloud Computing(CC),the Cloud Datacenter(DC)stands as a conglomerate of physical servers,whose performance can be hindered by bottlenecks within the realm of proliferating CC services.A linchpin in CC’s performance,the Cloud Service Broker(CSB),orchestrates DC selection.Failure to adroitly route user requests with suitable DCs transforms the CSB into a bottleneck,endangering service quality.To tackle this,deploying an efficient CSB policy becomes imperative,optimizing DC selection to meet stringent Qualityof-Service(QoS)demands.Amidst numerous CSB policies,their implementation grapples with challenges like costs and availability.This article undertakes a holistic review of diverse CSB policies,concurrently surveying the predicaments confronted by current policies.The foremost objective is to pinpoint research gaps and remedies to invigorate future policy development.Additionally,it extensively clarifies various DC selection methodologies employed in CC,enriching practitioners and researchers alike.Employing synthetic analysis,the article systematically assesses and compares myriad DC selection techniques.These analytical insights equip decision-makers with a pragmatic framework to discern the apt technique for their needs.In summation,this discourse resoundingly underscores the paramount importance of adept CSB policies in DC selection,highlighting the imperative role of efficient CSB policies in optimizing CC performance.By emphasizing the significance of these policies and their modeling implications,the article contributes to both the general modeling discourse and its practical applications in the CC domain. 展开更多
关键词 Cloud computing cloud service broker datacenter selection QUALITY-OF-SERVICE user request
下载PDF
Multi-Objective Equilibrium Optimizer for Feature Selection in High-Dimensional English Speech Emotion Recognition
16
作者 Liya Yue Pei Hu +1 位作者 Shu-Chuan Chu Jeng-Shyang Pan 《Computers, Materials & Continua》 SCIE EI 2024年第2期1957-1975,共19页
Speech emotion recognition(SER)uses acoustic analysis to find features for emotion recognition and examines variations in voice that are caused by emotions.The number of features acquired with acoustic analysis is ext... Speech emotion recognition(SER)uses acoustic analysis to find features for emotion recognition and examines variations in voice that are caused by emotions.The number of features acquired with acoustic analysis is extremely high,so we introduce a hybrid filter-wrapper feature selection algorithm based on an improved equilibrium optimizer for constructing an emotion recognition system.The proposed algorithm implements multi-objective emotion recognition with the minimum number of selected features and maximum accuracy.First,we use the information gain and Fisher Score to sort the features extracted from signals.Then,we employ a multi-objective ranking method to evaluate these features and assign different importance to them.Features with high rankings have a large probability of being selected.Finally,we propose a repair strategy to address the problem of duplicate solutions in multi-objective feature selection,which can improve the diversity of solutions and avoid falling into local traps.Using random forest and K-nearest neighbor classifiers,four English speech emotion datasets are employed to test the proposed algorithm(MBEO)as well as other multi-objective emotion identification techniques.The results illustrate that it performs well in inverted generational distance,hypervolume,Pareto solutions,and execution time,and MBEO is appropriate for high-dimensional English SER. 展开更多
关键词 Speech emotion recognition filter-wrapper HIGH-DIMENSIONAL feature selection equilibrium optimizer MULTI-OBJECTIVE
下载PDF
A Support Data-Based Core-Set Selection Method for Signal Recognition
17
作者 Yang Ying Zhu Lidong Cao Changjie 《China Communications》 SCIE CSCD 2024年第4期151-162,共12页
In recent years,deep learning-based signal recognition technology has gained attention and emerged as an important approach for safeguarding the electromagnetic environment.However,training deep learning-based classif... In recent years,deep learning-based signal recognition technology has gained attention and emerged as an important approach for safeguarding the electromagnetic environment.However,training deep learning-based classifiers on large signal datasets with redundant samples requires significant memory and high costs.This paper proposes a support databased core-set selection method(SD)for signal recognition,aiming to screen a representative subset that approximates the large signal dataset.Specifically,this subset can be identified by employing the labeled information during the early stages of model training,as some training samples are labeled as supporting data frequently.This support data is crucial for model training and can be found using a border sample selector.Simulation results demonstrate that the SD method minimizes the impact on model recognition performance while reducing the dataset size,and outperforms five other state-of-the-art core-set selection methods when the fraction of training sample kept is less than or equal to 0.3 on the RML2016.04C dataset or 0.5 on the RML22 dataset.The SD method is particularly helpful for signal recognition tasks with limited memory and computing resources. 展开更多
关键词 core-set selection deep learning model training signal recognition support data
下载PDF
A lightweight symmetric image encryption cryptosystem in wavelet domain based on an improved sine map
18
作者 陈柏池 黄林青 +2 位作者 蔡述庭 熊晓明 张慧 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期266-276,共11页
In the era of big data,the number of images transmitted over the public channel increases exponentially.As a result,it is crucial to devise the efficient and highly secure encryption method to safeguard the sensitive ... In the era of big data,the number of images transmitted over the public channel increases exponentially.As a result,it is crucial to devise the efficient and highly secure encryption method to safeguard the sensitive image.In this paper,an improved sine map(ISM)possessing a larger chaotic region,more complex chaotic behavior and greater unpredictability is proposed and extensively tested.Drawing upon the strengths of ISM,we introduce a lightweight symmetric image encryption cryptosystem in wavelet domain(WDLIC).The WDLIC employs selective encryption to strike a satisfactory balance between security and speed.Initially,only the low-frequency-low-frequency component is chosen to encrypt utilizing classic permutation and diffusion.Then leveraging the statistical properties in wavelet domain,Gaussianization operation which opens the minds of encrypting image information in wavelet domain is first proposed and employed to all sub-bands.Simulations and theoretical analysis demonstrate the high speed and the remarkable effectiveness of WDLIC. 展开更多
关键词 image encryption discrete wavelet transform 1D-chaotic system selective encryption Gaussianization operation
下载PDF
The suitability assessment on site selection for bottom seeding scallop culture based on analytic hierarchy process
19
作者 Ziniu ZHANG Zhenyan WANG +2 位作者 Guihua LI Meihan ZHAO Wenjian LI 《Journal of Oceanology and Limnology》 SCIE CAS CSCD 2024年第2期647-663,共17页
Scallop culture is an important way of bottom-seeding marine ranching,which is of great significance to improve the current situation of fishery resources.However,there are some problems in site-selection evaluation o... Scallop culture is an important way of bottom-seeding marine ranching,which is of great significance to improve the current situation of fishery resources.However,there are some problems in site-selection evaluation of marine ranching,such as imperfect criteria system,complex structure,untargeted criteria quantification,etc.In addition,no site-selection evaluation method of bottom-seeding culture areas for scallops is available.Therefore,we established a hierarchy structure model according to the analytic hierarchy process(AHP)theory,in which social,physical,chemical,and biological environments are used as main criteria,and marine functional zonation,water depth,current,water temperature,salinity,substrate type,water quality,sediment quality,red tide,phytoplankton,and zooplankton are used as sub-criteria,on which a multi-parameter evaluation system is set up.Meanwhile,the dualism method,assignment method,and membership function method were used to quantify sub-criteria,and a quantitative evaluation for the entire criteria was added,including the evaluation and analysis of two types of unsuitable environmental situations.By overall consideration in scallop yield,quality,and marine ranching construction objectives,the weight of the main criteria could be determined.Five grades in the suitability corresponding to the evaluation result were divided,and the Python language was used to create an evaluation system for efficient calculation and intuitive presentation of the evaluation outcome.Eight marine cases were simulated based on existing survey data,and the results prove that the method is feasible for evaluating and analyzing the site selection of bottom-seeding culture areas for scallops under various environmental situations.The proposed evaluation method can be promoted for the site selection of bottom-seeding marine ranching.This study provided theoretical and methodological references for the site selection evaluation of other types of marine ranching. 展开更多
关键词 marine ranching bottom-seeding scallops site selection evaluation analytic hierarchy process evaluation system
下载PDF
Suboptimal Feature Selection Techniques for Effective Malicious Traffic Detection on Lightweight Devices
20
作者 So-Eun Jeon Ye-Sol Oh +1 位作者 Yeon-Ji Lee Il-Gu Lee 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第8期1669-1687,共19页
With the advancement of wireless network technology,vast amounts of traffic have been generated,and malicious traffic attacks that threaten the network environment are becoming increasingly sophisticated.While signatu... With the advancement of wireless network technology,vast amounts of traffic have been generated,and malicious traffic attacks that threaten the network environment are becoming increasingly sophisticated.While signature-based detection methods,static analysis,and dynamic analysis techniques have been previously explored for malicious traffic detection,they have limitations in identifying diversified malware traffic patterns.Recent research has been focused on the application of machine learning to detect these patterns.However,applying machine learning to lightweight devices like IoT devices is challenging because of the high computational demands and complexity involved in the learning process.In this study,we examined methods for effectively utilizing machine learning-based malicious traffic detection approaches for lightweight devices.We introduced the suboptimal feature selection model(SFSM),a feature selection technique designed to reduce complexity while maintaining the effectiveness of malicious traffic detection.Detection performance was evaluated on various malicious traffic,benign,exploits,and generic,using the UNSW-NB15 dataset and SFSM sub-optimized hyperparameters for feature selection and narrowed the search scope to encompass all features.SFSM improved learning performance while minimizing complexity by considering feature selection and exhaustive search as two steps,a problem not considered in conventional models.Our experimental results showed that the detection accuracy was improved by approximately 20%compared to the random model,and the reduction in accuracy compared to the greedy model,which performs an exhaustive search on all features,was kept within 6%.Additionally,latency and complexity were reduced by approximately 96%and 99.78%,respectively,compared to the greedy model.This study demonstrates that malicious traffic can be effectively detected even in lightweight device environments.SFSM verified the possibility of detecting various attack traffic on lightweight devices. 展开更多
关键词 Feature selection lightweight device machine learning Internet of Things malicious traffic
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部