Neural Network Algorithm for Designing Intelligent Psychological Monitoring System DOI
Lili Yang, Chunming Jiang,

Jianli Wu

et al.

Published: April 26, 2024

The emergence of intelligent psychological monitoring system can effectively provide the accuracy and related efficiency evaluation, explore optimization transfer process counseling, assist counselors to complete work, so as realize evaluation intelligence reference. purpose this paper is automatically identify key information state from a large number multi-source data through based on neural network algorithm, weight it. Through experimental verification, model has achieved good performance in classification prediction state, realized real-time individual extracted characteristics data, classified predicted them, which important theory.

Language: Английский

Deep learning-enabled integration of renewable energy sources through photovoltaics in buildings DOI Creative Commons

M. Arun,

Thanh Tuan Le, Debabrata Barik

et al.

Case Studies in Thermal Engineering, Journal Year: 2024, Volume and Issue: unknown, P. 105115 - 105115

Published: Sept. 1, 2024

Language: Английский

Citations

9

Forecasting Global Sustainable Energy from Renewable Sources Using Random Forest Algorithm DOI Creative Commons
Balasubbareddy Mallala,

Azka Ihtesham Uddin Ahmed,

Sastry Pamidi

et al.

Results in Engineering, Journal Year: 2024, Volume and Issue: unknown, P. 103789 - 103789

Published: Dec. 1, 2024

Language: Английский

Citations

8

Classifying Network Abnormalities Into Faults and Attacks in Iot-Based Cyber-Physical Systems using Machine Learning DOI

Praveen Kumar,

Laith H. Alzubaidi,

N. Nagarjuna

et al.

Published: Feb. 23, 2024

Amidst the proliferation of Industry 4.0, integration artificial intelligence and smart techniques has emerged as a focal point in discussions surrounding industrial cyber-physical systems (CPS). It is still very difficult to detect anomalies way that protects security productivity, especially when there isn't much labeled data available for protection. A novel method called Few-Shot Learning model with Siamese Neural Network (FSL-SNN) presented this paper goal improving accuracy intelligent anomaly detection CPS reducing over-fitting problem. To calculate distances between input samples using their optimum feature representations, encoding network developed. bolster efficiency training process, robust cost function designed, encompassing three specific losses. The culmination these efforts results development an algorithm. experiments conducted on two datasets—one sparse labels other fully shows notable improvements proposed FSL-SNN achieves it comes lowering false alarm rate (FAR) 0.041 raising F1 score 0.975 intrusion signal identification context protection compared existing Convolutional Autoencoder.

Language: Английский

Citations

1

Implementing a Linear and Bottlenecking Gameplay Experience in a Self-Created World DOI

Md Danial Hakim Abd Wahab,

Hema Latha Krishna,

Tet-Khuan Chen

et al.

Published: Dec. 4, 2023

This game set in a time period of the East created based off original story, title is A Broken Warrior. paper will look at competitive analysis between this and another two games used as comparison well plans for improvement. Then there also background studies/Literature review, which covers types flow models that have been walkthrough section conference journal papers to give inspiration game. Level Design paper, where geography covered visual design world shown visually map well. concept just refers overall review game, followed up by challenges are identified levels highlights. Finally, it how player would normally play level. Lastly conclusion future enhancements project left be discussed.

Language: Английский

Citations

1

Optimal Isobath Routing Strategy based on Multibeam Bathymetry Technology DOI

Jieyu Chen,

Y. Liu,

Ao Luo

et al.

Published: Feb. 23, 2024

With the rapid development of channel survey technology, multibeam bathymetric system plays an increasingly important role in survey. Firstly, we establish a physical model, use tangent formula to find out depth seawater D, after analysis plane model and sine theorem coverage width W, then spacing two adjacent lines width, with help expression relationship between overlap rate previous line is solved η. The relation. Finally, SketchUp was used convert given information into three-dimensional for analysis, angles edges structure obtained. We found that optimal wiring strategy "horizontal along isobaths", number vessel on these three slopes 67 total, missed area accounting 1.325% total region.

Language: Английский

Citations

0

Application of Machine Learning Algorithm in Computer Data Remote Backup System DOI

Meier Chen

Published: Feb. 23, 2024

People have higher and requirements for information sharing, put forward demands in terms of storing exchanging data. Remote backup is the process copying all or part data set from application host's hard disk array to other storage media order prevent loss due system operation errors failures. affected by network speed bandwidth limitations, which sometimes results low efficiency. In addition, there are interruptions, errors, etc. process, requires a large amount space, so effective management optimization resources need be considered. improve performance computer remote backup, this article proposes apply machine learning algorithms system, thereby improving classification filtering efficiency quality backup. Several common (decision tree, artificial neural network, Bayesian, random forest stochastic gradient algorithm) systematically tested compare their advantages time consumption. disadvantages full differential incremental compared. The experimental show that spent algorithm 2100ms when file size 2000kb, 3900ms 4000kb, 8907ms 10000kb.

Language: Английский

Citations

0

Big data Intelligence is Applied in Digital Insurance Platform Algorithms DOI

Minghan Xu

Published: Feb. 23, 2024

with the continuons development of China's insurance industry has become a mainstream trend. Digital can make more high-quality and suitable for today's society. The digital transformation better meet high demand insurance, also needs to innovate change. Therefore, this paper proposes platform in China based on big data intelligence conduct analysis. First, computer is used collect analyze indicators are divided according requirements digitalization reduce interfering factor. Then, designs platform, forms an scheme, synthesizes results Analyse. With progress science technology acceleration transformation, traditional facing unprecedented challenges opportunities. In order adapt change, many companies start-ups began explore construction platform. following will discuss core contents, key steps possible depth.

Language: Английский

Citations

0

Embedded Automation Device Based on Trusted Computing DOI
Yuanyuan Chen,

Huiping Wang,

Andong Bi

et al.

Published: Feb. 23, 2024

Trusted computing technology, as a new type of information security has been applied in various fields. In order to ensure the safe and stable operation industrial power automation systems, it is proposed apply trusted embedded devices. Based on brief overview combined with platform module structure, design an device conduct experiments system. The experimental results show that at feed rate 200mm min-1, roughness before compensation 4.139 μ m. after 3.168 M. based this article can some extent solve real-time issues terminal trust construction.

Language: Английский

Citations

0

A Dynamic Planning Algorithm for Talent System based on Enterprise Big Data DOI

Fenglan Wang

Published: Feb. 23, 2024

In enterprise management, human resources, as a key element, have an important impact on the development and competitiveness of enterprises. However, traditional resource management model can no longer meet increasingly complex changeable needs Therefore, introduction models methods based big data is current research hotspot. Based analysis technology, dynamic planning suitable for resources system constructed. The results show that help enterprises predict manpower demand more accurately, allocate reasonably, improve employee performance organizational efficiency between 94% 97%. application this effectively decision-making ability enterprises, thereby enhancing sustainable

Language: Английский

Citations

0

An Effective Hybrid Image Watermarking Encrypted and Decrypted Technique for Copyright Protection DOI
Hassan M. Al–Jawahry, Bura Vijay Kumar, Naveen Chandra

et al.

Published: Feb. 23, 2024

Image watermarking serves as a visual deterrent, signaling potential infringers that the image is protected by copyright. While various methods have been developed in past, existing models encounter limitations such lack of suitability for diverse data types and ineffective generalization. Additionally, absence standardization techniques poses significant challenge. In this proposed approach, images are input into an improved discrete Fourier transform (IDFT) to convert signals from time domain. The Arnold Transform initially applied signal format. Subsequently, Walsh-Hadamard (WHT) employed non-sinusoidal, orthogonal transformation. Finally, Singular Value Decomposition (SVD) implemented decrease number dimensions high-dimensional data, facilitating easier visualization analysis. average Peak Signal-to-Noise Ratio (PSNR), Normalized Cross-Correlation (NCC), Bit Error Rate (BER) hybrid IDFT-WHT-SVD scheme reported 56.58, 0.2651, 0.9902, respectively. This model underwent comparison with other models, including CNN-based robust watermarking, Hyper-Chaotically Encrypted, Cryptographic Technique.

Language: Английский

Citations

0