Network-Computation in Neural Systems最新文献

筛选
英文 中文
Hybrid deep learning and optimized clustering mechanism for load balancing and fault tolerance in cloud computing. 用于云计算负载平衡和容错的混合深度学习和优化聚类机制。
IF 1.1 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-06-27 DOI: 10.1080/0954898X.2024.2369137
Vahini Siruvoru, Shivampeta Aparna
{"title":"Hybrid deep learning and optimized clustering mechanism for load balancing and fault tolerance in cloud computing.","authors":"Vahini Siruvoru, Shivampeta Aparna","doi":"10.1080/0954898X.2024.2369137","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2369137","url":null,"abstract":"<p><p>Cloud services are one of the most quickly developing technologies. Furthermore, load balancing is recognized as a fundamental challenge for achieving energy efficiency. The primary function of load balancing is to deliver optimal services by releasing the load over multiple resources. Fault tolerance is being used to improve the reliability and accessibility of the network. In this paper, a hybrid Deep Learning-based load balancing algorithm is developed. Initially, tasks are allocated to all VMs in a round-robin method. Furthermore, the Deep Embedding Cluster (DEC) utilizes the Central Processing Unit (CPU), bandwidth, memory, processing elements, and frequency scaling factors while determining if a VM is overloaded or underloaded. The task performed on the overloaded VM is valued and the tasks accomplished on the overloaded VM are assigned to the underloaded VM for cloud load balancing. In addition, the Deep Q Recurrent Neural Network (DQRNN) is proposed to balance the load based on numerous factors such as supply, demand, capacity, load, resource utilization, and fault tolerance. Furthermore, the effectiveness of this model is assessed by load, capacity, resource consumption, and success rate, with ideal values of 0.147, 0.726, 0.527, and 0.895 are achieved.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-22"},"PeriodicalIF":1.1,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141460768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational models advance deep brain stimulation for Parkinson's disease. 计算模型推动了治疗帕金森病的深部脑刺激疗法。
IF 1.1 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-06-26 DOI: 10.1080/0954898X.2024.2361799
Yongtong Wu, Kejia Hu, Shenquan Liu
{"title":"Computational models advance deep brain stimulation for Parkinson's disease.","authors":"Yongtong Wu, Kejia Hu, Shenquan Liu","doi":"10.1080/0954898X.2024.2361799","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2361799","url":null,"abstract":"<p><p>Deep brain stimulation(DBS) has become an effective intervention for advanced Parkinson's disease(PD), but the exact mechanism of DBS is still unclear. In this review, we discuss the history of DBS, the anatomy and internal architecture of the basal ganglia (BG), the abnormal pathological changes of the BG in PD, and how computational models can help understand and advance DBS. We also describe two types of models: mathematical theoretical models and clinical predictive models. Mathematical theoretical models simulate neurons or neural networks of BG to shed light on the mechanistic principle underlying DBS, while clinical predictive models focus more on patients' outcomes, helping to adapt treatment plans for each patient and advance novel electrode designs. Finally, we provide insights and an outlook on future technologies.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-32"},"PeriodicalIF":1.1,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141460766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing radiographic image interpretation: WARES-PRS model for knee bone tumour detection. 增强放射影像判读:用于膝关节骨肿瘤检测的 WARES-PRS 模型
IF 1.1 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-06-26 DOI: 10.1080/0954898X.2024.2357660
Rahamathunnisa Usuff, Sudhakar Kothandapani, Rajesh Rangan, Saravanan Dhatchnamurthy
{"title":"Enhancing radiographic image interpretation: WARES-PRS model for knee bone tumour detection.","authors":"Rahamathunnisa Usuff, Sudhakar Kothandapani, Rajesh Rangan, Saravanan Dhatchnamurthy","doi":"10.1080/0954898X.2024.2357660","DOIUrl":"10.1080/0954898X.2024.2357660","url":null,"abstract":"<p><p>The early diagnosis of tumour is significant in biomedical research field to lower the severity level and restrict the process extension from cancer. Moreover, the detection of early sign of cancer is undertaken with extensive research efforts that dedicated to the disclosure and recognition of tumours. However, the limited data size as well as diverse appearance of images lowered the detection performance and failed to detect complex stage of tumour. So to solve these issues, a Weighted Adaptive Random Ensemble Support Vector-based Partial Reinforcement Search (WARES-PRS) algorithm is proposed that detected bone lesions accurately and also predicted the severity level stage efficiently. Further, the detection is performed with varied stages to diminish the presence of noise and undertaken effective classification. The performance is validated with CNUH dataset that enhanced image pre-processing tasks. Despite the proposed method uncover the mutual relationships between each pixel's local texture and the overall image's global context. The detection and classification efficiency is validated with various measures and the experimental results revealed that the detection accuracy is enhanced for the proposed approach by 98.5%. The outcomes of our study have exhibited a substantial contribution to assisting physicians in the detection of knee bone tumours.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-31"},"PeriodicalIF":1.1,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141460767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analyses of weighted superposition attraction-repulsion algorithms in solving difficult optimization problems. 加权叠加吸引-排斥算法在解决困难优化问题中的性能分析。
IF 1.1 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-06-24 DOI: 10.1080/0954898X.2024.2367481
Adil Baykasoğlu
{"title":"Performance analyses of weighted superposition attraction-repulsion algorithms in solving difficult optimization problems.","authors":"Adil Baykasoğlu","doi":"10.1080/0954898X.2024.2367481","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2367481","url":null,"abstract":"<p><p>The purpose of this paper is to test the performance of the recently proposed weighted superposition attraction-repulsion algorithms (WSA and WSAR) on unconstrained continuous optimization test problems and constrained optimization problems. WSAR is a successor of weighted superposition attraction algorithm (WSA). WSAR is established upon the superposition principle from physics and mimics attractive and repulsive movements of solution agents (vectors). Differently from the WSA, WSAR also considers repulsive movements with updated solution move equations. WSAR requires very few algorithm-specific parameters to be set and has good convergence and searching capability. Through extensive computational tests on many benchmark problems including CEC'2015 and CEC'2020 performance of the WSAR is compared against WSA and other metaheuristic algorithms. It is statistically shown that the WSAR algorithm is able to produce good and competitive results in comparison to its predecessor WSA and other metaheuristic algorithms.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-57"},"PeriodicalIF":1.1,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141447639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EfficientNet-deep quantum neural network-based economic denial of sustainability attack detection to enhance network security in cloud. 基于 EfficientNet 深度量子神经网络的经济拒绝可持续性攻击检测,以增强云中的网络安全。
IF 1.1 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-06-21 DOI: 10.1080/0954898X.2024.2361093
Mariappan Navaneethakrishnan, Maharajan Robinson Joel, Sriram Kalavai Palani, Gandhi Jabakumar Gnanaprakasam
{"title":"EfficientNet-deep quantum neural network-based economic denial of sustainability attack detection to enhance network security in cloud.","authors":"Mariappan Navaneethakrishnan, Maharajan Robinson Joel, Sriram Kalavai Palani, Gandhi Jabakumar Gnanaprakasam","doi":"10.1080/0954898X.2024.2361093","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2361093","url":null,"abstract":"<p><p>Cloud computing (CC) is a future revolution in the Information technology (IT) and Communication field. Security and internet connectivity are the common major factors to slow down the proliferation of CC. Recently, a new kind of denial of service (DDoS) attacks, known as Economic Denial of Sustainability (EDoS) attack, has been emerging. Though EDoS attacks are smaller at a moment, it can be expected to develop in nearer prospective in tandem with progression in the cloud usage. Here, EfficientNet-B3-Attn-2 fused Deep Quantum Neural Network (EfficientNet-DQNN) is presented for EDoS detection. Initially, cloud is simulated and thereafter, considered input log file is fed to perform data pre-processing. Z-Score Normalization ;(ZSN) is employed to carry out pre-processing of data. Afterwards, feature fusion (FF) is accomplished based on Deep Neural Network (DNN) with Kulczynski similarity. Then, data augmentation (DA) is executed by oversampling based upon Synthetic Minority Over-sampling Technique (SMOTE). At last, attack detection is conducted utilizing EfficientNet-DQNN. Furthermore, EfficientNet-DQNN is formed by incorporation of EfficientNet-B3-Attn-2 with DQNN. In addition, EfficientNet-DQNN attained 89.8% of F1-score, 90.4% of accuracy, 91.1% of precision and 91.2% of recall using BOT-IOT dataset at K-Fold is 9.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-25"},"PeriodicalIF":1.1,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141433400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An optimized deep strategy for recognition and alleviation of DDoS attack in SD-IoT. 用于识别和缓解 SD-IoT 中 DDoS 攻击的优化深度策略。
IF 7.8 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-06-17 DOI: 10.1080/0954898X.2024.2356852
Kalpana Kumbhar, Prachi Mukherji
{"title":"An optimized deep strategy for recognition and alleviation of DDoS attack in SD-IoT.","authors":"Kalpana Kumbhar, Prachi Mukherji","doi":"10.1080/0954898X.2024.2356852","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2356852","url":null,"abstract":"<p><p>The attacks like distributed denial-of-service (DDoS) are termed as severe defence issues in data centres, and are considered real network threat. These types of attacks can produce huge disturbances in information technologies. In addition, it is a complex task to determine and fully alleviate DDoS attacks. The new strategy is developed to identify and alleviate DDoS attacks in the Software-Defined Internet of Things (SD-IoT) model. SD-IoT simulation is executed to gather data. The data collected through nodes of SD-IoT are fed to the selection of feature phases. Here, the hybrid process is considered to select features, wherein features, like wrapper-based technique, cosine similarity-based technique, and entropy-based technique are utilized to choose the significant features. Thereafter, the attack discovery process is done with Elephant Water Cycle (EWC)-assisted deep neuro-fuzzy network (DNFN). The EWC is adapted to train DNFN, and here EWC is obtained by grouping Elephant Herd Optimization (EHO) and water cycle algorithm (WCA). Finally, attack mitigation is carried out to secure the SD-IoT. The EWC-assisted DNFN revealed the highest accuracy of 96.9%, TNR of 98%, TPR of 90%, precision of 93%, and F1-score of 91%, when compared with other related techniques.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-32"},"PeriodicalIF":7.8,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141332509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual-input robust diagnostics for railway point machines via audio signals. 通过音频信号为铁路点检机提供双输入稳健诊断。
IF 7.8 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-06-11 DOI: 10.1080/0954898X.2024.2358955
Tao Wen, Jinke Li, Rong Fei, Xinhong Hei, Zhiming Chen, Zhurong Wang
{"title":"Dual-input robust diagnostics for railway point machines via audio signals.","authors":"Tao Wen, Jinke Li, Rong Fei, Xinhong Hei, Zhiming Chen, Zhurong Wang","doi":"10.1080/0954898X.2024.2358955","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2358955","url":null,"abstract":"<p><p>Railway Point Machine (RPM) is a fundamental component of railway infrastructure and plays a crucial role in ensuring the safe operation of trains. Its primary function is to divert trains from one track to another, enabling connections between different lines and facilitating route selection. By judiciously deploying turnouts, railway systems can provide efficient transportation services while ensuring the safety of passengers and cargo. As signal processing technologies develop rapidly, taking the easy acquisition advantages of audio signals, a fault diagnosis method for RPMs is proposed by considering noise and multi-channel signals. The proposed method consists of several stages. Initially, the signal is subjected to pre-processing steps, including cropping and channel separation. Subsequently, the signal undergoes noise addition using the Random Length and Dynamic Position Noises Superposition (RDS) module, followed by conversion to a greyscale image. To enhance the data, Synthetic Minority Oversampling Technique (SMOTE) module is applied. Finally, the training data is fed into a Dual-input Attention Convolutional Neural Network (DIACNN). By employing various experimental techniques and designing diverse datasets, our proposed method demonstrates excellent robustness and achieves an outstanding classification accuracy of 99.73%.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-22"},"PeriodicalIF":7.8,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141302120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Siamese domain adaptation convolutional neural network-based quaternion fractional order Meixner moments fostered big data analytical method for enhancing cloud data security. 基于深度暹罗域自适应卷积神经网络的四元数分数阶梅克斯纳矩大数据分析方法,用于增强云数据安全性。
IF 7.8 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-06-11 DOI: 10.1080/0954898X.2024.2354477
J Sulthan Alikhan, S Miruna Joe Amali, R Karthick
{"title":"Deep Siamese domain adaptation convolutional neural network-based quaternion fractional order Meixner moments fostered big data analytical method for enhancing cloud data security.","authors":"J Sulthan Alikhan, S Miruna Joe Amali, R Karthick","doi":"10.1080/0954898X.2024.2354477","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2354477","url":null,"abstract":"<p><p>In this paper, Quaternion Fractional Order Meixner Moments-based Deep Siamese Domain Adaptation Convolutional Neural Network-based Big Data Analytical Technique is proposed for improving Cloud Data Security (DSDA-CNN-QFOMM-BD-CDS). The proposed methodology comprises six phases: data collection, transmission, pre-processing, storage, analysis, and security of data. Big data analysis methodologies start with the data collection phase. Deep Siamese domain adaptation convolutional Neural Network (DSDA-CNN) is applied to categorize the types of attacks in the cloud database during the data analysis process. During data security phase, Quaternion Fractional Order Meixner Moments (QFOMM) is employed to protect the cloud data for encryption with decryption. The proposed method is implemented in JAVA and assessed using performance metrics, including precision, sensitivity, accuracy, recall, specificity, f-measure, computational complexity information loss, compression ratio, throughput, encryption time, decryption time. The performance of the proposed method offers 23.31%, 15.64%, 18.89% better accuracy and 36.69%, 17.25%, 19.96% less information loss. When compared to existing methods like Fractional order discrete Tchebyshev encryption fostered big data analytical model to maximize the safety of cloud data depend on Enhanced Elman spike neural network (EESNN-FrDTM-BD-CDS), an innovative scheme architecture for safe authentication along data sharing in cloud enabled Big data Environment (LZMA-DBSCAN-BD-CDS).</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-28"},"PeriodicalIF":7.8,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141302119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Support vector machine-based stock market prediction using long short-term memory and convolutional neural network with aquila circle inspired optimization. 基于支持向量机的股票市场预测,使用长短期记忆和卷积神经网络,以及受奎拉圆圈启发的优化。
IF 7.8 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-06-10 DOI: 10.1080/0954898X.2024.2358957
J Karthick Myilvahanan, N Mohana Sundaram
{"title":"Support vector machine-based stock market prediction using long short-term memory and convolutional neural network with aquila circle inspired optimization.","authors":"J Karthick Myilvahanan, N Mohana Sundaram","doi":"10.1080/0954898X.2024.2358957","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2358957","url":null,"abstract":"<p><p>Predicting the stock market is one of the significant chores and has a successful prediction of stock rates, and it helps in making correct decisions. The prediction of the stock market is the main challenge due to blaring, chaotic data as well as non-stationary data. In this research, the support vector machine (SVM) is devised for performing an effective stock market prediction. At first, the input time series data is considered and the pre-processing of data is done by employing a standard scalar. Then, the time intrinsic features are extracted and the suitable features are selected in the feature selection stage by eliminating other features using recursive feature elimination. Afterwards, the Long Short-Term Memory (LSTM) based prediction is done, wherein LSTM is trained to employ Aquila circle-inspired optimization (ACIO) that is newly introduced by merging Aquila optimizer (AO) with circle-inspired optimization algorithm (CIOA). On the other hand, delay-based matrix formation is conducted by considering input time series data. After that, convolutional neural network (CNN)-based prediction is performed, where CNN is tuned by the same ACIO. Finally, stock market prediction is executed utilizing SVM by fusing the predicted outputs attained from LSTM-based prediction and CNN-based prediction. Furthermore, the SVM attains better outcomes of minimum mean absolute percentage error; (MAPE) and normalized root-mean-square error (RMSE) with values about 0.378 and 0.294.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-36"},"PeriodicalIF":7.8,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141297344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure worst elite sailfish optimizer based routing and deep learning for black hole attack detection. 基于路由和深度学习的黑洞攻击检测的安全最差精英旗鱼优化器。
IF 7.8 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-06-10 DOI: 10.1080/0954898X.2024.2363353
Mandeep Kumar, Jahid Ali
{"title":"A secure worst elite sailfish optimizer based routing and deep learning for black hole attack detection.","authors":"Mandeep Kumar, Jahid Ali","doi":"10.1080/0954898X.2024.2363353","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2363353","url":null,"abstract":"<p><p>The Wireless Sensor Network (WSN) is susceptible to two kinds of attacks, namely active attack and passive attack. In an active attack, the attacker directly communicates with the target system or network. In contrast, in passive attack, the attacker is in indirect contact with the network. To preserve the functionality and dependability of wireless sensor networks, this research has been conducted recently to detect and mitigate the black hole attacks. In this research, a Deep learning (DL) based black hole attack detection model is designed. The WSN simulation is the beginning stage of this process. Moreover, routing is the key process, where the data is passed to the base station (BS) via the shortest and finest route. The proposed Worst Elite Sailfish Optimization (WESFO) is utilized for routing. Moreover, black hole attack detection is performed in the BS. The Auto Encoder (AE) is employed in attack detection, which is trained with the use of the proposed WESFO algorithm. Additionally, the proposed model is validated in terms of delay, Packet Delivery Rate (PDR), throughput, False-Negative Rate (FNR), and False-Positive Rate (FPR) parameters with the corresponding outcomes like 25.64 s, 94.83%, 119.3, 0.084, and 0.135 are obtained.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-26"},"PeriodicalIF":7.8,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141297343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信