![](images/graphics/blank.gif)
Random process generated
-
A deep learning approach combining autoencoder with supervised classifiers for IoT anomaly detection
Anomaly detection for Internet of things (IoT) networks is a challenging issue due to the huge number of devices that connect to each other and generate huge amounts of data. In this study, we propose a model combining Autoencoder (AE) with classification algorithms to build an endto-end architecture for processing, feature extraction and data classification.
13p
viambani
18-06-2024
7
1
Download
-
Continued part 1, part 2 of ebook "Basic concepts in computational physics (Second edition)" has presents the following content: stochastic methods; pseudo-random number generators; random sampling methods; a brief introduction to monte-carlo methods; the ising model; some basics of stochastic processes; the random walk and diffusion theory; markov-chain monte carlo and the potts model; data analysis; stochastic optimization; the two-body problem;...
221p
dieptieuung
20-07-2023
9
3
Download
-
In this study, 1000 data sets randomly generated by the FEM through iterations are used for the training process to get optimal weights. Based on these obtained optimal weights, beam behaviors under the changes in material distribution through thickness could then be predicted. In this model, the ANN’s inputs are the gradation index of the power-law distribution and thickness, while the outputs are compliance and beam displacements. The computed results are verified against those derived from the FEM.
12p
inception36
30-11-2021
4
1
Download
-
The cryptographic algorithms Kuznyechik and Magma since 2015 are block cipher standardized in the Russian Federation, formally called GOST R 34.12-2015. Both use fixed functions as a priori selected and differ on the structure, the block length and the bit-level of the processed blocks. In the present paper, we provide a dynamic variant of Kuznyechik and Magma where some of their functions are randomly generated and dependent on pseudorandom sequences.
8p
vivirginia2711
09-12-2020
15
2
Download
-
Cogen ash, a by-product of sugar mills obtained during co-generation process to produce heat and electrical energy by burning bagasse and/or coal was used to study its effect on growth and yield of paddy. The experiment was conducted in two sites at Bharathinagar, K.M. Doddi, Mandya during kharif 2014 with 13 treatments replicated thrice using randomized complete block design. The cogen ash collected from M/s Sri Chamundeshwari Sugars Ltd. was used in the study was more of silt sized, alkaline in nature with medium EC.
7p
trinhthamhodang7
31-08-2020
22
1
Download
-
: Fragmentation at random nucleotide locations is an essential process for preparation of DNA libraries to be used on massively parallel short-read DNA sequencing platforms. Although instruments for physical shearing, such as the Covaris S2 focused-ultrasonicator system.
13p
viuchiha2711
21-04-2020
6
0
Download
-
Microorganisms play important roles in the recycling of agricultural wastes. Composting is the degradation of organic materials through the activities of diverse microorganisms. The compost generated by bioconversion of agro-residues offers several benefits such as enhanced soil fertility and soil health which can lead to increased agricultural productivity, improved soil biodiversity, reduced ecological risks and a healthier environment. This investigation examined the microbial community dynamics, loads and identification of microbiota at various stages of composting process.
11p
chauchaungayxua3
07-02-2020
20
1
Download
-
Agriculture and Food processing sector is the backbone of India’s economy in terms of income, employment generation and ensuring food and nutritional security. A women entrepreneur is one who innovates, initiates or adopts a business activity. Women Entrepreneur is a person who accepts challenging role to meet her personal needs and become economically independent. The study was conducted in Hassan district of Karnataka state. The district Comprises of 8 taluk`s viz., Hassan, Arakalagudu, Alur, Sakaleshpura, Channarayapatna, Holenarasipura, Belur and Arasikere.
7p
kethamoi2
14-12-2019
16
0
Download
-
In this paper we explore a random process generated by the incomplete Gauss sums and establish an analogue of weak invariance principle for these sums. We focus our attention exclusively on a generalization of the limit distribution of the long incomplete Gauss sums given by the family of periodic functions analyzed by the author and Marklof.
11p
danhdanh27
07-01-2019
17
2
Download
-
Étude 6-1: Recursive Iteration through a List Étude 6-2: Iteration through Lists (More Practice) Étude 6-3: Accumulating the Sum of a List Interlude: “Mistakes were made.
128p
goshop_123
26-04-2013
63
6
Download
-
The attack we propose aims at keystroke eavesdrop- ping. However, the privacy implication of disclosing the ESP/EIP information of other users’ process can be much more significant. With our techniques, such information can be conveniently converted to a system-call sequence that describes the behavior of the process, and some- times, the data it works on and the activities of its users.
15p
nhacsihuytuan
06-04-2013
52
3
Download
-
In general we do not like to wait. But reduction of the waiting time usually requires extra investments. To decide whether or not to invest, it is important to know the eect of the investment on the waiting time. So we need models and techniques to analyse such situations.In this course we treat a number of elementary queueing models. Attention is paid to methods for the analysis of these models, and also to applications of queueing models.
180p
dinhnhambk
04-04-2013
87
10
Download
-
This prediction is, of course, dependent on the assumption that sales follow a random walk. For example, if sales followed a simple autoregressive process, with the variable expense assumption earnings would follow a similar process. The preceding analysis shows that a very simple model of the firm that assumes sales follow a random walk and allows only for accounts receivable, accounts payable and inventory accruals can generate the basic time series properties observed for operating cash flows, earnings, and accruals.
32p
bin_pham
06-02-2013
43
6
Download
-
The concept of data or information processing arises in a variety of fields. Understanding the principles behind this concept is fundamental to computer design, communications, manufacturing process control, biomedical engineering, and an increasingly large number of other areas of technology and science. It is impossible to imagine modern life without computers for generating, analyzing, and retrieving large amounts of information, as well as communicating information to end users regardless of their location....
384p
beobobeo
01-08-2012
70
11
Download
-
Practical DSP Applications in Communications There are many DSP applications that are used in our daily lives, some of which have been introduced in previous chapters. DSP algorithms, such as random number generation, tone generation and detection, echo cancellation, channel equalization, noise reduction, speech and image coding, and many others can be found in a variety of communication systems. In this chapter, we will introduce some selected DSP applications in communications that played an important role in the realization of the systems. 9.
45p
khinhkha
29-07-2010
91
8
Download
-
There are many DSP applications that are used in our daily lives, some of which have been introduced in previous chapters. DSP algorithms, such as random number generation, tone generation and detection, echo cancellation, channel equalization, noise reduction, speech and image coding, and many others can be found in a variety of communication systems. In this chapter, we will introduce some selected DSP applications in communications that played an important role in the realization of the systems. ...
45p
duongph05
08-06-2010
100
24
Download
-
Linear Prediction Modelling of Speech Linear predictive models are widely used in speech processing applications such as low–bit–rate speech coding in cellular telephony, speech enhancement and speech recognition. Speech is generated by inhaling air into the lungs, and then exhaling it through the vibrating glottis cords and the vocal tract. The random, noise-like, air flow from the lungs is spectrally shaped and amplified by the vibrations of the glottal cords and the resonance of the vocal tract.
20p
balanghuyen
13-01-2010
119
28
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)