|
|
|
Zhi Quan, Hailong Zhang, Jiyu Luo and Haijun Sun
Signal modulation recognition is often reliant on clustering algorithms. The fuzzy c-means (FCM) algorithm, which is commonly used for such tasks, often converges to local optima. This presents a challenge, particularly in low-signal-to-noise-ratio (SNR)...
ver más
|
|
|
|
|
|
Liqiu Chen, Chongshi Gu, Sen Zheng and Yanbo Wang
Real and effective monitoring data are crucial in assessing the structural safety of dams. Gross errors, resulting from manual mismeasurement, instrument failure, or other factors, can significantly impact the evaluation process. It is imperative to elim...
ver más
|
|
|
|
|
|
Yiming Tang, Rui Chen and Bowen Xia
Nowadays, most fuzzy clustering algorithms are sensitive to the initialization results of clustering algorithms and have a weak ability to handle high-dimensional data. To solve these problems, we developed the viewpoint-driven subspace fuzzy c-means (VS...
ver más
|
|
|
|
|
|
Shiu-Shin Lin, Jheng-Hua Song, Kai-Yang Zhu, Yi-Chuan Liu and Hsien-Cheng Chang
Typhoon intensity forecast is an important issue. The objective of this study is to construct a 5-day 12-hourly typhoon intensity forecast model based on the adaptive neuro-fuzzy inference systems (ANFIS) to improve the typhoon intensity forecast in the ...
ver más
|
|
|
|
|
|
Konstantinos Charmanas, Nikolaos Mittas and Lefteris Angelis
Security vulnerabilities constitute one of the most important weaknesses of hardware and software security that can cause severe damage to systems, applications, and users. As a result, software vendors should prioritize the most dangerous and impactful ...
ver más
|
|
|