Browse
Recent Submissions
Now showing 1 - 5 of 9
- ItemDifferential Evolution and Engineering Problems(Institute of Automation and Computer Science, Brno University of Technology, 2023-06-30) Bujok, Petr; Lacko, Martin; Kolenovský, PatrikIn this paper, the performance of the Differential Evolution algorithm is evaluated when solving real-world problems. A Set of 13 engineering optimisation problems was selected from the fields of mechanics and industry to illustrate the usability of the Differential Evolution algorithm. Twelve variants of the standard Differential Evolution with various settings of the control parameters are compared with 19 state-of-the-art adaptive variants of this algorithm. The results are analysed statistically to achieve significant differences. Three variants of adaptive Differential Evolution provided better results compared to other algorithms. Some adaptive variants of Differential Evolution perform significantly worse than the original Differential Evolution with the fixed setting of the control parameters.
- ItemThe Routh Hurwitz Criteria for Studying The Stability and Bifurcation in Multispiral Chua Chaotic Attractor(Institute of Automation and Computer Science, Brno University of Technology, 2023-06-30) Belouerghi, Malika; Menacer, Tidjani; Lozi, RenéThis article discusses the multispiral Chua Chaotic attractor’s hidden bifurcations that are generated by the sine function. The number of spirals (also known as a multiscroll attractor) that are controlled by the integer parameter c can be used to describe the basic shape of chaotic attractors. Since this parameter is an integer, increasing it by one does not allow the observation of bifurcations from n to n + 2 spirals. The method of hidden bifurcations, however, enables the observation of such bifurcations by adding a real parameter ε. Chaotic attractors with either an even or an odd number of spirals are visible along the marked paths of bifurcation. Moreover, this additional hidden parameter allows finding the bifurcation of the multispiral Chua attractor from a stable state to a chaotic state. Furthermore, the Routh-Hurwitz criteria are used to study the stability of the original equilibrium point of the Chua attractor.
- ItemPre-training Two BERT-Like Models for Moroccan Dialect: MorRoBERTa and MorrBERT(Institute of Automation and Computer Science, Brno University of Technology, 2023-06-30) Moussaoui, Otman; El Younnoussi, YacineThis research article presents a comprehensive study on the pre-training of two language models, MorRoBERTa and MorrBERT, for the Moroccan Dialect, using the Masked Language Modeling (MLM) pre-training approach. The study details the various data collection and pre-processing steps involved in building a large corpus of over six million sentences and 71 billion tokens, sourced from social media platforms such as Facebook, Twitter, and YouTube. The pre-training process was carried out using the HuggingFace Transformers API, and the paper elaborates on the configurations and training methodologies of the models. The study concludes by demonstrating the high accuracy rates achieved by both MorRoBERTa and MorrBERT in multiple downstream tasks, indicating their potential effectiveness in natural language processing applications specific to the Moroccan Dialect.
- ItemA Study on Heuristic Algorithms Combined With LR on a DNN-Based IDS Model to Detect IoT Attacks(Institute of Automation and Computer Science, Brno University of Technology, 2023-06-30) Thanh Thuy, Tran Thi; Duc Thuan, Luong; Hong Duc, Nguyen; Trong Minh, HoangCurrent security challenges are made more difficult by the complexity and difficulty of spotting cyberattacks due to the Internet of Things explosive growth in connected devices and apps. Therefore, various sophisticated attack detection techniques have been created to address these issues in recent years. Due to their effectiveness and scalability, machine learning-based intrusion detection systems (IDSs) have increased. However, several factors, such as the characteristics of the training dataset and the training model, affect how well these AI-based systems identify attacks. In particular, the heuristic algorithms (GA, PSO, CSO, FA) optimized by the logistic regression (LR) approach employ it to pick critical features of a dataset and deal with data imbalance problems. This study offers an intrusion detection system (IDS) based on a deep neural network and heuristic algorithms combined with LR to boost the accuracy of attack detections. Our proposed model has a high attack detection rate of up to 99% when testing on the IoT-23 dataset.
- ItemIntegration of the Hybrid Decision Support System and Machine Learning Algorithm to Determine Government Assistance Recipients: A Case Study in the Indonesian Funding Program(Institute of Automation and Computer Science, Brno University of Technology, 2023-06-30) Adiwijaya, Indra Rusyadi; Indratno, Sapto Wahyu; Siallagan, Manahan; Widodo, Agus; Gandara, EkaThe Indonesian government provides incentives to facilitate community development through various funding programs to improve the economy and restore the national economy. However, there were many obstacles in determining the proper target beneficiaries. This study aims to assist decision-makers in determining targeted and accountable beneficiary candidates. In this study, a hybrid Analytical Hierarchy Process (AHP) method with Simple Additive Weighting (SAW) was used and integrated with machine learning modeling using Logistic Regression (LR). The AHP approach is used to determine the weight of each criterion, and the SAW method is used to sort out each available alternative with the help of an expert team's assessment. Instead, the LR method is used for the predictive analysis and classification of the resulting data.