The application of robots to assist humans in earthquake rescue has always been an important topic that researchers are constantly studying. CoSpace Rescue is an abstract modeling and simulation of earthquake rescue a...
详细信息
The present study focuses primarily on the effects of designing a rounded corner classroom for intellectually disabled students in primary schools based on the reverberation time and noise level. Usually, straight 90-...
详细信息
The present study focuses primarily on the effects of designing a rounded corner classroom for intellectually disabled students in primary schools based on the reverberation time and noise level. Usually, straight 90-degree edges are used for classroom corners, but rounded edges for walls and furniture are more comfortable and help to ensure students safety. Therefore, this study examines how a rounded-edge classroom design for walls and furniture affects additive babble and environmental noise level conditions in primary school classrooms for intellectually disabled students. The study compares the two classroom designs (rounded and right-angle corners) covering the same area with different variable factors to improve students’ performance. The computer software program ODEON and the MATLAB programming language were primarily used to investigate the two models. These models were used to predict five design scenarios’ impact to assess acoustic behavior with and without furniture on intellectually disabled students learning. The findings reveal that the proposed model with rounded corner walls and furniture and a high and sloped ceiling performs better than the regular classroom model. The study also confirms that a better study environment can be created for intellectually disabled students to study alongside regular students.
Adequate power provision to the customer and wind energy penetration into the electrical grid is necessitated for accurate wind speed forecasting in the short-term horizon to realize the scheduling, unit commitment, a...
详细信息
Adequate power provision to the customer and wind energy penetration into the electrical grid is necessitated for accurate wind speed forecasting in the short-term horizon to realize the scheduling, unit commitment, and control. According to the various meteorological parameters, the wind speed and energy production from wind energy are affected. Therefore,the author performs the multi-inputs associated Meta learning-based Elman Neural Network(MENN) forecasting model to overcome the uncertainty and generalization problem. The proposed forecasting approach applicability evaluated with real-time data concerning wind speed forecasting on a short-term time scale. Performance analysis reveals that the meta learning-based Elman neural network is robust and conscious than the existing methods, with a least mean square error of 0.0011.
Today cyber adversaries utilize advanced techniques to victimize target assets. To tackle the adversaries, it is of utmost importance to understand potential techniques they may use to exploit network vulnerabilities....
详细信息
Today cyber adversaries utilize advanced techniques to victimize target assets. To tackle the adversaries, it is of utmost importance to understand potential techniques they may use to exploit network vulnerabilities. Attack graph has always been a crucial tool for network vulnerability analysis. However, the current state-of-the-art attack graph can not predict adversarial techniques. To overcome the gap, we utilize the MITRE ATT&CK matrix in this work and map the techniques with the attack graph node descriptions. We first formulate a comprehensive dataset from ATT&CK consisting of all the adversarial strategies, subtechniques, associated tactics, and mitigation for the enterprise network. We then capture the attack graph node descriptions and apply the term frequency-inverse document frequency (TF-IDF) algorithm to map the attack techniques with the available node descriptions. Next, we generate the cosine similarity to determine an adversary’s top methods to attack a network. We then map those techniques with the associated tactics and mitigation strategies as enumerated in the ATT&CK matrix. Finally, we illustrate the analysis using a networked system’s attack graph. This proposed method would help identify and validate adversarial techniques and guide in selecting mitigation mechanisms for security enhancement.
It can detect ambient conditions and convey data for processing purposes; In recent years, the wireless sensor network has surpassed all other networks in popularity. The implementation of WSNs is fraught with several...
详细信息
It can detect ambient conditions and convey data for processing purposes; In recent years, the wireless sensor network has surpassed all other networks in popularity. The implementation of WSNs is fraught with several significant obstacles, such as concerns over energy usage and safety. WSNs are potentially vulnerable to a wide variety of assaults, any one of which might compromise their capacity for reliable communication or lead to the loss of sensitive data. Consequently, as the network deployment gets more extensive and intricate, there is a massive increase in the requirement for intrusion detection-based energy-efficient approaches. The effectiveness of the networks may be evaluated via the use of Qualnet simulation. Using an artificial neural network and a MATLAB Simulink model, this study intends to improve the effectiveness of a power-based intrusion detection strategy. The results reveal that WSN’s detection of intrusions is enhanced by using an ideal technique inspired by biological nervous systems. Not only that, but the unguarded nodes are having a negative effect on network performance and producing disturbances in the network’s behavior. Both methods use regression analysis to distinguish between fully protected and partially protected nodes. Therefore, the packet delivery ratio and the power consumption of the network may be used for accurate node identification in an artificial neural network.
The purpose of this study is to ensure the safety of operation and maintenance of utility tunnel. First of all, the framework of safety management system in operation and maintenance phase of utility tunnel is constru...
详细信息
Current approaches of using neural networks in lane departure warning systems are expensive. And it is difficult for neural networks to process 2K and 4K images. In this paper, we use a series of image preprocessing t...
详细信息
Image super-resolution processing technology refers to the technology of reconstructing high-resolution images by using low-resolution images with mutual displacement of multiple frames of the same scene. At present, ...
详细信息
In this study, we propose an extended Urban Cell Transmission Model (UCTM) that uses the agent concept to handle complex traffic behavior such as signalized intersections in urban arterial traffic. In particular, the ...
详细信息
In this study, we propose an extended Urban Cell Transmission Model (UCTM) that uses the agent concept to handle complex traffic behavior such as signalized intersections in urban arterial traffic. In particular, the proposed model accounts for the turning and traffic signal modeling in intersections, and the lane-changing behavior. The proposed model replicates the periodical queue generation and dissipation caused by the traffic signal at the intersection. For a realistic lane-changing behavior, we define two types of lane-changing depending whether to follow the route or to obtain additional benefits from the travel time. The model is validated with the NGSIM arterial dataset and the results show that the performance of the proposed model replicates the overall urban traffic phenomena adequately. (C) 2020 The Authors. Published by Elsevier B.V.
Agile networks with fast adaptation and reconfiguration capabilities are required for on-demand provisioning of various network services. We propose a new methodical framework for short-time network optimization based...
Agile networks with fast adaptation and reconfiguration capabilities are required for on-demand provisioning of various network services. We propose a new methodical framework for short-time network optimization based on quantum computing (QC) and integer linear program (ILP) models, which has the potential of realizing a real-time network automation. We define methods to map a nearly real-world ILP model for resource provisioning to a quadratic unconstrained binary optimization (QUBO) problem, which is solvable on quantum annealer (QA). We concentrate on the three-node network to evaluate our approach and its obtainable quality of solution using the state-of-the-art quantum annealer D-Wave Advantage™ 5.2/5.3. By studying the annealing process, we find annealing configuration parameters that obtain feasible solutions close to the reference solution generated by the classical ILP-solver CPLEX. Further, we studied the scaling of the network problem and provide estimations on quantum annealer's hardware requirements to enable a proper QUBO problem embedding of larger networks. We achieved the QUBO embedding of networks with up to 6 nodes on the D-Wave Advantage™. According to our estimates a real-sized network with 12 to 16 nodes require a QA hardware with at least 50000 qubits or more.
暂无评论