India is the world's third largest producer and third largest consumer of electricity. Traditional billing systems in India lack real-time monitoring, making it difficult to address peak demand efficiently. They o...
详细信息
Affective computing (AC), also known as emotion AI, is a concept that applies modern technology to help systems to recognize and process human emotions and their feelings. Several uses of affective computing have been...
详细信息
Photonics is crucial for communication and computing, as it involves controlling how light scatters. Recent breakthroughs like bound states in the continuum (BICs) and parity-time-symmetric systems are linked to the s...
详细信息
Photonics is crucial for communication and computing, as it involves controlling how light scatters. Recent breakthroughs like bound states in the continuum (BICs) and parity-time-symmetric systems are linked to the scattering matrix, governed by passivity and causality. However, using complex-frequency excitations overcomes these limitations, allowing us to study systems with losses or gains and discover phenomena like virtual critical coupling and virtual gain. Applying complex-frequency-excitation concepts to more complicated systems is challenging. In this work, we extend the lumped-element model from circuit theory to analyze light-scattering anomalies in the complex-frequency domain. This approach helps us design and understand effects such as virtual perfect absorption, BICs, real and virtual critical coupling, exceptional points, and anisotropic transmission resonances. These insights broaden our knowledge of electromagnetic wave phenomena and open possibilities in photonics, offering innovative ways to create and optimize optical devices and systems for various applications.
Fingerprint authentication blends biometric precision with user convenience, leveraging unique ridge patterns for fast, reliable, and tamper-resistant identity verification. However, it remains vulnerable to spoofing ...
详细信息
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile *** networks are sufficiently scaled to interconnect billions of users and *** i...
详细信息
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile *** networks are sufficiently scaled to interconnect billions of users and *** in academia and industry are focusing on technological advancements to achieve highspeed transmission,cell planning,and latency reduction to facilitate emerging applications such as virtual reality,the metaverse,smart cities,smart health,and autonomous *** continuously improves its network functionality to support these *** input multiple output(MIMO)technology offers spectral efficiency,dependability,and overall performance in *** article proposes a secure channel estimation technique in MIMO topology using a norm-estimation model to provide comprehensive insights into protecting NextG network components against adversarial *** technique aims to create long-lasting and secure NextG networks using this extended *** viability of MIMO applications and modern AI-driven methodologies to combat cybersecurity threats are explored in this ***,the proposed model demonstrates high performance in terms of reliability and accuracy,with a 20%reduction in the MalOut-RealOut-Diff metric compared to existing state-of-the-art techniques.
Real-time parallel applications with industrial automation are applications that are designed to run in parallel, in order to accomplish a task in a shorter amount of time. These applications are used in industrial en...
详细信息
Industrial automation has become increasingly important in recent years. It has allowed for increased efficiency, productivity and safety in the workplace, as well as improved quality control of products. However, wit...
详细信息
Our research introduces a novel approach for recognizing multiple emotions by leveraging perspective-based methods. This technique integrates facial features and speech characteristics obtained from different encoders...
详细信息
Data available in software engineering for many applications contains variability and it is not possible to say which variable helps in the process of the *** of the work present in software defect prediction is focus...
详细信息
Data available in software engineering for many applications contains variability and it is not possible to say which variable helps in the process of the *** of the work present in software defect prediction is focused on the selection of best prediction *** this purpose,deep learning and ensemble models have shown promising *** contrast,there are very few researches that deals with cleaning the training data and selection of best parameter values from the *** data available for training the models have high variability and this variability may cause a decrease in model *** deal with this problem we used the Akaike information criterion(AIC)and the Bayesian information criterion(BIC)for selection of the best variables to train the model.A simple ANN model with one input,one output and two hidden layers was used for the training instead of a very deep and complex *** and BIC values are calculated and combination for minimum AIC and BIC values to be selected for the best *** first,variables were narrowed down to a smaller number using correlation *** subsets for all the possible variable combinations were *** the end,an artificial neural network(ANN)model was trained for each subset and the best model was selected on the basis of the smallest AIC and BIC *** was found that combination of only two variables’ns and entropy are best for software defect prediction as it gives minimum AIC and BIC ***,nm and npt is the worst combination and gives maximum AIC and BIC values.
In today's 5G era, the amount of data generated by the Internet of Things (IoT) devices is enormous. Data is processed and stored in the cloud under a traditional cloud computing architecture, and real-time proces...
详细信息
暂无评论