The existing limitations in extractive text summarization encompass challenges related to preserving contextual features, limited feature extraction capabilities, and handling hierarchical and compositional aspects. T...
详细信息
Birds are nice-looking from their aesthetic looks and life styles, around 50 billion of birds are living on the earth where some birds are in threat of extinction. For people, distinguishing and classification of bird...
详细信息
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world ***...
详细信息
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world *** existing analysis of software security vulnerabilities often focuses on specific features or *** partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the *** key novelty lies in overcoming the constraints of partial *** proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security *** guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each *** guidelines are not only practical but also applicable in real-world software,allowing for prioritized security *** proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related *** analysis resulted in the identification of a total of 121 *** successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules.
The growing use of the internet has increased the threat of cyberattacks. Anomaly detection systems are vital for protecting networks by spotting irregular activities. Various studies investigated anomaly detection te...
详细信息
Ciphertext Policy-Attribute Based Encryption (CP-ABE) is a secure one-to-many asymmetric encryption schemes where access control of a shared resource is defined in terms of a set of attributes possessed by a user. Key...
详细信息
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Rec...
详细信息
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Recognition(HAR)***,the significant computational demands and memory requirements hinder the practical deployment of deep networks in resource-constrained *** paper introduces a novel network pruning method based on the energy spectral density of data in the frequency domain,which reduces the model’s depth and accelerates activity *** traditional pruning methods that focus on the spatial domain and the importance of filters,this method converts sensor data,such as HAR data,to the frequency domain for *** emphasizes the low-frequency components by calculating their energy spectral density ***,filters that meet the predefined thresholds are retained,and redundant filters are removed,leading to a significant reduction in model size without compromising performance or incurring additional computational ***,the proposed algorithm’s effectiveness is empirically validated on a standard five-layer CNNs backbone *** computational feasibility and data sensitivity of the proposed scheme are thoroughly ***,the classification accuracy on three benchmark HAR datasets UCI-HAR,WISDM,and PAMAP2 reaches 96.20%,98.40%,and 92.38%,***,our strategy achieves a reduction in Floating Point Operations(FLOPs)by 90.73%,93.70%,and 90.74%,respectively,along with a corresponding decrease in memory consumption by 90.53%,93.43%,and 90.05%.
Globally, neurodegenerative diseases like dementia and Alzheimer's represent a major danger to our healthcare system. Clinical evaluations, which may or may not be able to identify the modest cognitive changes tha...
详细信息
Malicious cyberattacks can frequently hide among enormous amounts of regular data in networks with uneven traffic patterns. The identification of imbalance network traffic is difficult to find and making a challenge i...
详细信息
Since the fault dynamic of droop-controlled inverter is different from synchronous generators (SGs), protection devices may become invalid, and the fault overcurrent may damage power electronic devices and threaten th...
详细信息
Since the fault dynamic of droop-controlled inverter is different from synchronous generators (SGs), protection devices may become invalid, and the fault overcurrent may damage power electronic devices and threaten the safety of the microgrid. Therefore, it is imperative to conduct a comprehensive fault analysis of the inverter to guide the design of protection schemes. However, due to the complexity of droop control strategy, existing literatures have simplified asymmetric fault analysis of droop-controlled inverters to varying degrees. Therefore, accurate fault analysis of a droop-controlled inverter is needed. In this paper, by analyzing the control system, an accurate fault model is established. Based on this, a calculation method for instantaneous asymmetrical fault current is proposed. In addition, the current components and current characteristics are analyzed. It was determined that fault currents are affected by control loops, fault types, fault distance and nonlinear limiters. In particular, the influences of limiters on the fault model, fault current calculation and fault current characteristics were analyzed. Through detailed analysis, it was found that dynamics of the control loop cannot be ignored, the fault type and fault distance determine fault current level, and part of the limiters will totally change the fault current trend. Finally, calculation and experimental results verify the correctness of the proposed method.
Road traffic management requires the ability to foresee geographical congestion conditions in an urban road traffic network. The proposed investigation is aimed to envisage the presence of blockage in a specific regio...
详细信息
暂无评论