Electric Vehicles (EVs) become very important issue and gained attention due to many reasons like its economic price, saving environment and more reliable. In this study, controlling speed for EV is utilized by tracki...
详细信息
In recent years, cloud-native applications have been widely hosted and managed in containerized environments due to their unique benefits, such as being lightweight, portable, and cost-efficient. Their growing popular...
详细信息
Cyberbullying is one of the complicated problems in Arabic communities. Cyberbullying detection is the main key to control racism and hate speech over the Internet especially on social media. Detection of cyberbullyin...
详细信息
Panoptic segmentation, a crucial computer vision task for scene understanding, simultaneously combines semantic segmentation and instance segmentation to classify pixels and identify object instances in images. Despit...
详细信息
INTRODUCTION: A robust method is proposed in this paper to detect helmet usage in two-wheeler riders to enhance road safety. OBJECTIVES: This involves a custom made dataset that contains 1000 images captured under div...
详细信息
In most of the scientific research feature selection is a challenge for *** all available features is not an option as it usually complicates the research and leads to performance drop when dealing with large *** the ...
详细信息
In most of the scientific research feature selection is a challenge for *** all available features is not an option as it usually complicates the research and leads to performance drop when dealing with large *** the other hand,ignoring some features can compromise the data *** the rough set theory presents a good technique to identify the redundant features which can be dismissed without losing any valuable information,however,exploring all possible combinations of features will end with NP-hard *** this research we propose adopting a heuristic algorithm to solve this problem,Polar Bear Optimization PBO is a metaheuristic algorithm provides an effective technique for solving such kind of optimization *** other heuristic algorithms it proposes a dynamic mechanism for birth and death which allows keep investing in promising solutions and keep dismissing hopeless *** evaluate its efficiency,we applied our proposed model on several datasets and measured the quality of the obtained minimal feature set to prove that redundant data was removed without data loss.
作者:
Alzaher, Hussain A.Alkhalifa, Ibrahim M.
Department of Electrical Engineering Dhahran31261 Saudi Arabia
Irc for Communication Systems and Sensing Dhahran31261 Saudi Arabia
Department of Electrical and Computer Engineering Thuwal23955 Saudi Arabia
This paper investigates the application of the operational current amplifier (OCA) in the design of quadrature sinusoidal oscillators. There are numerous quadrature sinusoidal oscillators based on the three fundamenta...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)is an indispensable functional module of ***,it has been demonstrated that malicious agents can manipulate data packets transmitted through unreliable channels of RSE,leading to severe estimation performance *** paper aims to present an overview of recent advances in cyber-attacks and defensive countermeasures,with a specific focus on integrity attacks against ***,two representative frameworks for the synthesis of optimal deception attacks with various performance metrics and stealthiness constraints are discussed,which provide a deeper insight into the vulnerabilities of ***,a detailed review of typical attack detection and resilient estimation algorithms is included,illustrating the latest defensive measures safeguarding RSE from ***,some prevalent attacks impairing the confidentiality and data availability of RSE are examined from both attackers'and defenders'***,several challenges and open problems are presented to inspire further exploration and future research in this field.
Internet of things (IoT) enables machine-to-machine, human-to-human and machine-to-human interaction. Recent advancement in IoT systems has positively impacted the daily activities of humans, from accessing informatio...
详细信息
Continuous monitoring of postural sway is crucial for safeguarding elderly individuals and patients with neurological conditions, such as Parkinson's disease, as their balance is significantly impacted. This conti...
详细信息
暂无评论