This article is dedicated to the study of an integrated approach to technological process of control of measurement of wearing parameters of traction electric motor collectors. Also the article presents the results of...
详细信息
Phishing is a type of cyber-attack aiming to steal people's confidential information using a bait. Smishing is a form of phishing that is carried out via SMS messages sent to mobile phones. Attackers intend to ste...
详细信息
This paper explains in detail several methods for utilization of class based n-gram language models for automatic speech recognition, within the Kaldi speech recognition framework. It reexamines an existing implementa...
详细信息
Pedestrian detection from a drone-based images has many potential applications such as searching for missing persons, surveillance of illegal immigrants, and monitoring of critical infrastructure. However, it is consi...
详细信息
This paper discusses the structural organization of the background monitoring system (BMS) of the transboundary UNESCO World Heritage Site 'Beech forests of the Carpathians and ancient beech forests of Germany'...
详细信息
We enhance the calculus of string diagrams for monoidal categories with hierarchical features in order to capture closed monoidal (and cartesian closed) structure. Using this new syntax we formulate an automatic diffe...
详细信息
The increasing prevalence of botnet attacks in IoT networks has led to the development of deep learning techniques for their detection. However, conventional centralized deep learning models pose challenges in simulta...
The increasing prevalence of botnet attacks in IoT networks has led to the development of deep learning techniques for their detection. However, conventional centralized deep learning models pose challenges in simultaneously ensuring user data privacy and detecting botnet attacks. To address this issue, this study evaluates the efficacy of Federated Learning (FL) in detecting IoT malware traffic while preserving user privacy. The study employs N-BaIoT, a dataset of real-world IoT network traffic infected by malware, and compares the effectiveness of FL models using Convolutional Neural Network, Long Short-Term Memory, and Gated Recurrent Unit models with a centralized approach. The results indicate that FL can achieve high performance in detecting abnormal traffic in IoT networks, with the CNN model yielding the best results among the three models evaluated. The study recommends the use of FL for IoT malware traffic detection due to its ability to preserve data privacy.
CdO Thin Film and powder nanoparticles have been produced using the sol-gel method. The X-ray diffraction technique is used to evaluate structural properties of powder CdO at different annealing temperatures 623, 673,...
CdO Thin Film and powder nanoparticles have been produced using the sol-gel method. The X-ray diffraction technique is used to evaluate structural properties of powder CdO at different annealing temperatures 623, 673, 723 (K). It indicates that CdO nanoparticles in nature have a polycrystalline cubic structure. The size of the crystallite (D) is in the middle of the range 23.14-46.65 (nm). As the annealing temperature increases, the crystallite size increases. Also, dislocation density (δ), strain (ε), and texture coefficient TC(hkl) were calculated. The energy band-gap and refractive index were estimated. Band gap energy decreases with increasing annealing temperature and refractive index increases with increasing annealing temperature.
A solution for the problem of controlling the unmanned quadrotor vehicles group flight in presence of obstacles of complex form is proposed. A traditional approach to construction of the target function does not solve...
详细信息
ISBN:
(纸本)9781728125930
A solution for the problem of controlling the unmanned quadrotor vehicles group flight in presence of obstacles of complex form is proposed. A traditional approach to construction of the target function does not solve the problem of control at presence of concave obstacles; the UAVs may get trapped in such a situation. The proposed target function contains the three terms. The first of them controls the UAVs' behavior with respect to attitude. The second is built on the base of a moving coordinate system bound to the trajectory of the group motion. The third addend is a standard sum that performs the function of repelling the UAVs one from another. Also, in the proposed approach the motion is bound to the virtual center of the group, instead of one UAV that is chosen to be a leader. This approach helps to avoid a discrepancy between desired and actual states of the group in case that the leader UAV experiences some problems with its motion.
暂无评论