A dual-band flexible textile antenna with reconfigurability in both frequency and operation mode is presented. The antenna is designed to switch between broadside and omnidirectional modes centered at 2.45 GHz and 3.5...
详细信息
Detecting fake news is currently one of the critical challenges facing modern societies. The problem is particularly relevant, as disinformation is readily used for political warfare but can also cause significant har...
详细信息
We present an investigation of several machine learning (ML) models developed to predict the copper (Cu) and lead (Pb) ion concentrations in drinking water. The system where this prediction is employed is based on a m...
详细信息
ISBN:
(数字)9798350330649
ISBN:
(纸本)9798350330656
We present an investigation of several machine learning (ML) models developed to predict the copper (Cu) and lead (Pb) ion concentrations in drinking water. The system where this prediction is employed is based on a microwave block loop gap resonator (BLGR), which surrounds a glass tube with drinking water passing through it. The resonator is coupled to a vector network analyzer (VNA), which collects reflection coefficient (S11) measurements over a 100 MHz - 6 GHz frequency range. It is these S11 measurements, in raw format or compressed using various signal processing techniques, that are used as input into the ML models. Our investigation looks at new convolutional neural networks (CNN) and deep neural networks (DNN) models because such models can easily be deployed on IoT microcontroller devices using tinyML technologies. Extensive simulations using real data demonstrate that DNN models that use as input features essential spectral information created from S11 traces provide performance comparable to that of CNN models but at much shorter training times and significantly smaller model sizes.
In recent years, precision agriculture has attracted a lot of interest as a result of the increasing global population's need for food and water. Therefore, farmers will require To accommodate this demand, there m...
详细信息
Sri Lanka's tea business has existed since the 1800s and maintains a high standard worldwide. However, rivalry is increasing as more competitors enter the market, and tea exporters strive to make their operations ...
详细信息
Darknet traffic classification is challenging due to the use of different obfuscation techniques. In this paper, we rely on Explainable Artificial Intelligence (XAI) techniques such as LIME and SHAP to identify the mo...
详细信息
An era of automation is currently being experienced, where everything is becoming more automated day by day. Automation technology has been applied everywhere, from smaller to larger scales. Moreover, real-time commun...
详细信息
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our *** conduct research in this field,periodic comparative analysis is needed with the new techniques c...
详细信息
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our *** conduct research in this field,periodic comparative analysis is needed with the new techniques coming up *** purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way *** review follows Kitchenham’s review *** review has been divided into three main stages including planning,execution,and *** the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation *** risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation *** a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat *** review reveals that threat analysis and security testing are needed to develop automated tools for the *** estimation of effort required to prioritize potential security risks is a big challenge in software *** accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep *** is also imperative to validate these effort estimation methods to ensure all potential security threats are *** challenge is selecting the right model for each specific security *** achieve a comprehensive evaluation,researchers should use well-known benchmark checklists.
Aspect-based sentiment analysis (ABSA) is vital for text comprehension which benefits applications across various domains. This field involves the two main sub-tasks including aspect extraction and sentiment classific...
详细信息
Optical Wireless Power Transmission (OWPT) system, using beam shaping, is a promising technology that involves a transmitter side using a laser and a receiver side using solar cells to transfer power wirelessly over l...
详细信息
暂无评论