Recent efforts in network measurement place measurement tasks on programmable switches to measure high-speed traffic. These tasks extract flow data, i.e., events, from packets and send events to the control plane. How...
详细信息
We report the next generation optical nanotweezer approaches employing plasmatic cavities and optical anapole states for the high throughput trapping and dynamic manipulation of nanoscale objects and biomolecules with...
Both the academic and industry begin the early research on the network architectures of the 6th generation (6G) mobile communication system, which integrates the satellite networks for ubiquitous access. However, the ...
详细信息
A multi-objective Scheduling approach for large-scale microservice Critical Notification system applications (SCN-DRL) based on Deep Reinforcement Learning is presented. This paper addresses optimization for three obj...
详细信息
Automated agriculture processing system are the need of today as food manufacturing industries are suffering great loss on part of defective vegetables and fruits. Many researches are working to develop an automated s...
详细信息
Quantum computing and secure communication have gained considerable interest in recent years, as quantum computing has a potent ability to accelerate certain complex problems, such as factoring problems and discrete l...
详细信息
Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the *** learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and securit...
详细信息
Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the *** learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security *** is crucial in offering a proactive security system in the field of *** real time,cybersecurity protects information,information systems,and networks from *** the recent decade,several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity *** an increasing rate,intruders are breaching information *** detection,software vulnerability diagnosis,phishing page identification,denial of service assaults,and malware identification are the foremost cyber-security concerns that require efficient *** have tried a variety of approaches to address the present cybersecurity obstacles and *** a similar vein,the goal of this research is to assess the idealness of machine learning-based intrusion detection systems under fuzzy conditions using a Multi-Criteria Decision Making(MCDM)-based Analytical Hierarchy Process(AHP)and a Technique for Order of Preference by Similarity to Ideal-Solutions(TOPSIS).Fuzzy sets are ideal for dealing with decision-making scenarios in which experts are unsure of the best course of *** projected work would support practitioners in identifying,prioritising,and selecting cybersecurityrelated attributes for intrusion detection systems,allowing them to design more optimal and effective intrusion detection systems.
Nowadays, energy efficiency for buildings is considered one of the most valuable solutions to provide services sustainably. Many buildings are designed aiming to consume less energy while performing the required tasks...
详细信息
In this article,the problem of state estimation is addressed for discrete-time nonlinear systems subject to additive unknown-but-bounded noises by using fuzzy set-membership ***,an improved T-S fuzzy model is introduc...
详细信息
In this article,the problem of state estimation is addressed for discrete-time nonlinear systems subject to additive unknown-but-bounded noises by using fuzzy set-membership ***,an improved T-S fuzzy model is introduced to achieve highly accurate approximation via an affine model under each fuzzy ***,compared to traditional prediction-based ones,two types of fuzzy set-membership filters are proposed to effectively improve filtering performance,where the structure of both filters consists of two parts:prediction and *** the locally Lipschitz continuous condition of membership functions,unknown membership values in the estimation error system can be treated as multiplicative noises with respect to the estimation ***-time recursive algorithms are given to find the minimal ellipsoid containing the true ***,the proposed optimization approaches are validated via numerical simulations of a one-dimensional and a three-dimensional discrete-time nonlinear systems.
This research work presents a home automation system based on Li-Fi (Light Fidelity) technology as an alternative to the RF communication systems such as Wi-Fi or Bluetooth. Li-Fi uses visible light for transmitting s...
详细信息
暂无评论