In the realm of network management, the integration of Software-Defined Networking (SDN) with blockchain-based smart contracts is an emerging frontier with significant potential to enhance inter-domain communications....
详细信息
Some of the conventional approaches to task scheduling are discussed in this section. The scheduling of tasks in the Internet of Things (IoT) application is a complex job in cloud computing due to the heterogeneity ch...
详细信息
The convergence of blockchain technology and education has ushered in a new era of innovation and transformation in the field of learning. This paper presents a comprehensive framework for integrating blockchain into ...
详细信息
Fog computing has become the primary computing paradigm for IoT applications as it meets the low-latency needs of the growing number of IoT applications. However, the servers can get overwhelmed due to the high demand...
详细信息
In the field of genomics, a DNA sequence determines the specific order of the nucleotides Adenine (A), Thymine (T), Guanine (G) and Cytosine (C) in a gene. This gene classification will be useful for the researchers i...
详细信息
The process of reconstructing low-dose CT imaging involves dealing with noisy data, which is characterized as an ill-posed inverse problem. Traditional methods like iterative reconstruction rely on manually designed p...
详细信息
Cyber-physical systems, such as unmanned aerial vehicles and connected and autonomous vehicles, are vulnerable to cyber attacks, which can cause significant damage to society. This paper examines the attack issue in c...
详细信息
Cyber-physical systems, such as unmanned aerial vehicles and connected and autonomous vehicles, are vulnerable to cyber attacks, which can cause significant damage to society. This paper examines the attack issue in cyber-physical systems within the framework of discrete event systems. Specifically, we consider a scenario where a malicious intruder injects a jamming signal into an actuator channel. It disrupts the transmission of control commands and prevents an actuator from receiving them. This is termed an actuator jamming attack. In the paper, we first analyze the closed-loop system behavior under such an attack. An attack structure is constructed to illustrate how an intruder exploits a jamming attack to drive a system into unsafe states. Then, we study the supervisory control problem for a system exposed to such an attack. The problem is reduced to a basic supervisory control one in discrete event systems by introducing the concept of dynamically controllable language. A solution to this problem is explored, where we establish an existence condition for a supremal and robust supervisor that is capable of defending against actuator jamming attacks, and design an algorithm to derive it. Finally, the effectiveness of our method is illustrated by an intelligent automated guided vehicle system. IEEE
The activity of the object in question is alerted directly upon completion of an effective object tracking. Dependent on hardware support or not, a strong object tracking protocol is required for a precise object trac...
详细信息
A major portion of Karnataka's population lives in rural areas. Most of the rural people are illiterate and poor due to lack of proper services and infrastructure. There are various rural development schemes run b...
详细信息
Day by day,biometric-based systems play a vital role in our daily *** paper proposed an intelligent assistant intended to identify emotions via voice message.A biometric system has been developed to detect human emoti...
详细信息
Day by day,biometric-based systems play a vital role in our daily *** paper proposed an intelligent assistant intended to identify emotions via voice message.A biometric system has been developed to detect human emotions based on voice recognition and control a few electronic peripherals for alert *** proposed smart assistant aims to provide a support to the people through buzzer and light emitting diodes(LED)alert signals and it also keep track of the places like households,hospitals and remote areas,*** proposed approach is able to detect seven emotions:worry,surprise,neutral,sadness,happiness,hate and *** key elements for the implementation of speech emotion recognition are voice processing,and once the emotion is recognized,the machine interface automatically detects the actions by buzzer and *** proposed system is trained and tested on various benchmark datasets,i.e.,Ryerson Audio-Visual Database of Emotional Speech and Song(RAVDESS)database,Acoustic-Phonetic Continuous Speech Corpus(TIMIT)database,Emotional Speech database(Emo-DB)database and evaluated based on various parameters,i.e.,accuracy,error rate,and *** comparing with existing technologies,the proposed algorithm gave a better error rate and less *** rate and time is decreased by 19.79%,5.13 *** the RAVDEES dataset,15.77%,0.01 s for the Emo-DB dataset and 14.88%,3.62 for the TIMIT *** proposed model shows better accuracy of 81.02%for the RAVDEES dataset,84.23%for the TIMIT dataset and 85.12%for the Emo-DB dataset compared to Gaussian Mixture Modeling(GMM)and Support Vector Machine(SVM)Model.
暂无评论