The self-cascade(SC) method is an effective technique for chaos enhancement and complexity increasing in chaos ***, the controllable self-cascade(CSC) method allows for more accurate control of Lyapunov exponents of t...
详细信息
The self-cascade(SC) method is an effective technique for chaos enhancement and complexity increasing in chaos ***, the controllable self-cascade(CSC) method allows for more accurate control of Lyapunov exponents of the discrete map. In this work, the SC and CSC systems of the original map are derived, which enhance the chaotic performance while preserving the fundamental dynamical characteristics of the original map. Higher Lyapunov exponent of chaotic sequences corresponding to higher frequency are obtained in SC and CSC systems. Meanwhile, the Lyapunov exponent could be linearly controlled with greater flexibility in the CSC system. The verification of the numerical simulation and theoretical analysis is carried out based on the platform of CH32.
The usage of machine learning and deep learning algorithms have necessitated Artificial Intelligence'. AI is aimed at automating things by limiting human interference. It is widely used in IT, healthcare, finance,...
详细信息
5G wireless communication offers higher channel capacity, high data rate, sufficient bandwidth, enhanced coverage, and reliable link as compared to the previous generation mobile networks. Also, 5G becomes more releva...
详细信息
American Sign Language (ASL) recognition aims to recognize hand gestures, and it is a crucial solution to communicating between the deaf community and hearing people. However, existing sign language recognition algori...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature of Twitter makes cyberspace prominent (usually accessed via the dark web). The work used the datasets and considered the Scrape Twitter Data (Tweets) in Python using the SN-Scrape module and Twitter 4j API in JAVA to extract social data based on hashtags, which is used to select and access tweets for dataset design from a profile on the Twitter platform based on locations, keywords, and hashtags. The experiments contain two datasets. The first dataset has over 1700 tweets with a focus on location as a keypoint (hacking-for-fun data, cyber-violence data, and vulnerability injector data), whereas the second dataset only comprises 370 tweets with a focus on reposting of tweet status as a keypoint. The method used is focused on a new system model for analysing Twitter data and detecting terrorist attacks. The weights of susceptible keywords are found using a ternary search by the Aho-Corasick algorithm (ACA) for conducting signature and pattern matching. The result represents the ACA used to perform signature matching for assigning weights to extracted words of tweet. ML is used to evaluate Twitter data for classifying patterns and determining the behaviour to identify if a person is a terrorist. SVM (Support Vector Machine) proved to be a more accurate classifier for predicting terrorist attacks compared to other classifiers (KNN- K-Nearest Neighbour and NB-Naïve Bayes). The 1st dataset shows the KNN-Acc. -98.38% and SVM Accuracy as 98.85%, whereas the 2nd dataset shows the KNN-Acc. -91.68% and SVM Accuracy as 93.97%. The proposed work concludes that the generated weights are classified (cyber-violence, vulnerability injector, and hacking-for-fun) for further feature classification. Machine learning (ML) [KNN and SVM] is used to predict the occurrence and
As wafer circuit width shrinks down to less than ten nanometers in recent years,stringent quality control in the wafer manufacturing process is increasingly *** to the coupling of neighboring cluster tools and coordin...
详细信息
As wafer circuit width shrinks down to less than ten nanometers in recent years,stringent quality control in the wafer manufacturing process is increasingly *** to the coupling of neighboring cluster tools and coordination of multiple robots in a multi-cluster tool,wafer production scheduling becomes rather *** a wafer is processed,due to high-temperature chemical reactions in a chamber,the robot should be controlled to take it out of the processing chamber at the right *** order to ensure the uniformity of integrated circuits on wafers,it is highly desirable to make the differences in wafer post-processing time among the individual tools in a multicluster tool as small as *** achieve this goal,for the first time,this work aims to find an optimal schedule for a dual-arm multi-cluster tool to regulate the wafer post-processing *** do so,we propose polynomial-time algorithms to find an optimal schedule,which can achieve the highest throughput,and minimize the total post-processing time of the processing *** propose a linear program model and another algorithm to balance the differences in the post-processing time between any pair of adjacent cluster *** industrial examples are given to illustrate the application and effectiveness of the proposed method.
Blockchain technology has the characteristics of non-tampering and forgery, traceability, and so on, which have good application advantages for the storage of multimedia data. So we propose a novel method using matrix...
详细信息
The upsurge in urbanization is depleting natural resources due to the wide usage of aggregates in construction, posing a menace to further progress. If the contemporary state persists, it becomes a threat for further ...
详细信息
In current existences there has been an increase in concentration in the potential of blockchain (BC) technology to transform multiple industries, including cloud security. This study delves into the combination of BC...
详细信息
In current existences there has been an increase in concentration in the potential of blockchain (BC) technology to transform multiple industries, including cloud security. This study delves into the combination of BC technology and cloud security to improve data protection, authentication, and access control. The unchangeable and decentralized nature of BC suggestions a strong foundation for safeguarding cloud-based systems, reducing the vulnerabilities linked to centralized storage and single points of failure. This research investigates the fundamental principles and mechanisms of blockchain-based cloud security, such as encryption, access control, smart contracts, and disseminated mechanism. The employment of BC technology to safeguard data and transactions in cloud-based environments is referred to as blockchain security in cloud computing (CC). To defend the veracity and security of data stored in the cloud, encryption and decentralised consensus processes are *** cloud provides decentralized service and communication all over the world through internet services. By increasing open service accessibility and sharing, the personalized information and sensitive data get unauthorized access leads security breaches, data leakage due to improves security concerns. So the security in the sense, the privacy preservation based security is an important concern to protect the sensitive data from unauthorized access. Most existing security failed in cryptographic approaches doe to key leakages and authenticity failures. To resolve this problem we provide a consensus proof of work based block chain principle (CPoW-BCP) based on provable partitioned encryption is implemented to secure the cloud environment in this research demystifying cryptographic hash function (DCHF) is applied to create portioned data block to make encryption using provable partitioned folding encryption (PPFE). With the support of post quantum chain links (PQCL) the block are stamped with randomiz
Aerial image detection is a crucial technology for a variety of applications, including but not limited to urban planning, environmental monitoring, and disaster management. In this project, we implement deep learning...
详细信息
暂无评论