Permanent magnet synchronous motors (PMSMs) are widely used in various fields due to their high efficiency, high power factor and small volume. In this paper, a segmented permanent magnet interior permanent magnet syn...
详细信息
Semi-supervised learning (SSL) is a successful paradigm that can use unlabelled data to alleviate the labelling cost problem in supervised learning. However, the excellent performance brought by SSL does not transfer ...
详细信息
In this study a cascade controller is proposed to maintain the Automatic Voltage Regulator (AVR) system, its comprises from two stage the first one is a conventional Proportional and Derivative (PD) controller and the...
详细信息
This paper explores recent innovation in the field of robotic teleoperation, presenting a state-of-the-art system for a robotic arm, configurable as an exoskeleton or prosthetic limb. Based on noninvasive neural heads...
详细信息
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing *** comp...
详细信息
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing *** computing has traditionally played an important role in establishing ***,fog computing has recently emerged as a new field complementing cloud computing due to its enhanced mobility,location awareness,heterogeneity,scalability,low latency,and geographic ***,IoT networks are vulnerable to unwanted assaults because of their open and shared *** a result,various fog computing-based security models that protect IoT networks have been developed.A distributed architecture based on an intrusion detection system(IDS)ensures that a dynamic,scalable IoT environment with the ability to disperse centralized tasks to local fog nodes and which successfully detects advanced malicious threats is *** this study,we examined the time-related aspects of network traffic *** presented an intrusion detection model based on a twolayered bidirectional long short-term memory(Bi-LSTM)with an attention mechanism for traffic data classification verified on the UNSW-NB15 benchmark *** showed that the suggested model outperformed numerous leading-edge Network IDS that used machine learning models in terms of accuracy,precision,recall and F1 score.
In Wireless Sensor Networks, sensory data among adjacent sensor nodes have strong spatial correlation. If all sensor nodes collect and transmit data, energy consumption is very large and the network life is shortened....
详细信息
Aiming at the problem of poor robustness of the driving model and divergence of the filtering process due to time-varying or abrupt-varying noise of the driving model during simultaneous localization and mapping of mo...
详细信息
Inverter topologies for integrating a rooftop photovoltaic (PV) unit into a microgrid are becoming increasingly complex. This paper proposes a high-voltage boosting transformerless inverter (HVBTI) topology for enhanc...
详细信息
Inverter topologies for integrating a rooftop photovoltaic (PV) unit into a microgrid are becoming increasingly complex. This paper proposes a high-voltage boosting transformerless inverter (HVBTI) topology for enhancing such applications. The coupled inductor-based high voltage gain feature of the HVBTI configuration allows power to be delivered into the grid from a lower voltage PV source without using higher duties. In addition, HVBTI suppresses leakage current as the common connection shared between the $-ve$ terminal of the PV source and the grid neutral point. In comparison to existing topologies, the HVBTI topology uses a compact pulse width modulation strategy to control only six controllable switching devices. Again, using lower-rated switching devices is more cost-effective while increasing reliability and efficiency. In a laboratory prototype of a 1 kVA grid integrated system, the proposed HVBTI configuration is validated, and the maximum efficiency of the HVBTI is estimated at approximately 95%. Author
Deep neural networks, especially face recognition models, have been shown to be vulnerable to adversarial examples. However, existing attack methods for face recognition systems either cannot attack black-box models, ...
详细信息
In the era of the Internet of Things(IoT),the crowdsourcing process is driven by data collected by devices that interact with each other and with the physical *** a part of the IoT ecosystem,task assignment has become...
详细信息
In the era of the Internet of Things(IoT),the crowdsourcing process is driven by data collected by devices that interact with each other and with the physical *** a part of the IoT ecosystem,task assignment has become an important goal of the research *** task assignment algorithms can be categorized as offline(performs better with datasets but struggles to achieve good real-life results)or online(works well with real-life input but is difficult to optimize regarding in-depth assignments).This paper proposes a Cross-regional Online Task(CROT)assignment problem based on the online assignment *** the CROT problem,an Online Task Assignment across Regions based on Prediction(OTARP)algorithm is *** is a two-stage graphics-driven bilateral assignment strategy that uses edge cloud and graph embedding to complete task *** first stage uses historical data to make offline predictions,with a graph-driven method for offline bipartite graph *** second stage uses a bipartite graph to complete the online task assignment *** paper proposes accelerating the task assignment process through multiple assignment rounds and optimizing the process by combining offline guidance and online assignment *** encourage crowd workers to complete crowd tasks across regions,an incentive strategy is designed to encourage crowd workers’*** avoid the idle problem in the process of crowd worker movement,a drop-by-rider problem is used to help crowd workers accept more crowd tasks,optimize the number of assignments,and increase ***,through comparison experiments on real datasets,the performance of the proposed algorithm on crowd worker utility value and the matching number is evaluated.
暂无评论