Nowadays, social networks play a critical role in online social discourse, particularly during major events such as elections, health crises, and wars. Furthermore, individuals have spent significant time on social ne...
详细信息
The grid-following inverter's dq admittance model manifests a negative resistance in the low-frequency range due to the phase-locked loop, potentially leading to low-frequency instabilities and limiting the maximu...
详细信息
Grid-forming control is considered to be essential in the transition to renewables-dominated power systems. However, grid-forming Type-3 wind turbine generators present unique challenges due to their electromechanical...
详细信息
This paper presents a Python-driven graphical user interface (GUI) explicitly crafted for benchmarking the electromagnetic transient (EMT) models of inverter-based resources (IBRs) across Matlab/Simulink and PSCAD/EMT...
详细信息
This work-in-progress research paper presents an innovative learning methodology based on gamification and the concept of 'building your own knowledge' to motivate and spark students' interest in quantum c...
详细信息
This work in progress paper describes a proposal to use the GeoGebra environment as a useful didactic and conceptual tool to introduce the basic concepts of the increasingly relevant area of Post-Quantum Cryptography ...
详细信息
Unmanned aerial vehicles(UAVs),or drones,have revolutionized a wide range of industries,including monitoring,agriculture,surveillance,and supply ***,their widespread use also poses significant challenges,such as publi...
详细信息
Unmanned aerial vehicles(UAVs),or drones,have revolutionized a wide range of industries,including monitoring,agriculture,surveillance,and supply ***,their widespread use also poses significant challenges,such as public safety,privacy,and ***,targetingUAVs have become more frequent,which highlights the need for robust security *** technology,the foundation of cryptocurrencies has the potential to address these *** study suggests a platform that utilizes blockchain technology tomanage drone operations securely and *** incorporating blockchain technology,the proposed method aims to increase the security and privacy of drone *** suggested platform stores information on a public blockchain located on Ethereum and leverages the Ganache platform to ensure secure and private blockchain *** wallet for Ethbalance is necessary for BCT *** present research finding shows that the proposed approach’s efficiency and security features are superior to existing *** study contributes to the development of a secure and efficient system for managing drone operations that could have significant applications in various *** proposed platform’s security measures could mitigate privacy concerns,minimize cyber security risk,and enhance public safety,ultimately promoting the widespread adoption of *** results of the study demonstrate that the blockchain can ensure the fulfillment of core security needs such as authentication,privacy preservation,confidentiality,integrity,and access control.
Machine learning(ML)is increasingly applied for medical image processing with appropriate learning *** applications include analyzing images of various organs,such as the brain,lung,eye,etc.,to identify specific flaws...
详细信息
Machine learning(ML)is increasingly applied for medical image processing with appropriate learning *** applications include analyzing images of various organs,such as the brain,lung,eye,etc.,to identify specific flaws/diseases for *** primary concern of ML applications is the precise selection of flexible image features for pattern detection and region *** of the extracted image features are irrelevant and lead to an increase in computation ***,this article uses an analytical learning paradigm to design a Congruent Feature Selection Method to select the most relevant image *** process trains the learning paradigm using similarity and correlation-based features over different textural intensities and pixel *** similarity between the pixels over the various distribution patterns with high indexes is recommended for disease ***,the correlation based on intensity and distribution is analyzed to improve the feature selection ***,the more congruent pixels are sorted in the descending order of the selection,which identifies better regions than the ***,the learning paradigm is trained using intensity and region-based similarity to maximize the chances of ***,the probability of feature selection,regardless of the textures and medical image patterns,is *** process enhances the performance of ML applications for different medical image *** proposed method improves the accuracy,precision,and training rate by 13.19%,10.69%,and 11.06%,respectively,compared to other models for the selected *** mean error and selection time is also reduced by 12.56%and 13.56%,respectively,compared to the same models and dataset.
Future 6G communications are envisioned to enable a large catalogue of pioneering *** will range from networked Cyber-Physical systems to edge computing devices,establishing real-time feedback control loops critical f...
详细信息
Future 6G communications are envisioned to enable a large catalogue of pioneering *** will range from networked Cyber-Physical systems to edge computing devices,establishing real-time feedback control loops critical for managing Industry 5.0 deployments,digital agriculture systems,and essential *** provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and *** full automation will enhance industrial efficiency significantly,it concurrently introduces new cyber risks and *** particular,unattended systems are highly susceptible to trust issues:malicious nodes and false information can be easily introduced into control ***,Denialof-Service attacks can be executed by inundating the network with valueless *** anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical *** based on an exhaustive data collection to detect anomalies are precise but extremely *** models,with their limited understanding of mobile networks,can achieve precision rates no higher than 75%.Therefore,more general and transversal protection mechanisms are needed to detect malicious behaviors *** paper introduces a probabilistic trust model and control algorithm designed to address this *** model determines the probability of any node to be *** channels are pruned for those nodes whose probability is below a given *** trust control algorithmcomprises three primary phases,which feed themodel with three different probabilities,which are weighted and ***,anomalous nodes are identified using Gaussian mixture models and clustering ***,traffic patterns are studied using digital Bessel functions and the functional scalar ***,the in
Changes in the Atmospheric Electric Field Signal(AEFS)are highly correlated with weather changes,especially with thunderstorm ***,little attention has been paid to the ambiguous weather information implicit in AEFS **...
详细信息
Changes in the Atmospheric Electric Field Signal(AEFS)are highly correlated with weather changes,especially with thunderstorm ***,little attention has been paid to the ambiguous weather information implicit in AEFS *** this paper,a Fuzzy C-Means(FCM)clustering method is used for the first time to develop an innovative approach to characterize the weather attributes carried by ***,a time series dataset is created in the time domain using AEFS *** AEFS-based weather is evaluated according to the time-series Membership Degree(MD)changes obtained by inputting this dataset into the ***,thunderstorm intensities are reflected by the change in distance from a thunderstorm cloud point charge to an AEF ***,a matching relationship is established between the normalized distance and the thunderstorm dominant MD in the space ***,the rationality and reliability of the proposed method are verified by combining radar charts and expert *** results confirm that this method accurately characterizes the weather attributes and changes in the AEFS,and a negative distance-MD correlation is obtained for the first *** detection of thunderstorm activity by AEF from the perspective of fuzzy set technology provides a meaningful guidance for interpretable thunderstorms.
暂无评论