For deploying deep neural networks on edge devices with limited resources, binary neural networks (BNNs) have attracted significant attention, due to their computational and memory efficiency. However, once a neural n...
Automated visual inspection of on- and off-shorewind turbines using aerial robots provides several benefits, namely, a safe working environment by circumventing the need for workers to be suspended high above the grou...
详细信息
Fault diagnosis in wastewater treatment plants (WWTPs) is important to protect communities and ecosystems from toxic elements discharged into water. In this sense, fault identification of sensors plays an important ro...
详细信息
The article is an introduction to quantitative analysis retinal blood vessels. The analysis uses an active contouring system to isolate blood vessels obtained by scanning with an Angio-OTC device. It should bring poss...
详细信息
As the technological advancements in felid such as electronic, robotics, and artificial intelligence continue to grow and flourish, the more the traditional methods of doing things starts to get absolute. This phenome...
详细信息
The field of energy-free sensing and context recognition has recently gained significant attention as it allows operating systems without external power sources. Photovoltaic cells can convert light energy into electr...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote *** attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are *** paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic *** employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA *** proposed voting classifier categorizes the network intrusions robustly and *** assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack *** dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and *** achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
In this paper, we propose a Secure Energy Management System (SEMS) with anomaly detection and Q-Learning decision modules for Automated Guided Vehicles (AGV). The anomaly detection module is a multi-task learning netw...
详细信息
Timely pest detection and identification is critical as part of modern agriculture. Halyomorpha Halys is a prevalent pest with proven harmful impacts on numerous crops and agricultural regions. The paper proposes an e...
详细信息
Continuous-time (CT) modeling has proven to provide improved sample efficiency and interpretability in learning the dynamical behavior of physical systems compared to discrete-time (DT) models. However, even with nume...
详细信息
暂无评论