For deploying deep neural networks on edge devices with limited resources, binary neural networks (BNNs) have attracted significant attention, due to their computational and memory efficiency. However, once a neural n...
Automated visual inspection of on- and off-shorewind turbines using aerial robots provides several benefits, namely, a safe working environment by circumventing the need for workers to be suspended high above the grou...
详细信息
Fault diagnosis in wastewater treatment plants (WWTPs) is important to protect communities and ecosystems from toxic elements discharged into water. In this sense, fault identification of sensors plays an important ro...
详细信息
The article is an introduction to quantitative analysis retinal blood vessels. The analysis uses an active contouring system to isolate blood vessels obtained by scanning with an Angio-OTC device. It should bring poss...
详细信息
As the technological advancements in felid such as electronic, robotics, and artificial intelligence continue to grow and flourish, the more the traditional methods of doing things starts to get absolute. This phenome...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote *** attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are *** paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic *** employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA *** proposed voting classifier categorizes the network intrusions robustly and *** assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack *** dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and *** achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
In this paper, we propose a Secure Energy Management System (SEMS) with anomaly detection and Q-Learning decision modules for Automated Guided Vehicles (AGV). The anomaly detection module is a multi-task learning netw...
详细信息
Timely pest detection and identification is critical as part of modern agriculture. Halyomorpha Halys is a prevalent pest with proven harmful impacts on numerous crops and agricultural regions. The paper proposes an e...
详细信息
This work introduces a method for closed-loop system identification using frequency analysis, employing Empirical Transfer Function Estimation (ETFE). By integrating optimization within a Monte Carlo framework, it enh...
详细信息
ISBN:
(数字)9798350373974
ISBN:
(纸本)9798350373981
This work introduces a method for closed-loop system identification using frequency analysis, employing Empirical Transfer Function Estimation (ETFE). By integrating optimization within a Monte Carlo framework, it enhances the precision of ETFE, resulting in minimized frequency response errors compared to actual system data. Leveraging controller information in an offline model fitting scheme, it achieves optimal realization of process dynamics. The method is evaluated on a data center rack-level cooling system, showing Bode magnitude plots of actual and estimated closed-loop and open-loop dynamics, with confidence intervals demonstrating algorithm consistency. Numerical evaluations confirm the feasibility and potential of the approach to improve offline closed-loop system identification performance in the frequency domain, beneficial for analysis and design. There will not be a comparative study for the introduced approach.
Continuous-time (CT) modeling has proven to provide improved sample efficiency and interpretability in learning the dynamical behavior of physical systems compared to discrete-time (DT) models. However, even with nume...
详细信息
暂无评论