Concerning the problem of odor source search with robots in a large outdoor environment, an odor source search method based on the improved wolf pack algorithm (IWPA) is proposed, in which each wolf corresponds to an ...
详细信息
Artificial intelligence (AI) is critical in evolving 5G and developing 6G networks, running on edge devices, and solving resource management challenges. The burgeoning number of edge devices draws attention to the pot...
详细信息
This paper mainly discusses two kinds of coupled reaction-diffusion neural networks (CRNN) under topology attacks, that is, the cases with multistate couplings and with multiple spatial-diffusion couplings. On one han...
详细信息
With the ever-increasing popularity of Internet of Things(IoT),massive enterprises are attempting to encapsulate their developed outcomes into various lightweight Web Application Programming Interfaces(APIs)that can b...
详细信息
With the ever-increasing popularity of Internet of Things(IoT),massive enterprises are attempting to encapsulate their developed outcomes into various lightweight Web Application Programming Interfaces(APIs)that can be accessible *** this context,finding and writing a list of existing Web APIs that can collectively meet the functional needs of software developers has become a promising approach to economically and easily develop successful mobile ***,the number and diversity of candidate IoT Web APIs places an additional burden on application developers’Web API selection decisions,as it is often a challenging task to simultaneously ensure the diversity and compatibility of the final set of Web APIs *** this challenge and latest successful applications of game theory in IoT,a Diversified and Compatible Web APIs Recommendation approach,namely DivCAR,is put forward in this *** of all,to achieve API diversity,DivCAR employs random walk sampling technique on a pre-built“API-API”correlation graph to generate diverse“API-API”correlation ***,with the diverse“API-API”correlation subgraphs,the compatible Web APIs recommendation problem is modeled as a minimum group Steiner tree search problem.A sorted set of multiple compatible and diverse Web APIs are returned to the application developer by solving the minimum group Steiner tree search *** last,a set of experiments are designed and implemented on a real dataset crawled from *** results validate the effectiveness and efficiency of our proposed DivCAR approach in balancing the Web APIs recommendation diversity and compatibility.
To address parameter uncertainty in the two-wheel balance vehicle (TWBV) system, a closed-loop subspace algorithm (CLSA) was employed to identify and correct uncertain structural parameters. This got in a more accurat...
详细信息
The two-wheeled bicycle robot (TWBR) is a new intelligent transportation, which can be used for special tasks such as forest operation and disaster relief. Although the TWBR is not structurally complex, the dynamics a...
详细信息
The steady-state visual evoked potential (SSVEP) is one of the most commonly used paradigms in the BCI system, which produces a significant response to visual stimuli of a specific frequency. How to better improve the...
详细信息
In this letter, a reflectarray antenna with a small focal diameter ratio (F/D) is presented. It is found that when the F/D is extremely small, the phase constant used in calculating the required reflection phase on th...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
Detecting hot spots on solar cells in mountainous photovoltaic power plants is challenging due to high false and missed detection rates. This paper proposes S-YOLO, a lightweight model based on YOLOv8, for efficient h...
详细信息
暂无评论