Light field (LF) super-resolution has achieved remarkable results with the assumption of only downsampling. However, real-world LF scenes contain multiple degradation effects, which makes it difficult for existing met...
详细信息
This paper presents a lightweight AXI DMA controller architecture useful for embedded systems that do not require fully featured DMA controllers. Simulation is accomplished with VUnit, and implementation results are o...
详细信息
The electric field distribution of the YD-JZ 10 kV oil-immersed transformer insulator is analyzed by COMSOL simulation, calculation, and actual measurement methods. The result shows that the first shed of the insulato...
详细信息
Automated visual inspection of on- and off-shorewind turbines using aerial robots provides several benefits, namely, a safe working environment by circumventing the need for workers to be suspended high above the grou...
详细信息
Distributed Denial of Service (DDoS) is a huge hazard to software-defined networks (SDN). Active defense technology is one of the effective measures to ensure the security of SDN. Active defense can increase the diffi...
详细信息
Recent innovations and developments in molecular biology and biotechnology have made it possible to acquire and store large omics datasets. In particular genomics, transcriptomics and the study of their relationship r...
详细信息
Industrial network control systems(INCSs) are easy to be targeted by attackers due to their high economic *** of the existing defense methods are deployed at the network boundary,which causes high-security risks to IN...
详细信息
ISBN:
(数字)9789887581581
ISBN:
(纸本)9798350366907
Industrial network control systems(INCSs) are easy to be targeted by attackers due to their high economic *** of the existing defense methods are deployed at the network boundary,which causes high-security risks to INCS once an attacker enters the *** addition,many existing intrusion detection systems(IDSs) build detection models based on historical *** INCS lacks sufficient historical data,it is difficult to build detection models with high *** this paper,we propose a trust assessment model for INCS based on Fourier series fitting employing concept of zero trust to assess the real-time trust of *** model alerts when INCS has low *** test two data injection attacks in the experiment to prove the effectiveness of our approach.
Most advanced control methods require a sufficiently accurate model of the system to be controlled. These models are becoming increasingly difficult to generate due to the increasing complexity of the underlying syste...
详细信息
In the Offline Finding Network(OFN), offline Bluetooth tags broadcast to the surrounding area, the finder devices receiving the broadcast signal and upload location information to the IoT(Internet of Things) cloud ser...
详细信息
Road accidents are a major concern worldwide. Research of technological solutions to improve road safety is an open topic, considering this issue from various perspectives. As widely reported in the literature, driver...
详细信息
暂无评论