Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote *** attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are *** paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic *** employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA *** proposed voting classifier categorizes the network intrusions robustly and *** assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack *** dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and *** achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
Warehouses are an important logistic component of various companies. Warehouses may have different layouts, equipment and their own features. Optimization of warehouse operations can decrease overhead costs and increa...
详细信息
The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central *** a distributed and collaborative alternative,approaches based upon bl...
详细信息
The traditional centralized data sharing systems have potential risks such as single point of failures and excessive working load on the central *** a distributed and collaborative alternative,approaches based upon blockchain have been explored recently for Internet of Things(IoTs).However,the access from a legitimate user may be denied without the pre-defined policy and data update on the blockchain could be costly to the *** this paper,we first address these issues by incorporating the Accountable Subgroup Multi-Signature(ASM)algorithm into the Attribute-based Access control(ABAC)method with Policy Smart Contract,to provide a finegrained and flexible ***,we propose a policy-based Chameleon Hash algorithm that allows the data to be updated in a reliable and convenient way by the authorized ***,we evaluate our work by comparing its performance with the *** results demonstrate significant improvement on the effectiveness and efficiency.
Within the realm of flexible manufacturing, fixture layout planning allows manufacturers to rapidly deploy optimal fixturing plans that can reduce surface deformation that leads to crack propagation in components duri...
详细信息
3D object detection from LiDAR sensor data is an important topic in the context of autonomous cars and drones. In this paper, we present the results of experiments on the impact of backbone selection of a deep convolu...
详细信息
With the prevalence of new wearable devices and personal sensing, model fitting from real-world human-generated data has become a topic of interest in the fields of bioengineering, sports science, and medical engineer...
详细信息
Phasor measurement units(PMUs)provide useful data for real-time monitoring of the smart ***,there may be time-varying deviation in phase angle differences(PADs)between both ends of the transmission line(TL),which may ...
详细信息
Phasor measurement units(PMUs)provide useful data for real-time monitoring of the smart ***,there may be time-varying deviation in phase angle differences(PADs)between both ends of the transmission line(TL),which may deteriorate application performance based on *** address that,this paper proposes two robust methods of correcting time-varying PAD deviation with unknown parameters of TL(ParTL).First,the phenomena of time-varying PAD deviation observed from field PMU data are *** general formulations for PAD estimation are then *** simplify the formulations,estimation of PADs is converted into the optimal problem with a single ParTL as the variable,yielding a linear estimation of *** latter is used by second-order Taylor series expansion to estimate PADs *** reduce the impact of possible abnormal amplitude data in field data,the IGG(Institute of Geodesy&Geophysics,Chinese Academy of Sciences)weighting function is *** using both simulated and field data verify the effectiveness and robustness of the proposed methods.
Semantic communications offer promising prospects for enhancing data transmission efficiency. However, existing schemes have predominantly concentrated on point-to-point transmissions. In this paper, we aim to investi...
详细信息
This paper proposes the participation of wind generation in the decentralized control of load frequency of a hybrid power system consisting of, in addition to wind generation, conventional generation and battery stora...
详细信息
This paper proposes the participation of wind generation in the decentralized control of load frequency of a hybrid power system consisting of, in addition to wind generation, conventional generation and battery storage. The wind generation is modelled as a ‘Virtual Synchronous Generator (VSG)’ in a separate control area with its own virtual frequency. It has also been proposed to operate the wind generation system in a ‘de-loaded’ mode, thereby allowing it to take part in frequency regulation services. For the purposes of a decentralized control design, the overall system model is decomposed into three subsystems. Static state-feedback control gains are computed by posing the decentralized control problem as a set of linear matrix inequalities (LMIs) subject to structural and stabilizing constraints.
Fault detection(FD) for traction systems is one of the active topics in the railway and academia because it is the initial step for the running reliability and safety of high-speed trains. Heterogeneity of data and co...
详细信息
Fault detection(FD) for traction systems is one of the active topics in the railway and academia because it is the initial step for the running reliability and safety of high-speed trains. Heterogeneity of data and complexity of systems have brought new challenges to the traditional FD methods. For addressing these challenges, this paper designs an FD algorithm based on the improved unscented Kalman filter(UKF) with consideration of performance degradation. It is derived by incorporating a degradation process into the state-space *** network topology of traction systems is taken into consideration for improving the performance of state estimation. We first obtain the mixture distribution by the mixture of sigma points in UKF. Then, the Lévy process with jump points is introduced to construct the degradation model. Finally, the moving average interstate standard deviation(MAISD) is designed for detecting *** the proposed methods via a traction systems in a certain type of trains obtains satisfactory results.
暂无评论