Advancements in neuromorphic computing have given an impetus to the development of systems with adaptive behavior,dynamic responses,and energy efficiency *** charge-based or emerging memory technologies such as memris...
详细信息
Advancements in neuromorphic computing have given an impetus to the development of systems with adaptive behavior,dynamic responses,and energy efficiency *** charge-based or emerging memory technologies such as memristors have been developed to emulate synaptic plasticity,replicating the key functionality of neurons—integrating diverse presynaptic inputs to fire electrical impulses—has remained *** this study,we developed reconfigurable metal-oxide-semiconductor capacitors(MOSCaps)based on hafnium diselenide(HfSe2).The proposed devices exhibit(1)optoelectronic synaptic features and perform separate stimulus-associated learning,indicating considerable adaptive neuron emulation,(2)dual light-enabled charge-trapping and memcapacitive behavior within the same MOSCap device,whose threshold voltage and capacitance vary based on the light intensity across the visible spectrum,(3)memcapacitor volatility tuning based on the biasing conditions,enabling the transition from volatile light sensing to non-volatile optical data *** reconfigurability and multifunctionality of MOSCap were used to integrate the device into a leaky integrate-and-fire neuron model within a spiking neural network to dynamically adjust firing patterns based on light stimuli and detect exoplanets through variations in light intensity.
The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection *** recent studies have...
详细信息
The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection *** recent studies have made progress,a common challenge is the low accuracy of existing detection *** models often struggle to reliably identify corrosion tendencies,which are crucial for minimizing industrial risks and optimizing resource *** proposed study introduces an innovative approach that significantly improves the accuracy of corrosion detection using a convolutional neural network(CNN),as well as two pretrained models,namely YOLOv8 and *** leveraging advanced technologies and methodologies,we have achieved high accuracies in identifying and managing the hazards associated with corrosion across various industrial *** advancement not only supports the overarching goals of enhancing safety and efficiency,but also sets a new benchmark for future research in the *** results demonstrate a significant improvement in the ability to detect and mitigate corrosion-related concerns,providing a more accurate and comprehensive solution for industries facing these *** CNN and EfficientNetB0 exhibited 100%accuracy,precision,recall,and F1-score,followed by YOLOv8 with respective metrics of 95%,100%,90%,and 94.74%.Our approach outperformed state-of-the-art with similar datasets and methodologies.
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of *** connection between industrial control networks and the external internet is becoming increa...
详细信息
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of *** connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security *** paper proposes a model for the industrial control *** includes a malware containment strategy that integrates intrusion detection,quarantine,and ***,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment *** addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction ***,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is *** otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control *** earlier the immunization of key nodes,the *** the time exceeds the threshold,immunizing key nodes is almost *** analysis provides a better way to contain the malware in the industrial control network.
Load balancing and scheduling are essential components of cloud computing that aim to optimize resource allocation and utilization. In a cloud environment, multiple virtual machines and applications compete for shared...
详细信息
The advances in 3D reconstruction technology, such as photogrammetry and LiDAR scanning, have made it easier to reconstruct accurate and detailed 3D models for urban scenes. Nevertheless, these reconstructed models of...
详细信息
Researchers have recently created several deep learning strategies for various tasks, and facial recognition has made remarkable progress in employing these techniques. Face recognition is a noncontact, nonobligatory,...
详细信息
Researchers have recently created several deep learning strategies for various tasks, and facial recognition has made remarkable progress in employing these techniques. Face recognition is a noncontact, nonobligatory, acceptable, and harmonious biometric recognition method with a promising national and social security future. The purpose of this paper is to improve the existing face recognition algorithm, investigate extensive data-driven face recognition methods, and propose a unique automated face recognition methodology based on generative adversarial networks (GANs) and the center symmetric multivariable local binary pattern (CS-MLBP). To begin, this paper employs the center symmetric multivariant local binary pattern (CS-MLBP) algorithm to extract the texture features of the face, addressing the issue that C2DPCA (column-based two-dimensional principle component analysis) does an excellent job of removing the global characteristics of the face but struggles to process the local features of the face under large samples. The extracted texture features are combined with the international features retrieved using C2DPCA to generate a multifeatured face. The proposed method, GAN-CS-MLBP, syndicates the power of GAN with the robustness of CS-MLBP, resulting in an accurate and efficient face recognition system. Deep learning algorithms, mainly neural networks, automatically extract discriminative properties from facial images. The learned features capture low-level information and high-level meanings, permitting the model to distinguish among dissimilar persons more successfully. To assess the proposed technique’s GAN-CS-MLBP performance, extensive experiments are performed on benchmark face recognition datasets such as LFW, YTF, and CASIA-WebFace. Giving to the findings, our method exceeds state-of-the-art facial recognition systems in terms of recognition accuracy and resilience. The proposed automatic face recognition system GAN-CS-MLBP provides a solid basis for a
Effective management of electricity consumption (EC) in smart buildings (SBs) is crucial for optimizing operational efficiency, cost savings, and ensuring sustainable resource utilization. Accurate EC prediction enabl...
详细信息
The Internet of Things (IoT) has revolutionized our lives, but it has also introduced significant security and privacy challenges. The vast amount of data collected by these devices, often containing sensitive informa...
详细信息
In general, cloud security is capable of providing various information, applications, services, etc. using extensive policies and progressive technologies. On the other hand, loss of data, confidentiality breaches, an...
详细信息
Maintaining a regular daily activity routine is essential for overall health and well-being. Wearable sensors offer a convenient way to track daily activities, but accurately identifying a wide range of activities rem...
详细信息
暂无评论