Flow in variably saturated porous media is typically modelled by the Richards equation, a nonlinear elliptic-parabolic equation which is notoriously challenging to solve numerically. In this paper, we propose a robust...
详细信息
Segmentation of lung nodules is critical to computer-aided diagnosis systems for lung cancer diagnosis. In recent times, with the application of deep learning in medical image processing, novel architectures have been...
详细信息
ISBN:
(纸本)9781450398220
Segmentation of lung nodules is critical to computer-aided diagnosis systems for lung cancer diagnosis. In recent times, with the application of deep learning in medical image processing, novel architectures have been proposed for segmentation. However, most of these architectures work on a single modality and work on a single image or whole image volume. In this work, we present Particle Image Velocimetry approach as a preprocessing technique by processing sequence of two input images. We used with and without PIV processed images on a deep learning-based pipeline to extract features from these images for candidate lung nodule detection. The results show that the use of particle image velocimetry processing significantly improves the performance of the deep learning pipeline.
The massive amounts of data generated by the Industrial Internet of Things (IIoT) require considerable processing power, which increases carbon emissions and energy usage, and we need sustainable solutions to enable f...
详细信息
Intelligent traffic signal control is essential to modern urban management, with important impacts on economic efficiency, environmental sustainability, and quality of daily life. However, in current decades, it conti...
详细信息
Stress is the response or a change in our bodies to environmental factors like challenges or demands that are physical and emotional. The main cause of stress is illnesses and it is gaining more interest, a hot topic ...
详细信息
We consider the number of the 6-regular partitions of n, b6(n), and give infinite families of congruences modulo 3 (in arithmetic progression) for b6(n). We also consider the number of the partitions of n into distinc...
详细信息
Code Smell Detection (CSD) plays a crucial role in improving software quality and maintainability. And Deep Learning (DL) techniques have emerged as a promising approach for CSD due to their superior performance. Howe...
详细信息
In this paper, detection of the magnetite rust is presented by using a chipless RFID sensor based on a circular microstrip patch antenna (CMPA). The sensor is designed at the resonant frequency of 4.89 GHz by using a ...
详细信息
In this paper, detection of the magnetite rust is presented by using a chipless RFID sensor based on a circular microstrip patch antenna (CMPA). The sensor is designed at the resonant frequency of 4.89 GHz by using a single-layer PCB with its dielectric constant of 4.3. Simulations were conducted to verify that the designed sensor can detect the magnetite rust through shifted resonant frequency. In simulations, the sensor was mounted on the iron with its magnetite rust. The width and depth of iron rust were varied in order to investigate the effect of iron rust on the resonant frequency. Simulation results have been shown that the proposed chipless RFID sensor and RCS’ can be utilized to detect the effect of the iron rust.
作者:
Anindita GolderSheldon S. WilliamsonDepartment of Electrical and Computer Engineering
Smart Transportation Electrification and Energy Research (STEER) Group Advanced Storage Systems and Electric Transportation (ASSET) Laboratory Ontario Tech-Automotive Center of Excellence (ACE) Faculty of Engineering and Applied Science Ontario Tech University Oshawa Canada
As the adoption for electric vehicles (EV) increases, the need for proper charging infrastructure also increases. As such, it is necessary to ensure proper charging infrastructure to meet the charging demand. Hence, s...
详细信息
ISBN:
(数字)9798350317664
ISBN:
(纸本)9798350317671
As the adoption for electric vehicles (EV) increases, the need for proper charging infrastructure also increases. As such, it is necessary to ensure proper charging infrastructure to meet the charging demand. Hence, studies concerning the planning of EV charging stations which include the sizing of distributed energy resources (DERs) in the station to reduce the peak demand on the grid. In this paper, EV charging stations were designed keeping in mind factors such as the EV charging load profile (on demand charging versus deferred charging), uncertainties in the load profile as well as the tariff rates. A sensitivity analysis was also carried out in order to examine the impact of several techno-economic parameters on the overall cost of the system.
Critical infrastructure is a collection of physical and cyber systems, which are essentially required to support the day-to-day operations of our daily life. In the critical infrastructure, the computing systems (i.e....
Critical infrastructure is a collection of physical and cyber systems, which are essentially required to support the day-to-day operations of our daily life. In the critical infrastructure, the computing systems (i.e., Internet of Things (loT) devices) communicate through the Internet. Therefore, most of the time, critical infrastructures are targeted by hackers by launching some cyber-attack, i.e., ransomware. Hence we require some security mechanisms to protect the data and systems of critical infrastructures. This paper proposes a scheme for the detection, analysis and mitigation of ransomware attacks to protect Internet of Things (loT)-enabled critical infrastructure (in short, RADM-ICI). We also practically demonstrated RADM-ICI and computed essential performance parameters, i.e., accuracy and F1-score under different machine learning models. The conducted security analysis of RADM-ICI proved its excellent security for the ransom ware attacks. During the performance comparison of the proposed RADM-ICI and other similar competing existing schemes, it has been observed that the proposed RADM-ICI achieved better accuracy than the other existing competing schemes.
暂无评论