Crowd dynamics and many large biological systems can be described as populations of agents or particles, which can only be observed on aggregate population level. Identifying the dynamics of agents is crucial for unde...
详细信息
THE Lebanese wireless device explosion incident has drawn widespread attention,involving devices such as pagers,walkie-talkies,and other common devices[1].This event has revealed and highlighted the security vulnerabi...
详细信息
THE Lebanese wireless device explosion incident has drawn widespread attention,involving devices such as pagers,walkie-talkies,and other common devices[1].This event has revealed and highlighted the security vulnerabilities in global supply chains from raw material manufacturing and distribution to the usage of devices and equipment,signaling the onset of a new wave of"supply chain warfare"[2].
Safety PLCs are commonly used in industrial applications to implement safety functions. However, they almost always require output circuits for power adaptation between the safety PLC and the controlled technology. Th...
详细信息
ISBN:
(数字)9798350350708
ISBN:
(纸本)9798350350715
Safety PLCs are commonly used in industrial applications to implement safety functions. However, they almost always require output circuits for power adaptation between the safety PLC and the controlled technology. This power adaptation also affects safety. This paper focuses on the design of output circuit architecture that allows the use of diagnostic testing to improve safety, even during continuous operation where diagnostic testing is not usually possible.
The paper deals with the design and implementation of safety functions for a CNC milling machine. It is a relatively small CNC milling machine that does not pose a great danger to trained persons. Because it is used i...
详细信息
ISBN:
(数字)9798350372359
ISBN:
(纸本)9798350372366
The paper deals with the design and implementation of safety functions for a CNC milling machine. It is a relatively small CNC milling machine that does not pose a great danger to trained persons. Because it is used in areas where even untrained persons can come into contact with it, it was necessary to implement a safety system that implements safety functions preventing accidents when entering the dangerous zone of the CNC milling machine. The safety system is implemented based on a safety PLC and the sensors are designed using a two-channel architecture to meet the required SIL (safety integrity level).
This article introduces a new medical internet of things(IoT)framework for intelligent fall detection system of senior people based on our proposed deep forest *** cascade multi-layer structure of deep forest classifi...
详细信息
This article introduces a new medical internet of things(IoT)framework for intelligent fall detection system of senior people based on our proposed deep forest *** cascade multi-layer structure of deep forest classifier allows to generate new features at each level with minimal hyperparameters compared to deep neural ***,the optimal number of the deep forest layers is automatically estimated based on the early stopping criteria of validation accuracy value at each generated *** suggested forest classifier was successfully tested and evaluated using a public SmartFall dataset,which is acquired from three-axis accelerometer in a *** includes 92781 training samples and 91025 testing samples with two labeled classes,namely non-fall and *** results of our deep forest classifier demonstrated a superior performance with the best accuracy score of 98.0%compared to three machine learning models,i.e.,K-nearest neighbors,decision trees and traditional random forest,and two deep learning models,which are dense neural networks and convolutional neural *** considering security and privacy aspects in the future work,our proposed medical IoT framework for fall detection of old people is valid for real-time healthcare application deployment.
In order to address the shortcomings of traditional anonymity network anonymity evaluation methods,which only analyze from the perspective of the overall network and ignore the attributes of individual nodes,we propos...
详细信息
In order to address the shortcomings of traditional anonymity network anonymity evaluation methods,which only analyze from the perspective of the overall network and ignore the attributes of individual nodes,we proposes a dynamic anonymity model based on a self-built anonymous system that combines node attributes,network behavior,and program security *** anonymity of evaluation nodes is assessed based on stable intervals and behavior baselines defined according to their normal operating *** anonymity of the network is evaluated using an improved normalized information entropy method that refines anonymity evaluation to the anonymity of each node and expands the dimensionality of evaluation *** paper compares the effectiveness of our proposed method with static framework information entropy and single indicator methods by evaluating the degree of anonymity provided by a self-built Tor anonymous network under multiple operating scenarios including normal and under *** approach utilizes dynamically changing network anonymity based on multiple anonymous attributes and better reflects the degree of anonymity in anonymous systems.
This paper explores the dissipative fault detection filtering (FDF) issue for unmanned surface vehicles (USVs) within a network environment, considering switching channels and random occurrence of packet losses. Speci...
详细信息
With the dawn of e-Healthcare systems, Medical Record Management has become an important research problem. The storage and organization of medical records have made relatively little progress in a world of constantly ...
详细信息
Modern urban development depends on optimizing cognitive sensor communications in smart cities, which is the focus of this investigation. In the era of expanding sensor networks, efficient data transmission is paramou...
详细信息
With the rapid development of artificial intelligence, deep neural network (DNN) has been widely used in industrial defect detection, intelligent driving, medical research, etc. However, DNN is still limited in the im...
详细信息
暂无评论