The Internet of Drones (IoD) extends the capabilities of unmanned aerial vehicles, enabling them to participate in a connected network. In IoD infrastructure, drones communicate not only among themselves but also with...
详细信息
Heart disease is rapidly overtaking other causes of death in India, and it is a major threat to both men and women. Among the top causes of mortality throughout the globe, heart disease ranks first. Therefore, it is c...
详细信息
Simulating the method of neurons in the human brain that process signals is crucial for constructing a neural network with biological interpretability. However, existing deep neural networks simplify the function of a...
详细信息
SHM is a very important process in terms of the safety and durability of infrastructure. Traditional SHM often faces problems detecting minor structural defects and handling large datasets. Therefore, certain more adv...
详细信息
Within the field of haplotype analysis, the Positional Burrows-Wheeler Transform (PBWT) stands out as a key innovation, addressing numerous challenges in genomics. For example, Sanaullah et al. introduced a PBWT-based...
详细信息
Cyber-physical systems, such as unmanned aerial vehicles and connected and autonomous vehicles, are vulnerable to cyber attacks, which can cause significant damage to society. This paper examines the attack issue in c...
详细信息
Cyber-physical systems, such as unmanned aerial vehicles and connected and autonomous vehicles, are vulnerable to cyber attacks, which can cause significant damage to society. This paper examines the attack issue in cyber-physical systems within the framework of discrete event systems. Specifically, we consider a scenario where a malicious intruder injects a jamming signal into an actuator channel. It disrupts the transmission of control commands and prevents an actuator from receiving them. This is termed an actuator jamming attack. In the paper, we first analyze the closed-loop system behavior under such an attack. An attack structure is constructed to illustrate how an intruder exploits a jamming attack to drive a system into unsafe states. Then, we study the supervisory control problem for a system exposed to such an attack. The problem is reduced to a basic supervisory control one in discrete event systems by introducing the concept of dynamically controllable language. A solution to this problem is explored, where we establish an existence condition for a supremal and robust supervisor that is capable of defending against actuator jamming attacks, and design an algorithm to derive it. Finally, the effectiveness of our method is illustrated by an intelligent automated guided vehicle system. IEEE
Statistical methods and models are the backbone of machine learning, which allows computers to autonomously discover and exploit data patterns. The ultimate objective is for computers to accurately forecast outcomes b...
详细信息
Longer training times pose a significant challenge in artificial neural networks (ANNs) as it may leads to increasing the computational costs and decreasing the effectiveness of the model. Therefore, it is imperative ...
详细信息
This paper presents a tunable multi-threshold micro-electromechanical inertial switch with adjustable threshold *** demonstrated device combines the advantages of accelerometers in providing quantitative acceleration ...
详细信息
This paper presents a tunable multi-threshold micro-electromechanical inertial switch with adjustable threshold *** demonstrated device combines the advantages of accelerometers in providing quantitative acceleration measurements and g-threshold switches in saving power when in the inactive state upon experiencing acceleration below the *** designed proof-of-concept device with two thresholds consists of a cantilever microbeam and two stationary electrodes placed at different positions in the sensing *** adjustable threshold capability and the effect of the shock duration on the threshold acceleration are analytically investigated using a nonlinear beam *** are shown for the relationships among the applied bias voltage,the duration of shock impact,and the tunable *** fabricated prototypes are tested using a shock-table *** analytical results agree with the experimental *** designed device concept is very promising for the classification of the shock and impact loads in transportation and healthcare applications.
COVID’19 has caused the entire universe to be in existential healthcrisis by spreading globally in the year 2020. The lungs infection is detected inComputed Tomography (CT) images which provide the best way to increa...
详细信息
COVID’19 has caused the entire universe to be in existential healthcrisis by spreading globally in the year 2020. The lungs infection is detected inComputed Tomography (CT) images which provide the best way to increasethe existing healthcare schemes in preventing the deadly virus. Nevertheless,separating the infected areas in CT images faces various issues such as lowintensity difference among normal and infectious tissue and high changes inthe characteristics of the infection. To resolve these issues, a new inf-Net (LungInfection Segmentation Deep Network) is designed for detecting the affectedareas from the CT images automatically. For the worst segmentation results,the Edge-Attention Representation (EAR) is optimized using AdaptiveDonkey and Smuggler Optimization (ADSO). The edges which are identifiedby the ADSO approach is utilized for calculating dissimilarities. An IFCM(Intuitionistic Fuzzy C-Means) clustering approach is applied for computingthe similarity of the EA component among the generated edge maps andGround-Truth (GT) edge maps. Also, a Semi-Supervised Segmentation(SSS) structure is designed using the Randomly Selected Propagation (RP)technique and Inf-Net, which needs only less number of images and unlabelleddata. Semi-Supervised Multi-Class Segmentation (SSMCS) is designed usinga Bi-LSTM (Bi-Directional Long-Short-Term-memory), acquires all theadvantages of the disease segmentation done using Semi Inf-Net and enhancesthe execution of multi-class disease labelling. The newly designed SSMCSapproach is compared with existing U-Net++, MCS, and *** such as MAE (Mean Absolute Error), Structure measure, Specificity(Spec), Dice Similarity coefficient, Sensitivity (Sen), and Enhance-AlignmentMeasure are considered for evaluation purpose.
暂无评论