Six-phase motors are becoming more popular because of their advantages such as lower torque ripple, better power distribution per phase, higher efficiency, and fault-tolerant capability compared to the three-phase one...
详细信息
As Programmable Logic Controllers (PLCs) become more integrated into complex industrial systems and networks, their software components face increased security vulnerabilities. Fuzz testing, which uses unexpected inpu...
详细信息
Healthcare resource management is essential for ensuring the quality of patient care. However, it can be a complex and costly task. This work addresses the patient admission scheduling (PAS) problem, a complex aspect ...
详细信息
Emergency vehicles face difficulty in navigating through traffic and locating the shortest route to the incident site. In the developing countries or under disaster conditions when limited communication and Intelligen...
详细信息
To tackle the energy crisis and climate change,wind farms are being heavily invested in across the *** China's coastal areas,there are abundant wind resources and numerous offshore wind farms are being *** secure ...
详细信息
To tackle the energy crisis and climate change,wind farms are being heavily invested in across the *** China's coastal areas,there are abundant wind resources and numerous offshore wind farms are being *** secure operation of these wind farms may suffer from typhoons,and researchers have studied power system operation and resilience enhancement in typhoon ***,the intricate movement of a typhoon makes it challenging to evaluate its spatial-temporal *** published papers only consider predefined typhoon trajectories neglecting *** address this challenge,this study proposes a stochastic unit commitment model that incorporates high-penetration offshore wind power generation in typhoon *** adopts a data-driven method to describe the uncertainties of typhoon trajectories and considers the realistic anti-typhoon mode in offshore wind farms.A two-stage stochastic unit commitment model is designed to enhance power system resilience in typhoon *** formulate the model into a mixed-integer linear programming problem and then solve it based on the computationally-efficient progressive hedging algorithm(PHA).Finally,numerical experiments validate the effectiveness of the proposed method.
This paper proposes a waveform design technique for dual-function radar-communication (DFRC) systems that employ hybrid linear-nonlinear precoding (HLNP). The HLNP signal is a superposition of linear precoding of the ...
详细信息
The network switches in the data plane of Software Defined Networking (SDN) are empowered by an elementary process, in which enormous number of packets which resemble big volumes of data are classified into specific f...
详细信息
The network switches in the data plane of Software Defined Networking (SDN) are empowered by an elementary process, in which enormous number of packets which resemble big volumes of data are classified into specific flows by matching them against a set of dynamic rules. This basic process accelerates the processing of data, so that instead of processing singular packets repeatedly, corresponding actions are performed on corresponding flows of packets. In this paper, first, we address limitations on a typical packet classification algorithm like Tuple Space Search (TSS). Then, we present a set of different scenarios to parallelize it on different parallel processing platforms, including Graphics Processing Units (GPUs), clusters of Central Processing Units (CPUs), and hybrid clusters. Experimental results show that the hybrid cluster provides the best platform for parallelizing packet classification algorithms, which promises the average throughput rate of 4.2 Million packets per second (Mpps). That is, the hybrid cluster produced by the integration of Compute Unified Device Architecture (CUDA), Message Passing Interface (MPI), and OpenMP programming model could classify 0.24 million packets per second more than the GPU cluster scheme. Such a packet classifier satisfies the required processing speed in the programmable network systems that would be used to communicate big medical data.
Incredible progress has been made in human action recognition(HAR),significantly impacting computer vision applications in sports ***,identifying dynamic and complex movements in sports like badminton remains challeng...
详细信息
Incredible progress has been made in human action recognition(HAR),significantly impacting computer vision applications in sports ***,identifying dynamic and complex movements in sports like badminton remains challenging due to the need for precise recognition accuracy and better management of complex motion *** learning techniques like convolutional neural networks(CNNs),long short-term memory(LSTM),and graph convolutional networks(GCNs)improve recognition in large datasets,while the traditional machine learning methods like SVM(support vector machines),RF(random forest),and LR(logistic regression),combined with handcrafted features and ensemble approaches,perform well but struggle with the complexity of fast-paced sports like *** proposed an ensemble learning model combining support vector machines(SVM),logistic regression(LR),random forest(RF),and adaptive boosting(AdaBoost)for badminton action *** data in this study consist of video recordings of badminton stroke techniques,which have been extracted into spatiotemporal *** three-dimensional distance between each skeleton point and the right hip represents the spatial *** temporal features are the results of Fast Dynamic Time Warping(FDTW)calculations applied to 15 frames of each video *** weighted ensemble model employs soft voting classifiers from SVM,LR,RF,and AdaBoost to enhance the accuracy of badminton action *** E2 ensemble model,which combines SVM,LR,and AdaBoost,achieves the highest accuracy of 95.38%.
The advancements in technology have substantially grown the size of image *** image encryption algorithms have limited capabilities to deal with the emerging challenges in big data,including compression and noise *** ...
详细信息
The advancements in technology have substantially grown the size of image *** image encryption algorithms have limited capabilities to deal with the emerging challenges in big data,including compression and noise *** image encryption method that is based on chaotic maps and orthogonal matrix is proposed in this *** proposed scheme is built on the intriguing characteristics of an orthogonal *** Schmidt disperses the values of pixels in a plaintext image by generating a random orthogonal matrix using logistic chaotic *** the diffusion process,a block-wise random permutation of the data is performed using *** proposed scheme provides sufficient security and resilience to JPEG compression and channel noise through a series of experiments and security *** enables Partial Encryption(PE)for faster processing as well as complete encryption for increased *** higher values of the number of pixels change rates and unified average change intensity confirm the security of the encryption *** contrast to other schemes,the proposed approach can perform full and partial encryption depending on security requirements.
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
暂无评论