Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ...
详细信息
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware *** study provides a new approach for RaaS attack detection which uses an ensemble of deep learning *** this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is *** the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are ***,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested *** proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%*** empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual *** expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats.
While spin-orbit interaction has been extensively studied,few investigations have reported on the interaction between orbital angular momenta(OAMs).In this work,we study a new type of orbit-orbit coupling between the ...
详细信息
While spin-orbit interaction has been extensively studied,few investigations have reported on the interaction between orbital angular momenta(OAMs).In this work,we study a new type of orbit-orbit coupling between the longitudinal OAM and the transverse OAM carried by a three-dimensional(3D)spatiotemporal optical vortex(STOV)in the process of tight *** 3D STOV possesses orthogonal OAMs in the x-y,t-x,and y-t planes,and is preconditioned to overcome the spatiotemporal astigmatism effect.x,y,and t are the axes in the spatiotemporal *** corresponding focused wavepacket is calculated by employing the Debye diffraction theory,showing that a phase singularity ring is generated by the interactions among the transverse and longitudinal vortices in the highly confined *** Fourier-transform decomposition of the Debye integral is employed to analyze the mechanism of the orbit-orbit *** is the first revelation of coupling between the longitudinal OAM and the transverse OAM,paving the way for potential applications in optical trapping,laser machining,nonlinear light-matter interactions,and more.
This article presents an in-depth exploration of the acoustofluidic capabilities of guided flexural waves(GFWs)generated by a membrane acoustic waveguide actuator(MAWA).By harnessing the potential of GFWs,cavity-agnos...
详细信息
This article presents an in-depth exploration of the acoustofluidic capabilities of guided flexural waves(GFWs)generated by a membrane acoustic waveguide actuator(MAWA).By harnessing the potential of GFWs,cavity-agnostic advanced particle manipulation functions are achieved,unlocking new avenues for microfluidic systems and lab-on-a-chip *** localized acoustofluidic effects of GFWs arising from the evanescent nature of the acoustic fields they induce inside a liquid medium are numerically investigated to highlight their unique and promising *** traditional acoustofluidic technologies,the GFWs propagating on the MAWA’s membrane waveguide allow for cavity-agnostic particle manipulation,irrespective of the resonant properties of the fluidic ***,the acoustofluidic functions enabled by the device depend on the flexural mode populating the active region of the membrane *** demonstrations using two types of particles include in-sessile-droplet particle transport,mixing,and spatial separation based on particle diameter,along with streaming-induced counter-flow virtual channel generation in microfluidic PDMS *** experiments emphasize the versatility and potential applications of the MAWA as a microfluidic platform targeted at lab-on-a-chip development and showcase the MAWA’s compatibility with existing microfluidic systems.
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distributed paradigm to address these concerns by enabling privacy-preserving recommendations directly on user devices. In this survey, we review and categorize current progress in CUFR, focusing on four key aspects: privacy, security, accuracy, and efficiency. Firstly,we conduct an in-depth privacy analysis, discuss various cases of privacy leakage, and then review recent methods for privacy protection. Secondly, we analyze security concerns and review recent methods for untargeted and targeted *** untargeted attack methods, we categorize them into data poisoning attack methods and parameter poisoning attack methods. For targeted attack methods, we categorize them into user-based methods and item-based methods. Thirdly,we provide an overview of the federated variants of some representative methods, and then review the recent methods for improving accuracy from two categories: data heterogeneity and high-order information. Fourthly, we review recent methods for improving training efficiency from two categories: client sampling and model compression. Finally, we conclude this survey and explore some potential future research topics in CUFR.
This paper proposes an empirical wavelet transform(EWT)based method for identification and analysis of sub-synchronous oscillation(SSO)modes in the power system using phasor measurement unit(PMU)*** phasors from PMUs ...
详细信息
This paper proposes an empirical wavelet transform(EWT)based method for identification and analysis of sub-synchronous oscillation(SSO)modes in the power system using phasor measurement unit(PMU)*** phasors from PMUs are preprocessed to check for the presence of *** the presence is established,the signal is decomposed using EWT and the parameters of the mono-components are estimated through Yoshida *** superiority of the proposed method is tested using test signals with known parameters and simulated using actual SSO signals from the Hami Power Grid in Northwest *** show the effectiveness of the proposed EWT-Yoshida method in detecting the SSO and estimating its parameters.
The limitations of the conventional master-slavesplitting(MSS)method,which is commonly applied to power flow and optimal power flow in integrated transmission and distribution(I-T&D)networks,are first *** that the...
详细信息
The limitations of the conventional master-slavesplitting(MSS)method,which is commonly applied to power flow and optimal power flow in integrated transmission and distribution(I-T&D)networks,are first *** that the MSS method suffers from a slow convergence rate or even divergence under some circumstances,a least-squares-based iterative(LSI)method is *** with the MSS method,the LSI method modifies the iterative variables in each iteration by solving a least-squares problem with the information in previous iterations.A practical implementation and a parameter tuning strategy for the LSI method are ***,a LSI-PF method is proposed to solve I-T&D power flow and a LSIheterogeneous decomposition(LSI-HGD)method is proposed to solve optimal power *** experiments demonstrate that the proposed LSI-PF and LSI-HGD methods can achieve the same accuracy as the benchmark ***,these LSI methods,with appropriate settings,significantly enhance the convergence and efficiency of conventional ***,in some cases,where conventional methods diverge,these LSI methods can still converge.
We propose the lattice design that allows multiple topologically protected edge modes. The scattering between these modes, which is linear, energy preserving, and robust against local disorders, is discussed in terms ...
With the advance of 5G technologies and the development of space-air-ground-sea applications,the fast and efficient collection and processing of the explosive growth of sensing data have become significant and *** thi...
详细信息
With the advance of 5G technologies and the development of space-air-ground-sea applications,the fast and efficient collection and processing of the explosive growth of sensing data have become significant and *** this paper,considering the Age of Information(AoI),the limited coverage of Base Stations(BS),and the constrained computation capability of Unmanned Aerial Vehicle(UAV),we propose a hybrid communication framework that utilizes UAVs as relays to optimize the collection of sensing *** aim to minimize the average AoI of the data among all sensor nodes while considering the energy consumption constraints of sensor nodes,which is formulated as a Mixed Integer NonLinear Programming(MINLP).To address this problem,we decompose it into communication resource allocation and computation resource ***,the average AoI of the whole system is minimized and the average energy consumption constraint of sensor nodes is *** simulation results show that our proposed method can achieve significant performance *** specific,our proposed method can reduce the average AoI by 20%,11%,and 43%compared to the three counterparts,Data Transmission Directly Algorithm(DTDA),Max Weight Algorithm(MWA),and matching algorithm,respectively.
暂无评论