In wind-turbine power generation systems, generators are typically located in the nacelles, and medium-voltage power converters are mostly placed at the bottom of the tower for maintenance convenience, resulting in lo...
详细信息
Sign language recognition is an important social issue to be addressed which can benefit the deaf and hard of hearing community by providing easier and faster communication. Some previous studies on sign language reco...
详细信息
Agriculture encompasses a way of life and a profession for the general population. Most global traditions and cultures revolve around agriculture. With the help of advanced farming, agriculture may become more profita...
详细信息
The rise in popularity of wearable robotic devices has brought many opportunities in the area of assistive devices for rehabilitation. However, despite their numerous advantages, these wearable mechatronic devices are...
详细信息
Human gait recognition(HGR)is the process of identifying a sub-ject(human)based on their walking *** subject is a unique walking pattern and cannot be simulated by other ***,gait recognition is not easy and makes the ...
详细信息
Human gait recognition(HGR)is the process of identifying a sub-ject(human)based on their walking *** subject is a unique walking pattern and cannot be simulated by other ***,gait recognition is not easy and makes the system difficult if any object is carried by a subject,such as a bag or *** article proposes an automated architecture based on deep features optimization for *** our knowledge,it is the first architecture in which features are fused using multiset canonical correlation analysis(MCCA).In the proposed method,original video frames are processed for all 11 selected angles of the CASIA B dataset and utilized to train two fine-tuned deep learning models such as Squeezenet and *** transfer learning was used to train both fine-tuned models on selected angles,yielding two new targeted models that were later used for feature *** are extracted from the deep layer of both fine-tuned models and fused into one vector using *** improved manta ray foraging optimization algorithm is also proposed to select the best features from the fused feature matrix and classified using a narrow neural network *** experimental process was conducted on all 11 angles of the large multi-view gait dataset(CASIA B)dataset and obtained improved accuracy than the state-of-the-art ***,a detailed confidence interval based analysis also shows the effectiveness of the proposed architecture for HGR.
In recent decades, Cellular Networks (CN) have been used broadly in communication technologies. The most critical challenge in the CN was congestion control due to the distributed mobile environment. Some approaches, ...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing ac...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing across the participating entities, a malicious agent may gain access to outsourced data from the cloud environment. A malicious agent is an entity that deliberately breaches the data. This information accessed might be misused or revealed to unauthorized parties. Therefore, data protection and prediction of malicious agents have become a demanding task that needs to be addressed appropriately. To deal with this crucial and challenging issue, this paper presents a Malicious Agent Identification-based Data Security (MAIDS) Model which utilizes XGBoost machine learning classification algorithm for securing data allocation and communication among different participating entities in the cloud system. The proposed model explores and computes intended multiple security parameters associated with online data communication or transactions. Correspondingly, a security-focused knowledge database is produced for developing the XGBoost Classifier-based Malicious Agent Prediction (XC-MAP) unit. Unlike the existing approaches, which only identify malicious agents after data leaks, MAIDS proactively identifies malicious agents by examining their eligibility for respective data access. In this way, the model provides a comprehensive solution to safeguard crucial data from both intentional and non-intentional breaches, by granting data to authorized agents only by evaluating the agent’s behavior and predicting the malicious agent before granting data. The performance of the proposed model is thoroughly evaluated by accomplishing extensive experiments, and the results signify that the MAIDS model predicts the malicious agents with high accuracy, precision, recall, and F1-scores up to 95.55%, 95.30%, 95.50%, and 95.20%, respectively. This enormously enhances the system’s sec
It is well-known that lithium plating significantly reduces the capacity of Li-ion batteries, particularly at elevated charging rates, high state of charge (SoC), and low temperatures. This study presents a simplified...
详细信息
This paper presents an allowable-tolerance-based group search optimization(AT-GSO),which combines the robust GSO(R-GSO)and the external quality design planning of the Taguchi ***-GSO algorithm is used to optimize the ...
详细信息
This paper presents an allowable-tolerance-based group search optimization(AT-GSO),which combines the robust GSO(R-GSO)and the external quality design planning of the Taguchi ***-GSO algorithm is used to optimize the heat transfer area of the heat exchanger *** R-GSO algorithm integrates the GSO algorithm with the Taguchi method,utilizing the Taguchi method to determine the optimal producer in each iteration of the GSO algorithm to strengthen the robustness of the search process and the ability to find the global *** conventional parameter design optimization,it is typically assumed that the designed parameters can be applied accurately and consistently throughout ***,for systems that are sensitive to changes in design parameters,even minor inaccuracies can substantially reduce overall system ***,the permissible variations of the design parameters are considered in the tolerance-optimized design to ensure the robustness of the *** optimized design of the heat exchanger system assumes that the system’s operating temperature parameters are ***,fixing the systemoperating temperature parameters at a constant value is *** paper assumes that the system operating temperature parameters have an uncertainty error when optimizing the heat transfer area of the heat exchanger *** results show that the AT-GSO algorithm optimizes the heat exchanger system and finds the optimal operating temperature in the absence of tolerance and under three tolerance conditions.
The growing concerns over mitigating climate change effects resulted in power system planning and generation expansion strategies that aim in increasing penetration of intermittent renewable energy sources (RES) to fu...
详细信息
暂无评论