Magneto-optical current transformer has the defect of poor anti-interference ability. In this paper, the interference characteristics of differential magneto-optical current transformer are studied based on the backgr...
详细信息
In many fields, time series prediction is gaining more and more attention, e.g., air pollution, geological hazards, and network traffic prediction. Water quality prediction is based on historical data to predict futur...
详细信息
Hall-sensor-based brushless DC (BLDC) motors are utilized extensively in low-cost applications due to their manufacturing simplicity and ease of control. Often, BLDC motors are controlled using the 120° commutati...
详细信息
While blockchain offers inherent security, trust issues among stakeholders in vehicle-to-grid (V2G) applications remain unresolved due to a lack of regulatory frameworks and standardization. Additionally, a tailored d...
详细信息
This paper introduces machine learning (ML) as a solution for the detection and range localization of jamming attacks targeting the global positioning system (GPS) technology, with applications to unmanned aerial vehi...
This paper introduces machine learning (ML) as a solution for the detection and range localization of jamming attacks targeting the global positioning system (GPS) technology, with applications to unmanned aerial vehicles (UAVs). Different multi-output multiclass ML models are trained with GPS-specific sample datasets obtained from exhaustive feature extraction and data collection routines that followed a set of realistic experimentations of attack scenarios. The resulting models enable the classification of four attack types (i.e., barrage, single-tone, successive-pulse, protocol-aware), the jamming direction, and the distance from the jamming source by yielding a detection rate (DR), misdetection rate (MDR), false alarm rate (FAR), and F-score (FS) of 98.9%, 1.39%, 0.28%, and 0.989, respectively.
This paper introduces an unsupervised deep Bayesian network, built upon normalizing flow and deep Bayesian network principles, to precisely evaluate the transient security condition of a power system. The proposed app...
This paper introduces an unsupervised deep Bayesian network, built upon normalizing flow and deep Bayesian network principles, to precisely evaluate the transient security condition of a power system. The proposed approach can capture locational and temporal features using an imbalanced dataset, is noise-model-free, and can handle unlabeled data. It can learn interdependencies between different signals and understand high-dimensional signals in power systems. To validate its effectiveness, the proposed method is studied using the New England power system and shows accuracy and reliability in comparison with state-of-the-art deep networks (convolutional neural network (CNN) and long short-term memory (LSTM)) and shallow networks (support vector machine (SVM) and artificial neural network (ANN)).
Nowadays,cloud computing has been identified as new opportunities for migrating to the expected agility,reuse,and adaptive capabilities that can support the ever changing IT trends and ***,the rapid evolution of those...
详细信息
Nowadays,cloud computing has been identified as new opportunities for migrating to the expected agility,reuse,and adaptive capabilities that can support the ever changing IT trends and ***,the rapid evolution of those technologies also comes with open issues such as security,privacy,integrity,quality of services,and their possible detrimental *** this work,the concept of insurance is introduced to compensate the cloud computing customers when encountering those failures if service providers(SPs)have insurance ***,we consider the situation when the insurer is unable to see the system failure risk levels of the SPs,which is usually seen as an incomplete information market,in contrast with the optimal situation in a complete information ***,an insurance-based cloud computing architecture is proposed to build a monetary credit system in which the cloud computing SP pays a premium for a certain coverage to the ***,problem is formulated to solve the optimal insurance plan in complete and incomplete information markets,together with detail analysis of insurance policies in both cases are ***,simulation results show the properties of the two insurance plans and parameters that affect the design of the insurance plan.
Efficient Energy-Efficient Cluster Head Selection (EECHS) remains a critical issue in Mobile Ad Hoc Networks (MANETs), where the selection of an appropriate cluster head (CH) can significantly enhance power efficiency...
详细信息
Developing a software system from natural language requirements is a complex and delicate task that requires a high level of design and programming expertise. Increasing the level of abstraction used to describe these...
详细信息
This work presents the diagnosis of various acute respiratory syndromes using customized CNN architecture from X-ray images. Complications of viral pneumonia results in influenza and COVID-19. The respiratory syndrome...
详细信息
暂无评论