In this paper, the impact of slip condition, radiation, constant heat and mass flux subjected to chemical reaction on an unsteady viscoelastic periodic flow is investigated. Further, the effect of an inclined magnetic...
详细信息
We study the performance of a selection combining (SC) receiver operating over independent but non-identically distributed log-logistic ( LL) fading channels. We first characterize the statistics of the output instant...
详细信息
A novel cluster-based traffic offloading and user association (UA) algorithm alongside a multi-agent deep reinforcement learning (DRL) based base station (BS) activation mechanism is proposed in this paper. Our design...
详细信息
Recently,with the normalization of non-face-to-face online environments in response to the COVID-19 pandemic,the possibility of cyberattacks through endpoints has *** endpoint devices are managed meticulously to preve...
详细信息
Recently,with the normalization of non-face-to-face online environments in response to the COVID-19 pandemic,the possibility of cyberattacks through endpoints has *** endpoint devices are managed meticulously to prevent cyberattacks and ensure timely responses to potential security *** particular,because telecommuting,telemedicine,and teleeducation are implemented in uncontrolled environments,attackers typically target vulnerable endpoints to acquire administrator rights or steal authentication information,and reports of endpoint attacks have been increasing *** persistent threats(APTs)using various novel variant malicious codes are a form of a sophisticated ***,conventional commercial antivirus and anti-malware systems that use signature-based attack detectionmethods cannot satisfactorily respond to such *** this paper,we propose a method that expands the detection coverage inAPT attack *** this model,an open-source threat detector and log collector are used synergistically to improve threat detection *** the scope of attack log collection through interworking between highly accessible open-source tools can efficiently increase the detection coverage of tactics and techniques used to deal with APT attacks,as defined by MITRE Adversarial Tactics,Techniques,and Common Knowledge(ATT&CK).We implemented an attack environment using an APT attack scenario emulator called Carbanak and analyzed the detection coverage of Google Rapid Response(GRR),an open-source threat detection tool,and Graylog,an open-source log *** proposed method expanded the detection coverage against MITRE ATT&CK by approximately 11%compared with that conventional methods.
Understanding the reasons behind student attrition is essential to developing retention strategies. In this study, we developed models to predict student attrition for the Chartered Accountancy programme at the Univer...
详细信息
The objective of this study is to propose a method called the fuzzy technique for order preference by similarity to the ideal solution (F-TOPSIS) to select parameters of the wire electrical discharge machining (WEDM) ...
详细信息
Green hydrogen has shown great potential to power microgrids as a primary source,whereas the resilient operation methodology under extreme events remains an open *** fill this gap,this letter establishes an operationa...
详细信息
Green hydrogen has shown great potential to power microgrids as a primary source,whereas the resilient operation methodology under extreme events remains an open *** fill this gap,this letter establishes an operational optimization strategy towards resilient hydrogen-powered *** frequency and voltage regulation characteristics of primary hydrogen sources under droop control and their electrical-chemical conversion process with nonlinear stack efficiency are accurately modeled by piecewise linear constraints.A resilience-oriented multi-time-slot stochastic optimization model is then formulated for an economic and robust operation under changing *** results show that the new formulation can leverage the primary hydrogen sources to achieve a resilience and safety-assured operation plan,supplying maximum critical loads while significantly reducing the frequency and voltage variations.
A tunable dual-mode dual-band square cavity substrate integrated waveguide (SIW) bandpass filter is proposed. Metalized via-holes are inserted into the center of the cavity as perturbations to move and control the fou...
详细信息
Seeking intrinsically low thermal conductivity materials is a viable strategy in the pursuit of high-performance thermoelectric ***,by using first-principles calculations and semiclassical Boltzmann transport theory,w...
详细信息
Seeking intrinsically low thermal conductivity materials is a viable strategy in the pursuit of high-performance thermoelectric ***,by using first-principles calculations and semiclassical Boltzmann transport theory,we systemically investigate the carrier transport and thermoelectric properties of monolayer Janus GaInX_(3)(X=S,Se,Te).It is found that the lattice thermal conductivities can reach values as low as 3.07 W·m^(-1)·K^(-1),1.16 W·m^(-1)·K^(-1)and 0.57 W·m^(-1)·K^(-1)for GaInS_(3),GaInSe_(3),and GaInTe_(3),respectively,at room *** notably low thermal conductivity is attributed to strong acoustic-optical phonon coupling caused by the presence of low-frequency optical phonons in GaInX_(3) ***,by integrating the charac teristics of electronic and thermal transport,the dimensionless figure of merit ZT can reach maximum values of 0.95,2.37,and 3.00 for GaInS_(3),GaInSe_(3),and GaInTe_(3),*** results suggest that monolayer Janus GaInX_(3)(X=S,Se,Te)is a promising candidate for thermoelectric and heat management applications.
Foundational deep learning (DL) models are general models, trained on large, diverse, and unlabelled datasets, typically using self-supervised learning techniques - and have led to significant advancements especially ...
详细信息
暂无评论