Changes in the Atmospheric Electric Field Signal(AEFS) are highly correlated with weather changes, especially with thunderstorm activities. However, little attention has been paid to the ambiguous weather information ...
详细信息
Changes in the Atmospheric Electric Field Signal(AEFS) are highly correlated with weather changes, especially with thunderstorm activities. However, little attention has been paid to the ambiguous weather information implicit in AEFS changes. In this paper, a Fuzzy C-Means(FCM) clustering method is used for the first time to develop an innovative approach to characterize the weather attributes carried by AEFS. First, a time series dataset is created in the time domain using AEFS attributes. The AEFS-based weather is evaluated according to the time-series Membership Degree(MD) changes obtained by inputting this dataset into the FCM. Second, thunderstorm intensities are reflected by the change in distance from a thunderstorm cloud point charge to an AEF apparatus. Thus, a matching relationship is established between the normalized distance and the thunderstorm dominant MD in the space domain. Finally, the rationality and reliability of the proposed method are verified by combining radar charts and expert experience. The results confirm that this method accurately characterizes the weather attributes and changes in the AEFS, and a negative distance-MD correlation is obtained for the first time. The detection of thunderstorm activity by AEF from the perspective of fuzzy set technology provides a meaningful guidance for interpretable thunderstorms.
The exponential increase in IoT device usage has spawned numerous cyberspace *** devices,sensors,and actuators bridge the gap between physical processes and the cyber network in a cyber-physical system(CPS).Cyber-phys...
详细信息
The exponential increase in IoT device usage has spawned numerous cyberspace *** devices,sensors,and actuators bridge the gap between physical processes and the cyber network in a cyber-physical system(CPS).Cyber-physical system is a complex system from a security perspective due to the heterogeneous nature of its components and the fact that IoT devices can serve as an entry point for *** adversaries design their attack strategies on systems to gain an advantage at a relatively lower cost,whereas abusive adversaries initiate an attack to inflict maximum damage without regard to cost or *** this paper,a sensor spoofing attack is modelled as a malicious adversary attempting to cause system failure by interfering with the feedback control *** is accomplished by feeding spoofed sensor values to the controller and issuing erroneous commands to the *** on a Simulink-simulated linear CPS support the proof of concept for the proposed abusive ideology,demonstrating three attack *** impact of the evaluations stresses the importance of testing the CPS security against adversaries with abusive settings for preventing ***,the research concludes by highlighting the limitations of the proposed work,followed by recommendations for the future.
This study focuses on the development of a dental problem detection device using the Inception V3 deep learning model and advanced data augmentation techniques. Dental problems such as cavities, impacted wisdom teeth,...
详细信息
Limited outdoor activities and inadequate exercise pose health risks that can contribute to cardiovascular diseases. Monitoring one’s body composition can be done by determining the body fat percentage (BF%), a good ...
详细信息
The fast development of technology has caused an alarming rise in electronic waste. Mismanaged electronic waste poses health risks for users and locals in the area. E-waste pollution can harm the environment and the c...
详细信息
Neural networks (NNs) have proven a useful surrogate model for the design and optimization of high frequency structures including antennas. Black-box NNs are known to have scalability and accuracy problems as the dime...
详细信息
Deepfake has emerged as an obstinate challenge in a world dominated by ***,the authors introduce a new deepfake detection method based on Xception *** model is tested exhaustively with millions of frames and diverse v...
详细信息
Deepfake has emerged as an obstinate challenge in a world dominated by ***,the authors introduce a new deepfake detection method based on Xception *** model is tested exhaustively with millions of frames and diverse video clips;accuracy levels as high as 99.65%are *** are the main reasons for such high efficacy:superior feature extraction capabilities and stable training mechanisms,such as early stopping,characterizing the Xception *** methodology applied is also more advanced when it comes to data preprocessing steps,making use of state-of-the-art techniques applied to ensure constant *** an ever-rising threat from fake media,this piece of research puts great emphasis on stringent memory testing to keep at bay the spread of manipulated *** also justifies better explanation methods to justify the reasoning done by the model for those decisions that build more trust and *** ensemble models being more accurate have been studied and examined for establishing a possibility of combining various detection frameworks that could together produce superior ***,the study underlines the need for real-time detection tools that can be effective on different social media sites and digital ***,protecting privacy,and public awareness in the fight against the proliferation of deepfakes are important *** significantly contributing to the advancements made in the technology that has actually advanced detection,it strengthens the safety and integrity of the cyber world with a robust defense against ever-evolving deepfake threats in ***,the findings generally go a long way to prove themselves as the crucial step forward to ensuring information authenticity and the trustworthiness of society in this digital world.
This research allows the secure surveillance approach for the Internet of Things (IoT) methodology to be developed by integrating wireless signalling and image encryption strategy. Since the Cloud Service Telco (CST) ...
详细信息
This paper shows how the design of switching power converters at the component level can be assisted by data-driven, automated, systematic methods. This work uses regression machine learning (ML) techniques, where pre...
详细信息
暂无评论