Surrogate-assisted evolutionary algorithms (SAEAs) are recently among the most widely studied methods for their capability to solve expensive real-world optimization problems. However, the development of new methods a...
详细信息
The human body is not able to detect whether the air is polluted or not, which is why it is important to have a device that can measure the air quality, both in the closed environment and in nature. Thus, air pollutio...
详细信息
Scalability has grown more important as blockchain technology is adopted. This study introduces RSA-accumulator-based stateless blockchain performance optimization. Verifiable computing technology and distributed desi...
详细信息
1 Introduction and main contributions Template-based approaches have achieved significant progress in low-resource neural machine translation(NMT)recently[1],such as the efficient works,NMT-GTM[2],SoftPrototype[3],***...
详细信息
1 Introduction and main contributions Template-based approaches have achieved significant progress in low-resource neural machine translation(NMT)recently[1],such as the efficient works,NMT-GTM[2],SoftPrototype[3],***,most previous works only retrieve target sentence as template to generate translation,neglecting the utilization of linguistic feature that contained in the source sentence and template.
Pilot-operated solenoid valves have the advantage of fast response times and can meet high pressure and large diameter requirements through their structural characteristics, making them widely used in various fields. ...
详细信息
The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of *** interconnectivity of networks has brought various complexities in maintaining network availabi...
详细信息
The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of *** interconnectivity of networks has brought various complexities in maintaining network availability,consistency,and *** learning based intrusion detection systems have become essential to monitor network traffic for malicious and illicit *** intrusion detection system controls the flow of network traffic with the help of computer *** deep learning algorithms in intrusion detection systems have played a prominent role in identifying and analyzing intrusions in network *** this purpose,when the network traffic encounters known or unknown intrusions in the network,a machine-learning framework is needed to identify and/or verify network *** Intrusion detection scheme empowered with a fused machine learning technique(IDS-FMLT)is proposed to detect intrusion in a heterogeneous network that consists of different source networks and to protect the network from malicious *** proposed IDS-FMLT system model obtained 95.18%validation accuracy and a 4.82%miss rate in intrusion detection.
As a typical underactuated experimental platform for robotics and control theory, the rotary inverted pendulum (RIP) system is nonlinear, multi-variable, and strongly coupled. We study the swing-up and balance control...
详细信息
Strong stabilization refers to designing stable feedback controllers that stabilize a given plant. The second-order stable stabilizing controller design of two-link underactuated planar robots around their UEP (Uprigh...
详细信息
In this paper, we study the swing-down control of a rings gymnastic robot, which is a 3-link planar robot moving in a vertical plane with only the last joint being actuated. The control objective is to swing the rings...
详细信息
In this paper, we study the trajectory planning and tracking control for the Pendubot, which is a two-link robot has a single actuator at the base joint of the first link. We realize a fast swing-down control under th...
详细信息
暂无评论