With the onset of technological advancements, biosensors are being effectively used in a variety of contexts, including the diagnosis of diseases, the promotion of their prevention and rehabilitation, the monitoring o...
详细信息
There are increasing concerns about malicious attacks on autonomous vehicles. In particular, inaudible voice command attacks pose a significant threat as voice commands become available in autonomous driving systems. ...
详细信息
PV systems are increasingly encouraged, and different technologies are differentiated between them. This paper provides a comparison of a fixed PV system with the two-axis tracking PV system. Two-axis tracking, althou...
详细信息
In order to design and develop secure and reliable software, accurate prediction of software errors is crucial. The complex, nonlinear relationship between software features and bugs that occur during development desp...
详细信息
Many complex optimization problems in the real world can easily fall into local optimality and fail to find the optimal solution,so more new techniques and methods are needed to solve such *** algorithms have received...
详细信息
Many complex optimization problems in the real world can easily fall into local optimality and fail to find the optimal solution,so more new techniques and methods are needed to solve such *** algorithms have received a lot of attention in recent years because of their efficient performance and simple *** Cosine Algorithm(SCA)is a recent Metaheuristic algorithm that is based on two trigonometric functions Sine&***,like all other metaheuristic algorithms,SCA has a slow convergence and may fail in sub-optimal *** this study,an enhanced version of SCA named RDSCA is suggested that depends on two techniques:random spare/replacement and double adaptive *** first technique is employed in SCA to speed the convergence whereas the second method is used to enhance exploratory searching *** evaluate RDSCA,30 functions from CEC 2017 and 4 real-world engineering problems are ***,a nonparametric test called Wilcoxon signed-rank is carried out at 5%level to evaluate the significance of the obtained results between RDSCA and the other 5 variants of *** results show that RDSCA has competitive results with other metaheuristics algorithms.
The focal point of this work is to automatically detect metaphor instances in short texts. It is the study of extricating the most optimal features for the task by using a deep learning architecture and carefully hand...
详细信息
This paper presents the study on how to dimension the receiver's coil in resonant wireless power transfer system. One of the key features of the wireless power transfer system is the efficiency of the power transf...
详细信息
Recognition of human activities using wearable sensors is essential for applications related to health and well-being. However, the complex data captured by inertial sensors poses challenges in accurately identifying ...
详细信息
Routing is a key function inWireless Sensor Networks(WSNs)since it facilitates data transfer to base *** attacks have the potential to destroy and degrade the functionality ofWSNs.A trustworthy routing system is essen...
详细信息
Routing is a key function inWireless Sensor Networks(WSNs)since it facilitates data transfer to base *** attacks have the potential to destroy and degrade the functionality ofWSNs.A trustworthy routing system is essential for routing security andWSN *** methods have been implemented to build trust between routing nodes,including the use of cryptographic methods and centralized ***,the majority of routing techniques are unworkable in reality due to the difficulty of properly identifying untrusted routing node *** the moment,there is no effective way to avoid malicious node *** a consequence of these concerns,this paper proposes a trusted routing technique that combines blockchain infrastructure,deep neural networks,and Markov Decision Processes(MDPs)to improve the security and efficiency of WSN *** authenticate the transmission process,the suggested methodology makes use of a Proof of Authority(PoA)mechanism inside the blockchain *** validation group required for proofing is chosen using a deep learning approach that prioritizes each node’s *** are then utilized to determine the suitable next-hop as a forwarding node capable of securely transmitting *** to testing data,our routing system outperforms current routing algorithms in a 50%malicious node routing scenario.
Speech Emotion Recognition (SER) has become an indispensable part of human-computer interaction. In order to obtain a higher recognition rate, in this paper, a joint feature based on Philips fingerprint and spectral e...
详细信息
暂无评论