Major challenges are encountered in the design and construction of deep superhot (>300°C) geothermal wells due to higher temperatures and pressure, and increased corrosiveness of the geothermal fluid. The corr...
详细信息
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management cons...
详细信息
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management console *** the increased use of Industrial IoT(IIoT)applications,the risk of brutal cyber-attacks also *** leads researchers worldwide to work on developing effective Intrusion Detection Systems(IDS)for IoT infrastructure against any malicious ***,this paper provides effective IDS to detect and classify unpredicted and unpredictable severe attacks in contradiction to the IoT infrastructure.A comprehensive evaluation examined on a new available benchmark TON_IoT dataset is *** data-driven IoT/IIoT dataset incorporates a label feature indicating classes of normal and attack-targeting IoT/IIoT ***,this data involves IoT/IIoT services-based telemetry data that involves operating systems logs and IoT-based traffic networks collected from a realistic medium-scale IoT *** is to classify and recognize the intrusion activity and provide the intrusion detection objectives in IoT environments in an efficient ***,several machine learning algorithms such as Logistic Regression(LR),Linear Discriminant Analysis(LDA),K-Nearest Neighbors(KNN),Gaussian Naive Bayes(NB),Classification and Regression Tree(CART),Random Forest(RF),and AdaBoost(AB)are used for the detection intent on thirteen different intrusion *** performance metrics like accuracy,precision,recall,and F1-score are used to estimate the proposed *** experimental results show that the CART surpasses the other algorithms with the highest accuracy values like 0.97,1.00,0.99,0.99,1.00,1.00,and 1.00 for effectively detecting the intrusion activities on the IoT/IIoT infrastructure on most of the employed *** addition,the proposed work accomplishes high performance compared to other recent rela
Being largely utilized as alternative sources of energy, photovoltaic (PV) panels are being deployed in many locations. However, those panels are extensively being prone to faults. A careful detection and diagnosis of...
详细信息
This paper introduces a novel hybrid genetic algorithm combined with data mining to solve a version of the early/tardy scheduling problem in which no unforced idle time may be inserted in a sequence. The chromosome re...
详细信息
Many electronic infection detection systems often use binary classification techniques, which identify patient data as either pathology-indicating or normal in relation to different forms of infections. The Moni-ICU s...
详细信息
This paper examines a cutting-edge approach that melds backscatter modulation principles with a frequency modulated continuous wave (FMCW) radar system. Building upon radio-frequency identification (RFID) backscatter ...
详细信息
Technological progress has had a dramatic impact on the automotive industry and the concept of intelligent and connected vehicles is developing rapidly. Vehicles are being equipped with various in-vehicle and environm...
详细信息
computer vision(CV)was developed for computers and other systems to act or make recommendations based on visual inputs,such as digital photos,movies,and other *** learning(DL)methods are more successful than other tra...
详细信息
computer vision(CV)was developed for computers and other systems to act or make recommendations based on visual inputs,such as digital photos,movies,and other *** learning(DL)methods are more successful than other traditional machine learning(ML)methods *** techniques can produce state-of-the-art results for difficult CV problems like picture categorization,object detection,and face *** this review,a structured discussion on the history,methods,and applications of DL methods to CV problems is *** sector-wise presentation of applications in this papermay be particularly useful for researchers in niche fields who have limited or introductory knowledge of DL methods and *** review will provide readers with context and examples of how these techniques can be applied to specific areas.A curated list of popular datasets and a brief description of them are also included for the benefit of readers.
Establishing a sustainable the healthcare system necessitates the development of social, economic, and environmental norms. Although many studies concentrate on these elements separately, an integrated method of handl...
详细信息
Wireless Sensor Networks (WSNs) are essential for various applications, but their architecture makes them vulnerable to attacks. While traditional security methods like authentication and encryption offer some protect...
详细信息
暂无评论