The increased quality and human-likeness of AI generated texts has resulted in a rising demand for neural text detectors, i.e. software that is able to detect whether a text was written by a human or generated by an A...
详细信息
It is essential to achieve stable and high bandwidth communication in order to develop and evolve a variety of platforms, including ERP, video conferencing, VoIP, digital mobile radio, and automation of electric power...
详细信息
The application of Deep learning (DL) in wireless communications has achieved remarkable success. However, there are still marked challenges impeding its use in the physical layer, largely due to the random nature of ...
详细信息
In this paper we focus on the target capturing problem for a swarm of agents modelled as double integrators in any finite space *** agent knows the relative position of the target and has only an estimation of its vel...
详细信息
In this paper we focus on the target capturing problem for a swarm of agents modelled as double integrators in any finite space *** agent knows the relative position of the target and has only an estimation of its velocity and *** that the estimation errors are bounded by some known values,it is possible to design a control law that ensures that agents enter a user-defined ellipsoidal ring around the moving *** know the relative position of the other members whose distance is smaller than a common detection ***,in the case of no uncertainty about target data and homogeneous agents,we show how the swarm can reach a static configuration around the moving *** simulations are reported to show the effectiveness of the proposed strategy.
The target area of the research is the assessment of the mechanical excitation frequencies of three-phase asynchronous motors, primarily caused by bearing and shaft adjustment, and the understanding of the wear proces...
详细信息
In addition to its use in building and agriculture, global solar irradiance is one of the most critical aspects in designing and considering any solar station's volume. Because the Iraqi metrological organization ...
详细信息
This paper presents a numerical integration study for spherical near field (NF) to far field (FF) transformations. The trapezoidal and Simpson 1/3 numerical integration methods are employed in the NF to FF transformat...
详细信息
Visible light communication(VLC)has a paramount role in industrial implementations,especially for better energy efficiency,high speed-data rates,and low susceptibility to ***,since studies on VLC for industrial implem...
详细信息
Visible light communication(VLC)has a paramount role in industrial implementations,especially for better energy efficiency,high speed-data rates,and low susceptibility to ***,since studies on VLC for industrial implementations are in scarcity,areas concerning illumination optimisation and communication performances demand further *** such,this paper presents a new modelling of light fixture distribution for a warehouse model to provide acceptable illumination and communication *** proposed model was evaluated based on various semi-angles at half power(SAAHP)and different height levels for several parameters,including received power,signal to noise ratio(SNR),and bit error rate(BER).The results revealed improvement in terms of received power and SNR with 30 Mbps data *** modulations were studied to improve the link quality,whereby better average BER values of 5.55×10^(−15) and 1.06×10^(−10) had been achieved with 4 PAM and 8 PPM,*** simulation outcomes are indeed viable for the practical warehouse model.
Heterogeneous multicore systems, which consist of high-performance and power-efficient cores, are emerging to satisfy the various demands on performance and power consumption. On the other hand, as CMOS technology con...
详细信息
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the...
详细信息
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the challenges of security risks and data analysis *** IIoT grows,cyber-attacks become more diverse and complex,making existing anomaly detection models less effective to *** this paper,an ensemble deep learning model that uses the benefits of the Long Short-Term Memory(LSTM)and the AutoEncoder(AE)architecture to identify out-of-norm activities for cyber threat hunting in IIoT is *** this model,the LSTM is applied to create a model on normal time series of data(past and present data)to learn normal data patterns and the important features of data are identified by AE to reduce data *** addition,the imbalanced nature of IIoT datasets has not been considered in most of the previous literature,affecting low accuracy and *** solve this problem,the proposed model extracts new balanced data from the imbalanced datasets,and these new balanced data are fed into the deep LSTM AE anomaly detection *** this paper,the proposed model is evaluated on two real IIoT datasets-Gas Pipeline(GP)and Secure Water Treatment(SWaT)that are imbalanced and consist of long-term and short-term dependency on *** results are compared with conventional machine learning classifiers,Random Forest(RF),Multi-Layer Perceptron(MLP),Decision Tree(DT),and Super Vector Machines(SVM),in which higher performance in terms of accuracy is obtained,99.3%and 99.7%based on GP and SWaT datasets,***,the proposed ensemble model is compared with advanced related models,including Stacked Auto-Encoders(SAE),Naive Bayes(NB),Projective Adaptive Resonance Theory(PART),Convolutional Auto-Encoder(C-AE),and Package Signatures(PS)based LSTM(PS-LSTM)model.
暂无评论