In this paper, design and modeling of an all-optical 2×1 multiplexer based on 2D photonic crystals and artificial neural networks (ANNs) are presented. The proposed structure aims to maximize the difference betwe...
详细信息
Renewable energy is created by renewable natural resources such as geothermal heat,sunlight,tides,rain,and *** resources are vital for all countries in terms of their economies and *** a result,selecting the optimal o...
详细信息
Renewable energy is created by renewable natural resources such as geothermal heat,sunlight,tides,rain,and *** resources are vital for all countries in terms of their economies and *** a result,selecting the optimal option for any country is critical in terms of energy *** country is nowadays planning to increase the share of renewable energy in their universal energy sources as a result of global *** the present work,the authors suggest fuzzy multi-characteristic decision-making approaches for renew-able energy source selection,and fuzzy set theory is a valuable methodology for dealing with uncertainty in the presence of incomplete or ambiguous *** study employed a hybrid method for order of preference by resemblance to an ideal solution based on fuzzy analytical network process-technique,which agrees with professional assessment scores to be linguistic phrases,fuzzy numbers,or crisp *** hybrid methodology is based on fuzzy set ideologies,which calculate alternatives in accordance with professional functional requirements using objective or subjective *** best-suited renewable energy alternative is discovered using the approach presented.
The Internet of Things (IoT) seeks to establish a vast network comprising billions of interconnected devices to enable seamless data exchange and intelligent interactions between people and objects. This network is ch...
详细信息
Potential malicious cyber-attacks to power systems which are connected to a wide range of stakeholders from the top to tail will impose significant societal risks and *** timely detection and defense are of crucial im...
详细信息
Potential malicious cyber-attacks to power systems which are connected to a wide range of stakeholders from the top to tail will impose significant societal risks and *** timely detection and defense are of crucial importance for safe and reliable operation of cyber-physical power systems(CPPSs).This paper presents a comprehensive review of some of the latest attack detection and defense ***,the vulnerabilities brought by some new information and communication technologies(ICTs)are analyzed,and their impacts on the security of CPPSs are *** malicious cyber-attacks on cyber and physical layers are then analyzed within CPPSs framework,and their features and negative impacts are ***,two current mainstream attack detection methods including state estimation based and machine learning based methods are analyzed,and their benefits and drawbacks are ***,two current mainstream attack defense methods including active defense and passive defense methods are comprehensively ***,the trends and challenges in attack detection and defense strategies in CPPSs are provided.
The Integrated Sensing and Communication (ISAC) system merged with Reconfigurable Intelligent Surface (RIS) has recently received much attention. This paper proposes an intelligent metaheuristic version of Enhanced Ar...
详细信息
Nowadays,cloud computing provides easy access to a set of variable and configurable computing resources based on user demand through the *** computing services are available through common internet protocols and netwo...
详细信息
Nowadays,cloud computing provides easy access to a set of variable and configurable computing resources based on user demand through the *** computing services are available through common internet protocols and network standards.n addition to the unique benefits of cloud computing,insecure communication and attacks on cloud networks cannot be *** are several techniques for dealing with network *** this end,network anomaly detection systems are widely used as an effective countermeasure against network *** anomaly-based approach generally learns normal traffic patterns in various ways and identifies patterns of *** anomaly detection systems have gained much attention in intelligently monitoring network traffic using machine learning *** paper presents an efficient model based on autoencoders for anomaly detection in cloud computing *** autoencoder learns a basic representation of the normal data and its reconstruction with minimum ***,the reconstruction error is used as an anomaly or classification *** addition,to detecting anomaly data from normal data,the classification of anomaly types has also been *** have proposed a new approach by examining an autoencoder's anomaly detection method based on data reconstruction *** the existing autoencoder-based anomaly detection techniques that consider the reconstruction error of all input features as a single value,we assume that the reconstruction error is a *** enables our model to use the reconstruction error of every input feature as an anomaly or classification *** further propose a multi-class classification structure to classify the *** use the CIDDS-001 dataset as a commonly accepted dataset in the *** evaluations show that the performance of the proposed method has improved considerably compared to the existing ones in terms of accuracy,recall,false-positive rate,and F1-score
This paper considers the problem of platooning control of connected automated vehicles under cyber-attacks. Specifically, the attacker aims to prevent the follower vehicle from maintaining a pre-defined safe distance ...
详细信息
Brain MRI makes it possible to evaluate brain tumor diagnosis and treatment. There are, however, many challenges for automated brain tumor segmentation, and these challenges have become tougher as deep learning has pr...
详细信息
This research proposes a tagging antenna sensor for permittivity detection of solid materials based on a close quarter approach. The sensor is proposed to operate at a frequency of 2.53 GHz using a single port resonat...
详细信息
Robots are increasingly being deployed in densely populated environments, such as homes, hotels, and office buildings, where they rely on explicit instructions from humans to perform tasks. However, complex tasks ofte...
详细信息
Robots are increasingly being deployed in densely populated environments, such as homes, hotels, and office buildings, where they rely on explicit instructions from humans to perform tasks. However, complex tasks often require multiple instructions and prolonged monitoring, which can be time-consuming and demanding for users. Despite this, there is limited research on enabling robots to autonomously generate tasks based on real-life scenarios. Advanced intelligence necessitates robots to autonomously observe and analyze their environment and then generate tasks autonomously to fulfill human requirements without explicit commands. To address this gap, we propose the autonomous generation of navigation tasks using natural language dialogues. Specifically, a robot autonomously generates tasks by analyzing dialogues involving multiple persons in a real office environment to facilitate the completion of item transportation between various *** propose the leveraging of a large language model(LLM) through chain-of-thought prompting to generate a navigation sequence for a robot from dialogues. We also construct a benchmark dataset consisting of 625 multiperson dialogues using the generation capability of LLMs. Evaluation results and real-world experiments in an office building demonstrate the effectiveness of the proposed method.
暂无评论