Anemia is a state of bad health condition where there is the presence of a low amount of red blood cells in the blood. We aim to build a simple Anemia prediction Web Application, that predicts whether a patient is ane...
详细信息
In general, data traffic volume is significant in sensor networks, and communication often occurs with variable capacity during early forest fire detection using Wireless Sensor Networks (WSN). Initially, optimal rout...
详细信息
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has ex...
详细信息
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has expanded the potential targets that hackers might *** adequate safeguards,data transmitted on the internet is significantly more susceptible to unauthorized access,theft,or *** identification of unauthorised access attempts is a critical component of cybersecurity as it aids in the detection and prevention of malicious *** research paper introduces a novel intrusion detection framework that utilizes Recurrent Neural Networks(RNN)integrated with Long Short-Term Memory(LSTM)*** proposed model can identify various types of cyberattacks,including conventional and distinctive *** networks,a specific kind of feedforward neural networks,possess an intrinsic memory *** Neural Networks(RNNs)incorporating Long Short-Term Memory(LSTM)mechanisms have demonstrated greater capabilities in retaining and utilizing data dependencies over extended *** such as data types,training duration,accuracy,number of false positives,and number of false negatives are among the parameters employed to assess the effectiveness of these models in identifying both common and unusual *** are utilised in conjunction with LSTM to support human analysts in identifying possible intrusion events,hence enhancing their decision-making capabilities.A potential solution to address the limitations of Shallow learning is the introduction of the Eccentric Intrusion Detection *** model utilises Recurrent Neural Networks,specifically exploiting LSTM *** proposed model achieves detection accuracy(99.5%),generalisation(99%),and false-positive rate(0.72%),the parameters findings reveal that it is superior to state-of-the-art techniques.
Classical machine learning has practical significant advancements and extensive acceptance across various domains, enabling the growth of precise predictive models. The purpose of this work is to examine the accuracy ...
详细信息
In the age of smart era, usage of IoT devices is inevitable. As the number of IoT devices increases, the amount of data they generate also increases, which in turn leads to security breaches. Continuous monitoring thr...
详细信息
As wafer circuit width shrinks down to less than ten nanometers in recent years,stringent quality control in the wafer manufacturing process is increasingly *** to the coupling of neighboring cluster tools and coordin...
详细信息
As wafer circuit width shrinks down to less than ten nanometers in recent years,stringent quality control in the wafer manufacturing process is increasingly *** to the coupling of neighboring cluster tools and coordination of multiple robots in a multi-cluster tool,wafer production scheduling becomes rather *** a wafer is processed,due to high-temperature chemical reactions in a chamber,the robot should be controlled to take it out of the processing chamber at the right *** order to ensure the uniformity of integrated circuits on wafers,it is highly desirable to make the differences in wafer post-processing time among the individual tools in a multicluster tool as small as *** achieve this goal,for the first time,this work aims to find an optimal schedule for a dual-arm multi-cluster tool to regulate the wafer post-processing *** do so,we propose polynomial-time algorithms to find an optimal schedule,which can achieve the highest throughput,and minimize the total post-processing time of the processing *** propose a linear program model and another algorithm to balance the differences in the post-processing time between any pair of adjacent cluster *** industrial examples are given to illustrate the application and effectiveness of the proposed method.
IoT and AI created a Transportation Management System, resulting in the Internet of Vehicles. Intelligent vehicles are combined with contemporary communication technologies (5G) to achieve automated driving and adequa...
详细信息
The shape of airfoil contributes to the performance of the airfoil itself. Elastic deformation during unsteady motion not only generates vortices with larger vorticity, but also enables the generation of sustained dyn...
详细信息
This paper introduces an innovative approach for the description and mapping of applications in the smart grid domain. By utilizing a skill-based engineering approach, not only flexibility and changeability will incre...
详细信息
Empowering each vehicle with four dimensional (4D) situational awareness, i.e., accurate knowledge of neighboring vehicles' 3D locations over time in a cooperative manner (instead of focusing only on self-localiza...
详细信息
Empowering each vehicle with four dimensional (4D) situational awareness, i.e., accurate knowledge of neighboring vehicles' 3D locations over time in a cooperative manner (instead of focusing only on self-localization), is fundamental for improving autonomous driving performance in diverse traffic conditions. For this task, identification, localization and tracking of nearby road users is critical for enhancing safety, motion planning and energy consumption of automated vehicles. Advanced perception sensors as well as communication abilities, enable the close collaboration of moving vehicles and other road users, and significantly increase the positioning accuracy via multi-modal sensor fusion. The challenge here is to actually match the extracted measurements from perception sensors with the correct vehicle ID, through data association. In this paper, two novel and distributed Cooperative Localization or Awareness algorithms are formulated, based on linear least-squares minimization and the celebrated Kalman Filter. They both aim to improve ego vehicle's 4D situational awareness, so as to be fully location aware of its surrounding and not just its own position. For that purpose, ego vehicle forms a star like topology with its neighbors, and fuses four types of multi-modal inter-vehicular measurements (position, distance, azimuth and inclination angle) via the linear Graph Laplacian operator and geometry capturing differential coordinates. Moreover, a data association strategy has been integrated to the algorithms as part of the identification process, which is shown to be much more beneficial than traditional Hungarian algorithm. An extensive experimental study has been conducted in CARLA, SUMO and Artery simulators, highlighting the benefits of the proposed methods in a variety of experimental scenarios, and verifying increased situational awareness ability. The proposed distributed approaches offer high positioning accuracy, outperforming other state-of-the-art c
暂无评论