In road surface crack segmentation algorithms, obtaining comprehensive contextual information is crucial. While many solutions use the Transformer architecture for global information, its computational complexity requ...
详细信息
The efficiency of manual assembly can be significantly improved by utilizing assistance systems that display assembly instructions. However, generating and maintaining these instructions require substantial effort, es...
详细信息
With the development of the internet, social software and media have become ubiquitous, making images increasingly important in daily life. The dissemination of a large number of images on social networks has made inf...
详细信息
To suppress the resonance in an LCL filter, the passive damping method is often favored over the active damping due to its simplicity and robustness. However, the passive damping suffers from decreasing LCL filter'...
详细信息
Freshwater harmful algal blooms (HABs) pose significant ecological and public health risks worldwide. Detecting HABs soon after they form is critical to managing the damage they cause. While in-situ measurements are m...
详细信息
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ...
详细信息
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware *** study provides a new approach for RaaS attack detection which uses an ensemble of deep learning *** this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is *** the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are ***,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested *** proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%*** empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual *** expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats.
To enhance the efficiency of motion planning, we introduce a new angle profile searching method known as Progressive Dynamic Local Search (PDLS). Building upon a collision-free multi-segment path established by the RS...
详细信息
The research combines Deep Q-Learning(DQN) with a Mininet-based network simulation and Scapy intrusions detection system (IDS) for malicious traffic prioritizing. The RL agent continuously learns to act based on real-...
详细信息
Fog computing is an emerging paradigm that extends cloud computing (CC) by providing computation, communication, and storage services at the edge of a network, closer to end devices. It has gained significance due to ...
详细信息
Fog computing is an emerging paradigm that extends cloud computing (CC) by providing computation, communication, and storage services at the edge of a network, closer to end devices. It has gained significance due to the rapid development of IoT devices, which generate various types of tasks. Processing these tasks in the cloud can strain its infrastructure and lead to delays in time-sensitive requests. To address this limitation, fog computing (FC) concepts were introduced in 2012 by Cisco. FC is not meant to replace CC but rather to complement and extend its capabilities. One of the challenges in FC is efficiently assigning tasks to appropriate resources to minimize makespan, energy consumption (EC), and increase the number of deadline-satisfied tasks. In this work, the improvement of semi-greedy algorithm has been done by incorporating fuzzy logic (FL). By leveraging FL, the aim is to enhance the algorithm's decision-making process and make it more adaptive to varying conditions and uncertainties in the fog environment. The use of FL allows more nuanced and flexible task scheduling (TS) decisions based on fuzzy sets and fuzzy rules. The simulation experiments demonstrate that the proposed algorithm outperforms PSG (Priority-aware Semi-Greedy) and PSG-M (PSG with multistart), which were identified as the best scheduling algorithms (Algos) in the literature review. The algorithm exhibits better performance in terms of reducing makespan, EC, and increasing the percentage of deadline-satisfied tasks compared to PSG and PSG-M. The inclusion of FL further enhances the algorithm's effectiveness in handling complex scheduling scenarios in a FC environment. To evaluate the performance of the proposed algorithm, different simulation experiments have been conducted using a selected simulator after a systematic review of existing simulators. The experiments involved 300 and 500 random and static tasks, as well as 60 fog nodes in the fog environment. All simulations were impl
Reinforcement Learning (RL) is a promising approach for creating adaptive solutions for robotic tasks that are difficult to design directly. Unlike traditional approaches that rely on designing explicit behaviors, RL ...
详细信息
暂无评论