Multi-Source cross-lingual transfer learning deals with the transfer of task knowledge from multiple labelled source languages to an unlabeled target language under the language shift. Existing methods typically focus...
详细信息
Metasurfaces have become one of the most prominent research topics in the field of optics owing to their unprecedented properties and novel applications on an ultrathin platform. By combining graphene with metasurface...
详细信息
Continuum robots can be miniaturized to just a few millimeters in diameter. Among these, notched tubular continuum robots (NTCR) show great potential in many delicate applications. Existing works in robotic modeling f...
详细信息
An intrusion detection system is a software programme or hardware that keeps an eye out for malicious activities or policy breaches on a network or in a system. Any intrusion activity or violation is often recorded ce...
详细信息
ISBN:
(纸本)9781665489638
An intrusion detection system is a software programme or hardware that keeps an eye out for malicious activities or policy breaches on a network or in a system. Any intrusion activity or violation is often recorded centrally using a security information and event management system, alerted to an administrator, or both. Cyber physical systems link physical infrastructure and things to the internet and to one another by integrating sensing, computing, control, and networking into them. As a result, cyber assaults on the cyber-physical system can make the devices malfunction, and adequate intrusion detection is needed to protect the system. An essential tool for detecting network intrusion is a honeypot. Honeypots not only engage the attacker but also collect information that may be used to understand attacks and attackers on the network. As a result, the aim of the paper is to construct honeypot to catch attacks. Once an intrusion caused by the attacker is caught, the process of assaulting the system is stopped. The logs are also recorded so that network activity can be properly analysed.
Pseudorange errors are the root cause of localization inaccuracy in GPS. Previous data-driven methods regress and eliminate pseudorange errors using handcrafted intermediate labels. Unlike them, we propose an end-to-e...
详细信息
Image-based systems have gained popularity owing to their capacity to provide rich manufacturing status information, low implementation costs, and high acquisition rates. However, the complexity of the image backgroun...
详细信息
With the widespread utilization of solar photovoltaics (PV), it is becoming increasingly important to understand its performance using various configurations to harvest solar energy at the most suitable efficiency, sp...
详细信息
Eco-driving reduces gas use. Eco-driving improves driving behavior and fuel economy without hardware modifications. Eco-driving strategies exist. Speed control is difficult in many driving conditions. This research de...
详细信息
Dynamically detecting battery chemistries, including LiFePO4, Ni-MH, and Lead Acid, is explored through extensive simulations. Utilizing discharge curves as training data, three neural network architectures-Single Hid...
Dynamically detecting battery chemistries, including LiFePO4, Ni-MH, and Lead Acid, is explored through extensive simulations. Utilizing discharge curves as training data, three neural network architectures-Single Hidden Layer, Double Hidden Layer, and Radial Basis Transfer Function-are employed for pattern recognition across diverse discharge profiles. The objective is to enable the identification of connected battery types and optimize charging control. This research holds significance in real-time Electric Vehicle (EV) charging optimization, offering the capability to discern various battery chemistries. Additionally, in Peer-to-Peer (P2P) energy markets, the dynamic contribution of batteries to the grid requires safe and efficient charging for interoperable systems. The findings presented in this study introduce adaptable systems, fostering innovation in sustainable energy practices.
Water caustics are commonly observed in seafloor imaging data from shallow-water areas. Traditional methods that remove caustic patterns from images often rely on 2D filtering or pre-training on an annotated dataset, ...
详细信息
暂无评论