This paper focuses on the utilization of hesitant and intuitionistic fuzzy sets (HFS & IFS) in a computational intelligent approach, mainly for decision modelling under complex vague surroundings. Indeed, classica...
详细信息
Scandium(Sc)is recognized as a“strategic”and“critical”element by several countries,including the *** Russia,owing to its wide range of applications in high-tech fields such as superconductivity,alloys,lasers,nucle...
详细信息
Scandium(Sc)is recognized as a“strategic”and“critical”element by several countries,including the *** Russia,owing to its wide range of applications in high-tech fields such as superconductivity,alloys,lasers,nuclear energy,and aerospace[1].
The primary objective of this research is to get a comprehensive understanding of Cloud Computing ontologies, their applications, and their specific areas of interest. The proposed research methodology for this system...
详细信息
Machine learning-based network intrusion detection systems(ML-NIDS) are extensively used for network security against unknown attacks. Existing intrusion detection systems can effectively defend traditional network at...
详细信息
Machine learning-based network intrusion detection systems(ML-NIDS) are extensively used for network security against unknown attacks. Existing intrusion detection systems can effectively defend traditional network attacks, however, they face AI based threats. The current known AI attacks cannot balance the escape rate and attack effectiveness. In addition, the time cost of existing AI attacks is very high. In this paper, we propose a backdoor attack called VulnerGAN, which features high concealment,high aggressiveness, and high timeliness. The backdoor can make the specific attack traffic bypass the detection of ML-NIDS without affecting the performance of ML-NIDS in identifying other attack *** uses generative adversarial networks(GAN) to calculate poisoning and adversarial samples based on machine learning model vulnerabilities. It can make traditional network attack traffic escape black-box online ML-NIDS. At the same time, model extraction and fuzzing test are used to enhance the convergence of VulnerGAN. Compared with the state-of-the-art algorithms, the VulnerGAN backdoor attack increases33.28% in concealment, 18.48% in aggressiveness, and 46.32% in timeliness.
The quadrature modulator is a crucial block in transmitters that upconverts baseband signals to theRadio Frequency(RF)band of interest using local oscillator *** this paper,non-ideal factors thatinfluence the performa...
详细信息
The quadrature modulator is a crucial block in transmitters that upconverts baseband signals to theRadio Frequency(RF)band of interest using local oscillator *** this paper,non-ideal factors thatinfluence the performance of the quadrature modulator are considered,and solutions are accordingly taken inthe quadrature modulator design.A high-linear RF quadrature modulator with improved sideband suppressionand carrier leakage performance is presented in this *** quadrature modulator implemented in the0.18-μm SiGe process uses the current bleeding technique to improve the general performance of the doublebalanced active Gilbert *** on-chip prescaler followed by two cascaded limiting amplifiers is designed toprovide accurate quadrature local oscillator *** at quadrature baseband signal input ports areproposed to eliminate DC *** measured sideband suppression achieves a performance of better than−43 dBc and carrier leakage is less than−38 dBm over the output RF frequency range of 30 MHz to 2.15 *** output 1 dB compression point equals 11.4 dBm at 800 MHz.
In this paper the challenge of human decision-making (HDM) modeling by gambling task is targeted, specifically focusing on the Iowa Gambling Task (IGT). Traditional models train on data generated during gameplay, wher...
详细信息
In a country like India, where most of the income depends on agriculture, it is challenging to rely only on soil-based agriculture in the future. These days, soil-based agriculture faces several difficulties, includin...
详细信息
One of the most rapidly developing technologies that helps reduce the amount of work done by humans is known as 'home automation.' People who are looking for luxury and sophisticated home automation platforms ...
详细信息
Highway traffic optimization through vehicle platooning presents a promising avenue for improving road capacity and energy conservation. Leveraging Vehicular Ad Hoc Networks (VANETs) technology, particularly in the co...
详细信息
Sentiment analysis is still in its developing era, and sometimes, struggles are faced in evaluating user sentiment due to the use of traditional models to analyze the relationship structures in social media interactio...
详细信息
暂无评论