The growing risk of cyber-attacks and information vulnerability has become a major problem in today's dynamic digital environment. The necessity for strong security solutions is more critical than ever due to the ...
详细信息
Lattice structures with excellent physical properties have attracted great research *** this paper,a novel volume parametric modeling method based on the skeleton model is proposed for the construction of threedimensi...
详细信息
Lattice structures with excellent physical properties have attracted great research *** this paper,a novel volume parametric modeling method based on the skeleton model is proposed for the construction of threedimensional lattice *** skeleton model is divided into three types of *** the corresponding algorithms are utilized to construct diverse types of volume parametric *** unit-cell is assembled with distinct nodes according to the geometric *** final lattice structure is created by the periodic arrangement of *** different types of volume parametric lattice structures are constructed to prove the stability and applicability of the proposed *** quality is assessed in terms of the value of the Jacobian ***,the volume parametric lattice structures are tested with the isogeometric analysis to verify the feasibility of integration of modeling and simulation.
In this paper, we introduce a systematic design of an end-to-end cyber-secure monitoring and safe operation framework for solar photovoltaic (PV)-rich microgrids, by focusing on the use of on-line attack detector for ...
详细信息
Increasing use of autonomous drones in such areas as agriculture, disaster response and surveillance means that an effective and precise method of object recognition is becoming more important. In this study, we use C...
详细信息
Variability in staining protocols, such as different slide preparation techniques, chemicals, and scanner configurations, can result in a diverse set of whole slide images (WSIs). This distribution shift can negativel...
详细信息
Distractors are widely used in tasks such as reading comprehension and subject education. Generating high-quality distractors automatically poses a challenging task. Existing frameworks for generating distractors in t...
详细信息
Assistive devices for disabled people with the help of Brain-computer Interaction(BCI)technology are becoming vital bio-medical *** with physical disabilities need some assistive devices to perform their daily *** the...
详细信息
Assistive devices for disabled people with the help of Brain-computer Interaction(BCI)technology are becoming vital bio-medical *** with physical disabilities need some assistive devices to perform their daily *** these devices,higher latency factors need to be addressed ***,the main goal of this research is to implement a real-time BCI architecture with minimum latency for command *** proposed architecture is capable to communicate between different modules of the system by adopting an automotive,intelligent data processing and classification ***-sky mind wave device has been used to transfer the data to our implemented server for command ***-Net Convolutional Neural Network(TN-CNN)architecture has been proposed to recognize the brain signals and classify them into six primary mental states for data *** collection and processing are the responsibility of the central integrated server for system load *** of implemented architecture and deep learning model shows excellent *** proposed system integrity level was the minimum data loss and the accurate commands processing *** training and testing results are 99%and 93%for custom model implementation based on *** proposed real-time architecture is capable of intelligent data processing unit with fewer errors,and it will benefit assistive devices working on the local server and cloud server.
Anomaly detection is a foundational yet difficult problem in machine learning. In this work, we propose a new and effective framework, dubbed as SLA 2 P, for unsupervised anomaly detection. Following the extraction of...
详细信息
Anomaly detection is a foundational yet difficult problem in machine learning. In this work, we propose a new and effective framework, dubbed as SLA 2 P, for unsupervised anomaly detection. Following the extraction of delegate embeddings from raw data, we implement random projections on the features and consider features transformed by disparate projections as being associated with separate pseudo-classes. We then train a neural network for classification on these transformed features to conduct self-supervised learning. Subsequently, we introduce adversarial disturbances to the modified attributes, and we develop anomaly scores built on the classifier's predictive uncertainties concerning these disrupted features. Our approach is motivated by the fact that as anomalies are relatively rare and decentralized, 1) the training of the pseudo-label classifier concentrates more on acquiring the semantic knowledge of regular data instead of anomalous data; 2) the altered attributes of the normal data exhibit greater resilience to disturbances compared to those of the anomalous data. Therefore, the disrupted modified attributes of anomalies can not be well classified and correspondingly tend to attain lesser anomaly scores. The results of experiments on various benchmark datasets for images, text, and inherently tabular data demonstrate that SLA 2 P achieves state-of-the-art performance consistently.
Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error *** CIM, at least two different IM operations con...
详细信息
Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error *** CIM, at least two different IM operations construct a super IM operation or achieve new functionality. First, we propose a OFDM with generalized CIM(OFDM-GCIM) scheme to achieve a joint IM of subcarrier selection and multiple-mode(MM)permutations by using a multilevel digital ***, two schemes, called double CIM(D-CIM) and multiple-layer CIM(M-CIM), are proposed for secure communication, which combine new IM operation for disrupting the original order of bits and symbols with conventional OFDM-IM, to protect the legitimate users from eavesdropping in the wireless communications. A subcarrier-wise maximum likelihood(ML) detector and a low complexity log-likelihood ratio(LLR) detector are proposed for the legitimate users. A tight upper bound on the bit error rate(BER) of the proposed OFDM-GCIM, D-CIM and MCIM at the legitimate users are derived in closed form by employing the ML criteria detection. computer simulations and numerical results show that the proposed OFDM-GCIM achieves superior error performance than OFDM-IM, and the error performance at the eavesdroppers demonstrates the security of D-CIM and M-CIM.
暂无评论