The main objective of this work is to develop novel fault diagnosis techniques using ensemble learning and multivariate statistical techniques. The proposed methods are capable of identifying and classifying PV faults...
详细信息
This project is designed to recognize face masks on an image using TensorFlow, Keras machine learning tools, YOLO-based Convolutional Neural Network family of models and a selection of 852 photos. This technology will...
详细信息
This study addresses the problem of maximizing the power consumption of IoT (Internet of Things) devices while protecting them against cyberattacks. A layered architecture can be useful for addressing the unique chall...
详细信息
ISBN:
(数字)9798350330946
ISBN:
(纸本)9798350330953
This study addresses the problem of maximizing the power consumption of IoT (Internet of Things) devices while protecting them against cyberattacks. A layered architecture can be useful for addressing the unique challenges of security and energy efficiency in IoT systems. To this end, we propose a secure and energy-efficient cross-layer framework for IoT applications. The proposed cross-layer framework is based on collaboration among physical (sensor), network, and application layers. We examine the need for a three-layered approach in achieving the balance between security and energy efficiency. The proposed approach aims to provide a major leap in the areas of security and energy efficiency in IoT deployments. The system performance is validated by test-bed measurements with a focus on resource-constrained IoT settings. Using Cooja simulator we assess application-layer vulnerabilities and energy efficiency. The findings reported in this paper provide some insights into the design and deployment of IoT systems using a cross-layer design approach.
High-resolution point clouds (HRPCD) anomaly detection (AD) plays a critical role in precision machining and high-end equipment manufacturing. Despite considerable 3D-AD methods that have been proposed recently, they ...
详细信息
Embedded applications are commonly used in different fields. Different kinds vulnerabilities can occur in embedded systems because of various reasons such as coding bugs or security attacks. Most of security vulnerabi...
Embedded applications are commonly used in different fields. Different kinds vulnerabilities can occur in embedded systems because of various reasons such as coding bugs or security attacks. Most of security vulnerabilities can occur during coding phase of an embedded application. During the design phase of a program, different types of coding bugs can be inserted to executable. On the other hand, even if the executable program is very well coded, many different kinds of vulnerabilities can also occur at runtime. In this thesis, we aim to provide a security application which controls integrity of running program in computer. Executable binary of a program consists of data and text sections. CPU fetches and executes instructions in the text section of a program. Each instruction block is firstly placed into instruction cache of CPU. Instruction block hashes are generated after compiler phase of a program. Then, during the runtime phase instruction block hashes are recalculated and compared with compiler phase hash. We aim to prevent running of a corrupted or manipulated program during runtime phase.
As anxiety becomes increasingly prevalent among youths especially university students, early prevention via anxiety disorder profiling is crucial. Nevertheless, most screening tools to date are not automated, labour-i...
详细信息
A chaotic system is a highly volatile system characterized by its sensitive dependence on initial conditions and outside factors. Chaotic systems are prevalent throughout the world today: in weather patterns, disease ...
详细信息
The deterioration of transmission lines has a profound effect on the reliability and safety of the power grid. Accurate estimation of their age is critical for effective maintenance and investment planning. This paper...
详细信息
ISBN:
(数字)9788986510225
ISBN:
(纸本)9798350353877
The deterioration of transmission lines has a profound effect on the reliability and safety of the power grid. Accurate estimation of their age is critical for effective maintenance and investment planning. This paper proposes a method that combines the percentage statistical health index (%SHI) with failure probability curve-fitting (FPCF) to estimate the ages of overhead transmission lines. %SHI assesses equipment condition through scoring and weighting, while FPCF correlates SHI with the probability of failure. Evaluation of 924 towers situated in various terrains across Thailand reveals discrepancies between estimated and actual ages, influenced by environmental factors. To enhance reliability, proactive maintenance strategies such as regular inspections and advanced monitoring are recommended.
In classical broadcasting, a piece of information must be transmitted to all entities of a network as quickly as possible, starting from a particular member. Since this problem has an enormous number of applications a...
详细信息
In classical broadcasting, a piece of information must be transmitted to all entities of a network as quickly as possible, starting from a particular member. Since this problem has an enormous number of applications and is proven to be NP-Hard, several models are defined in the literature while trying to simulate real-world situations and relax several constraints. A well-known branch of broadcasting utilizes a universal list throughout the process. That is, once a vertex is informed, it must follow its corresponding list, regardless of the originator and the neighbor it received the message. The problem of broadcasting with universal lists could be categorized into two sub-models: non-adaptive and adaptive. In the latter model, a sender will skip the vertices on its list from which it has received the message, while those vertices will not be skipped in the first *** this study, we will present another sub-model called fully adaptive. Not only does this model benefit from a significantly better space complexity compared to the classical model, but, as will be proved, it is faster than the two other sub-models. Since the suggested model fits real-world network architectures, we will design optimal broadcast algorithms for well-known interconnection networks such as trees, grids, and cube-connected cycles under the fully-adaptive model. We also present a tight upper bound for tori under the same model.
Accurate segmentation of the pelvic computerized tomography (CT) imaging is crucial for the clinical diagnosis of pelvic bone diseases and for planning patient-specific hip surgeries. Several methodologies have been p...
详细信息
暂无评论