Abstract: Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches.
Abstract: The rapid increase in the volume of data generated from connected devices in industrial Internet of Things paradigm, opens up new possibilities for enhancing the quality of service for the ...
Abstract: Due to the poor lighting condition and limited dynamic range of digital imaging devices, the recorded images are often under-/over-exposed and with low contrast. Most of previous single ...
Abstract: With the ratification of the IEEE 802.15.3d amendment to 802.15.3, a first step has been made to standardize consumer wireless communications in the sub-THz frequency band. IEEE 802.15.3d ...
Abstract: An 800 nm CdSeTe layer was added to the CdTe absorber used in high-efficiency CdTe cells to increase the current and produce an increase in efficiency. The CdSeTe layer employed had a ...
Abstract: The past decade has seen an explosion in the amount of digital information stored in electronic health records (EHRs). While primarily designed for archiving patient information and ...
Abstract: Deep multi-modal clustering (DMC) expects to improve clustering performance by exploiting abundant information available from multiple modalities. However, different modalities usually have ...
Abstract: This paper evaluates the microstructure and properties of polypropylene/polyolefin elastomer (PP/POE) blends for potential recyclable HVDC cable insulation ...
Abstract: Load frequency control (LFC) is widely employed in power systems to stabilize frequency fluctuation and guarantee power quality. However, most existing LFC methods rely on accurate power ...
Abstract: In high-voltage dc-dc applications, the switches in the conventional two-level dual active bridge (DAB) dc-dc converter have to bear the whole port voltage, so high voltage switches should ...
Abstract: In order to stabilize a class of uncertain nonlinear strict-feedback systems with full-state constraints, an adaptive neural network control method is investigated in this paper. The state ...
Abstract: The Internet of Things is a novel paradigm with access to wireless communication systems and artificial intelligence technologies, which is considered to be applicable to a variety of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results