Abstract: An intrusion detection system (IDS) plays a crucial role in network security by distinguishing hostile activities from network traffic. Conventional hardware-based IDS architectures have ...
Abstract: Distributed computing can be applied on intelligent traffic management systems to eliminate the need for a central control station and reduce the computational complexity to optimize entire ...
Abstract: This letter proposes a lightweight DNN model for robotic grasping applications with just 1.5 million architecture parameters. In the proposed model, the location of the target object is ...
Abstract: This paper presents an improved sensorless control of a Salient-Pole Permanent Magnet Synchronous Machine (SPMSM) based on fuzzy logic model reference adaptive system. For this purpose, an ...
Abstract: The integration of AI into Cyber-Physical Systems (CPS) has enhanced their functionality but introduced challenges for traditional verification methods. Temporal logic falsification ...
Abstract: The adoption of electronic patient records in hospitals will provide numerous benefits, but it will also present new issues. One of these is the creation of deadlocks, which causes delays in ...
Abstract: With the access of massive electric power IOT terminals, the adaptive access and automatic management of electric power IOT terminals are facing serious challenges, and there is an urgent ...
Abstract: Model order reduction has been one of the most challenging topics in the past years. Conventional mathematical methods have been used to obtain a reduced order model of high order complex ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results