期刊文献+
共找到2,717篇文章
< 1 2 136 >
每页显示 20 50 100
Dynamic Target Wireless Network Selection Technique Using Fuzzy Linguistic Variables 被引量:7
1
作者 Faisal Kaleem Abolfazl Mehbodniya +2 位作者 Arif Islam Kang K.Yen Fumiyuki Adachi 《China Communications》 SCIE CSCD 2013年第1期1-16,共16页
Even though various wireless Net- work Access Technologies (NATs) with dif- ferent specifications and applications have been developed in the recent years, no single wireless technology alone can satisfy the any- ti... Even though various wireless Net- work Access Technologies (NATs) with dif- ferent specifications and applications have been developed in the recent years, no single wireless technology alone can satisfy the any- time, anywhere, and any service wire- less-access needs of mobile users. A real seamless wireless mobile environment is only realized by considering vertical and horizontal handoffs together. One of the major design issues in heterogeneous wireless networks is the support of Vertical Handoff (VHO). VHO occurs when a multi-interface enabled mobile terminal changes its Point of Attachment (PoA) from one type of wireless access technology to another, while maintaining an active session. In this paper we present a novel multi-criteria VHO algorithm, which chooses the target NAT based on several factors such as user preferences, system parameters, and traf- tic-types with varying Quality of Service (QoS) requirements. Two modules i.e., VHO Neces- sity Estimation (VHONE) module and target NAT selection module, are designed. Both modules utilize several "weighted" users' and system's parameters. To improve the robust- ness of the proposed algorithm, the weighting system is designed based on the concept of fuzzy linguistic variables. 展开更多
关键词 network access selection VHO heterogeneous networks WLAN WMAN WWAN techniques for Order Preference bySimilarity to Ideal Solution
在线阅读 下载PDF
Data driven particle size estimation of hematite grinding process using stochastic configuration network with robust technique 被引量:8
2
作者 DAI Wei LI De-peng +1 位作者 CHEN Qi-xin CHAI Tian-you 《Journal of Central South University》 SCIE EI CAS CSCD 2019年第1期43-62,共20页
As a production quality index of hematite grinding process,particle size(PS)is hard to be measured in real time.To achieve the PS estimation,this paper proposes a novel data driven model of PS using stochastic configu... As a production quality index of hematite grinding process,particle size(PS)is hard to be measured in real time.To achieve the PS estimation,this paper proposes a novel data driven model of PS using stochastic configuration network(SCN)with robust technique,namely,robust SCN(RSCN).Firstly,this paper proves the universal approximation property of RSCN with weighted least squares technique.Secondly,three robust algorithms are presented by employing M-estimation with Huber loss function,M-estimation with interquartile range(IQR)and nonparametric kernel density estimation(NKDE)function respectively to set the penalty weight.Comparison experiments are first carried out based on the UCI standard data sets to verify the effectiveness of these methods,and then the data-driven PS model based on the robust algorithms are established and verified.Experimental results show that the RSCN has an excellent performance for the PS estimation. 展开更多
关键词 hematite grinding process particle size stochastic configuration network robust technique M-estimation nonparametric kernel density estimation
在线阅读 下载PDF
Analysis of the prescription of auricular acupoint therapy for simple obesity based on complex network techniques 被引量:7
3
作者 Yiting JIN Xia CHEN +3 位作者 Wei HUANG Zhehao HONG Feng HU Zhongyu ZHOU 《World Journal of Acupuncture-Moxibustion》 CSCD 2018年第1期38-43,I0006,共7页
Objective: To explore the core acupoints and combination rules of auricular acupoint therapy for simple obesity, and to further analyze the characteristics of the prescription of auricular acupoint therapy for simple... Objective: To explore the core acupoints and combination rules of auricular acupoint therapy for simple obesity, and to further analyze the characteristics of the prescription of auricular acupoint therapy for simple obesity.Methods: Relevant clinical study literature in recent 30 years in PubMed, China Biology Medicine disc(CBM), China National Knowledge Infrastructure(CNKI), Wan Fang Database. VIP Database and TCM Online Database was retrieved, and eligible articles were selected in order to build a prescription database of auricular acupoint therapy for simple obesity. On the basis of complex network techniques, the core acupoints and combination rules of auricular acupoint therapy for simple obesity were analyzed, and the characteristics of auricular acupoint therapy for simple obesity were analyzed comprehensively.Results: There were 46 network nodes of auricular acupoint. The top 16 core acupoints for auricular acupoint therapy for simple obesity included Nèifēnmì(内分泌CO18), Pí(脾CO13), Wèi(胃CO4), Sānjiāo(三焦CO17), Jīdiǎn(饥点).Shénmén(神门TF4). Dàcháng(大肠CO7). Pízhìxià(皮质下AT4). Fèi(肺CO14). Shèn(肾CO10). Jiāogǎn(交感AH6 a), Kǒu(口CO1),Gān(肝CO12). Xiǎocháng(小肠CO6) and Nǎo(脑). The combination of auricular acupoints was mainly based on the main indications of acupoints. The analysis of auricular acupoints combination indicated that the combination of CO4 with CO18 was applied most frequently, which was followed by the combinations of CO13 with CO18 and CO13 with C04. According to the analysis of auricular acupoint stimulation methods, ear point taping and pressing with Wángbùliúxíng(王不留行,Semen Vaccariae) seeds was used frequently, which was followed by magnetic beads taping and pressing and pyonex therapy. Auricular acupoint therapy combined with acupuncture for simple obesity was used most commonly, which was followed by auricular acupoint therapy combined with catgut embedment in acupoint and simple auricular acupoint therapy.Conclusion: In this study, the core acupoints and combinations of auricular acupoint therapy for simple obesity were explored effectively, and the pressing materials and major combined intervention methods were summarized and analyzed, thus providing references and treatment thoughts in terms of the point and prescription selection of auricular acupoint therapy for simple obesity. 展开更多
关键词 Simple obesity Auricular acupoint therapy Complex network techniques Prescription analysis
原文传递
Robust adaptive synchronization of chaotic neural networks by slide technique 被引量:1
4
作者 楼旭阳 崔宝同 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第2期520-528,共9页
In this paper, we focus on the robust adaptive synchronization between two coupled chaotic neural networks with all the parameters unknown and time-varying delay. In order to increase the robustness of the two coupled... In this paper, we focus on the robust adaptive synchronization between two coupled chaotic neural networks with all the parameters unknown and time-varying delay. In order to increase the robustness of the two coupled neural networks, the key idea is that a sliding-mode-type controller is employed. Moreover, without the estimate values of the network unknown parameters taken as an updating object, a new updating object is introduced in the constructing of controller. Using the proposed controller, without any requirements for the boundedness, monotonicity and differentiability of activation functions, and symmetry of connections, the two coupled chaotic neural networks can achieve global robust synchronization no matter what their initial states are. Finally, the numerical simulation validates the effectiveness and feasibility of the proposed technique. 展开更多
关键词 robust adaptive synchronization slide technique chaotic neural networks time-varying delay
原文传递
A novel slot scheduling technique for duty-cycle based data transmission for wireless sensor network 被引量:2
5
作者 Yogesh Tripathi Arun Prakash Rajeev Tripathi 《Digital Communications and Networks》 SCIE CSCD 2022年第3期351-358,共8页
The duty cycling process involves turning a radio into an active and dormant state for conserving energy. It is a promising approach for designing routing protocols for a resource-constrained Wireless Sensor Networks ... The duty cycling process involves turning a radio into an active and dormant state for conserving energy. It is a promising approach for designing routing protocols for a resource-constrained Wireless Sensor Networks (WSNs). In the duty cycle-based WSNs, the network lifetime is improved and the network transmission is increased as compared to conventional routing protocols. In this study, the active period of the duty cycle is divided into slots that can minimize the idle listening problem. The slot scheduling technique helps determine the most efficient node that uses the active period. The proposed routing protocol uses the opportunistic concept to minimize the sender waiting problem. Therefore, the forwarder set will be selected according to the node's residual active time and energy. Further, the optimum routing path is selected to achieve the minimum forwarding delay from the source to the destination. Simulation analysis reveals that the proposed routing scheme outperforms existing schemes in terms of the average transmission delay, energy consumption, and network throughput. 展开更多
关键词 Duty cycle Energy model Wireless sensor network Slot scheduling technique
在线阅读 下载PDF
Epileptic brain network mechanisms and neuroimaging techniques for the brain network 被引量:1
6
作者 Yi Guo Zhonghua Lin +1 位作者 Zhen Fan Xin Tian 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第12期2637-2648,共12页
Epilepsy can be defined as a dysfunction of the brain network,and each type of epilepsy involves different brain-network changes that are implicated diffe rently in the control and propagation of interictal or ictal d... Epilepsy can be defined as a dysfunction of the brain network,and each type of epilepsy involves different brain-network changes that are implicated diffe rently in the control and propagation of interictal or ictal discharges.Gaining more detailed information on brain network alterations can help us to further understand the mechanisms of epilepsy and pave the way for brain network-based precise therapeutic approaches in clinical practice.An increasing number of advanced neuroimaging techniques and electrophysiological techniques such as diffusion tensor imaging-based fiber tra ctography,diffusion kurtosis imaging-based fiber tractography,fiber ball imagingbased tra ctography,electroencephalography,functional magnetic resonance imaging,magnetoencephalography,positron emission tomography,molecular imaging,and functional ultrasound imaging have been extensively used to delineate epileptic networks.In this review,we summarize the relevant neuroimaging and neuroelectrophysiological techniques for assessing structural and functional brain networks in patients with epilepsy,and extensively analyze the imaging mechanisms,advantages,limitations,and clinical application ranges of each technique.A greater focus on emerging advanced technologies,new data analysis software,a combination of multiple techniques,and the construction of personalized virtual epilepsy models can provide a theoretical basis to better understand the brain network mechanisms of epilepsy and make surgical decisions. 展开更多
关键词 electrophysiological techniques EPILEPSY functional brain network functional magnetic resonance imaging functional near-infrared spectroscopy machine leaning molecular imaging neuroimaging techniques structural brain network virtual epileptic models
暂未订购
Modeling Highway Traffic Safety for Developing Countries Using Delphi Technique and Bayesian Network: Case Study for Nigeria 被引量:1
7
作者 Anthony C.Mbakwe AnthonyA.Saka +1 位作者 KeechooChoi Young-Jae Lee 《Journal of Civil Engineering and Architecture》 2018年第7期527-542,共16页
Highway traffic safety is an issue confronting developing countries and those of industrialized nations. Nigeria, as a developing country, has been experiencing unusually high traffic related injury and fatality rates... Highway traffic safety is an issue confronting developing countries and those of industrialized nations. Nigeria, as a developing country, has been experiencing unusually high traffic related injury and fatality rates. In order to commence combating highway safety problems in Nigeria, the first task is to identify the major contributing factors; however, Nigeria has no reliable and comprehensive database of traffic accidents and casualties. Consequently, the Delphi technique was utilized in generating the required data such as number of registered automobiles, number of licensed drivers, and annual fatality count for modeling and forecasting accident rates in Nigeria. A Bayesian network model was developed and used, with the data obtained from Delphi process, to demonstrate possible traffic safety responses to different scenarios of changes in the Nigerian socio-political culture. Although the Delphi technique and the Bayesian network model only estimate the accident and safety data, those methods can be a realistic option when those data are not available, especially for the developing countries. As a result, the major accident contributors have been identified and the top three contributors-road condition, DUI (driving under the influence) and reckless driving-are policy related. The Nigerian traffic safety outlook would improve significantly if the existing laws and policies can be enforced, even at a very moderate level. 展开更多
关键词 Highway safety Delphi technique Bayesian network developing countries Nigeria.
在线阅读 下载PDF
Novel stability criteria for fuzzy Hopfield neural networks based on an improved homogeneous matrix polynomials technique
8
作者 冯毅夫 张庆灵 冯德志 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第10期179-188,共10页
The global stability problem of Takagi-Sugeno(T-S) fuzzy Hopfield neural networks(FHNNs) with time delays is investigated.Novel LMI-based stability criteria are obtained by using Lyapunov functional theory to guar... The global stability problem of Takagi-Sugeno(T-S) fuzzy Hopfield neural networks(FHNNs) with time delays is investigated.Novel LMI-based stability criteria are obtained by using Lyapunov functional theory to guarantee the asymptotic stability of the FHNNs with less conservatism.Firstly,using both Finsler's lemma and an improved homogeneous matrix polynomial technique,and applying an affine parameter-dependent Lyapunov-Krasovskii functional,we obtain the convergent LMI-based stability criteria.Algebraic properties of the fuzzy membership functions in the unit simplex are considered in the process of stability analysis via the homogeneous matrix polynomials technique.Secondly,to further reduce the conservatism,a new right-hand-side slack variables introducing technique is also proposed in terms of LMIs,which is suitable to the homogeneous matrix polynomials setting.Finally,two illustrative examples are given to show the efficiency of the proposed approaches. 展开更多
关键词 Hopfield neural networks linear matrix inequality Takagi-Sugeno fuzzy model homogeneous polynomially technique
原文传递
An Efficient Priority Based Routing Technique That Maximizes the Lifetime and Coverage of Wireless Sensor Networks
9
作者 Imad Salah Mohmmad A. Alshriedeh Saleh Al-Sharaeh 《International Journal of Communications, Network and System Sciences》 2013年第2期100-108,共9页
Recent development in sensor technologies makes wireless sensor networks (WSN) very popular in the last few years. A limitation of most popular sensors is that sensor nodes have a limited battery capacity that leads t... Recent development in sensor technologies makes wireless sensor networks (WSN) very popular in the last few years. A limitation of most popular sensors is that sensor nodes have a limited battery capacity that leads to lower the lifetime of WSN. For that, it raises the need to develop energy efficient solutions to keep WSN functioning for the longest period of time. Due to the fact that most of the nodes energy is spent on data transmission, many routing techniques in the literature have been proposed to expand the network lifetime such as the Online Maximum Lifetime heuristics (OML) and capacity maximization (CMAX). In this paper, we introduce an efficient priority based routing power management heuristic in order to increase both coverage and extend lifetime by managing the power at the sensor level. We accomplished that by setting priority metric in addition to dividing the node energy into two ratios;one for the sensor node originated data and the other part is for data relays from other sensors. This heuristic, which is called pERPMT (priority Efficient Routing Power Management Technique), has been applied to two well know routing techniques. Results from running extensive simulation runs revealed the superiority of the new methodology pERPMT over existing heuristics. The pEPRMT increases the lifetime up to 77% and 54% when compared to OML and CMAX respectively. 展开更多
关键词 Wireless Sensor networks ENERGY-AWARE ROUTING Sensors DEPLOYMENT PRIORITY BASED technique
暂未订购
Modified Black Widow Optimization-Based Enhanced Threshold Energy Detection Technique for Spectrum Sensing in Cognitive Radio Networks
10
作者 R.Saravanan R.Muthaiah A.Rajesh 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2339-2356,共18页
This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the second... This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the secondary user based on the square law.The proposed method is implemented with the signal transmission of multiple outputs-orthogonal frequency division multiplexing.Additionally,the proposed method is considered the dynamic detection threshold adjustments and energy identification spectrum sensing technique in cognitive radio systems.In the dynamic threshold,the signal ratio-based threshold is fixed.The threshold is computed by considering the Modified Black Widow Optimization Algorithm(MBWO).So,the proposed methodology is a combination of dynamic threshold detection and MBWO.The general threshold-based detection technique has different limitations such as the inability optimal signal threshold for determining the presence of the primary user signal.These limitations undermine the sensing accuracy of the energy identification technique.Hence,the ETBED technique is developed to enhance the energy efficiency of cognitive radio networks.The projected approach is executed and analyzed with performance and comparison analysis.The proposed method is contrasted with the conventional techniques of theWhale Optimization Algorithm(WOA)and GreyWolf Optimization(GWO).It indicated superior results,achieving a high average throughput of 2.2 Mbps and an energy efficiency of 3.8,outperforming conventional techniques. 展开更多
关键词 Cognitive radio network spectrum sensing noise uncertainty modified black widow optimization algorithm energy detection technique
在线阅读 下载PDF
3-D Grid-Based Localization Technique in Mobile Sensor Networks
11
作者 Jia Li Lei Sun +1 位作者 Wai Yee Leong Peter H J Chong 《Wireless Sensor Network》 2010年第11期828-837,共10页
Considering the environmental protection, forest fire becomes a more and more serious problem and requires more concerns. This paper provides an efficient method for fire monitoring and detection in forests using wire... Considering the environmental protection, forest fire becomes a more and more serious problem and requires more concerns. This paper provides an efficient method for fire monitoring and detection in forests using wireless sensor network technology. The proposed technique estimates the location of a sensor node based on the current set of hop-count values, which are collected through the anchor nodes’ broadcast. Our algorithm incorporates two salient features;grid-based output and event-triggering mechanism, to improve the accuracy while reducing the power consumption. Through the computer simulation, the output region obtained from our algorithm can always cover the target node. In addition, the algorithm was implemented and tested with a set of Crossbow sensors. Experimental results demonstrated the high feasibility and worked well in real environment. 展开更多
关键词 WIRELESS Mobile Sensor networks FOREST FIRE Detection LOCALIZATION technique
暂未订购
Energy Proficient Reliable Rim Routing Technique for Wireless Heterogeneous Sensor Networks Lifespan Fortification
12
作者 S. G. Susila J. Arputhavijayaselvi 《Circuits and Systems》 2016年第8期1751-1759,共9页
Sensor nodes are mainly shielded in the field with limited power supply. In Wireless Sensor Networks, there must be a requirement of an efficient power management, because sensor nodes are deployed in unman attended a... Sensor nodes are mainly shielded in the field with limited power supply. In Wireless Sensor Networks, there must be a requirement of an efficient power management, because sensor nodes are deployed in unman attended area with non-rechargeable batteries. Power management can be done by different methods of routing protocols. The proposed Reliable Rim Routing (3R) technique is based on hybrid routing protocol for homogeneous and heterogeneous system for WSNs to ameliorate the performance of the overall system. In 3R, total node deployment area can be multipart in terms of rim and in each rim, and some of the sensor nodes transmit their sensed data directly to base station, and meanwhile remaining sensor nodes send the data through clustering technique to base station like SEP. Proposed 3R technique implementation proves its enhanced WSNs lifetime of 70% energy consumption and 40% throughput compared with existing protocols. Simulation and evaluation results outperformed in terms of energy consumption with increased throughput and network lifetime. 展开更多
关键词 Cluster Cluster Head Heterogeneous Rim Layer Node Deployment technique Wireless Sensor network
在线阅读 下载PDF
Seismic Prospecting Techniques in Network of Rivers
13
《China Oil & Gas》 CAS 1998年第1期52-52,共1页
关键词 Seismic Prospecting techniques in network of Rivers
在线阅读 下载PDF
The Profound Revelation of Human Social Relations and the Profound Realization of Information Right of Citizens——The social significance of network technique advancement in the perspective of “Entity Cube”
14
作者 GAO GANG 《The Journal of Human Rights》 2010年第4期9-12,共4页
The R&D group of relationship searching in Microsoft Asia Research Institute explains "Entity Cube" launched in 2008 as follows:
关键词 The social significance of network technique advancement in the perspective of The Profound Revelation of Human Social Relations and the Profound Realization of Information Right of Citizens Entity Cube
原文传递
Hybrid Security Techniques for Internet of Things Healthcare Applications 被引量:1
15
作者 Lobna Yehia Ayman Khedr Ashraf Darwish 《Advances in Internet of Things》 2015年第3期21-25,共5页
The Internet of Things (IoT) describes the future where every day physical objects will be connected to the internet and be able to identify themselves to other devices. IoT is a new revolution of the Internet and It ... The Internet of Things (IoT) describes the future where every day physical objects will be connected to the internet and be able to identify themselves to other devices. IoT is a new revolution of the Internet and It will effect in a large number of applications such as smart living, smart home, healthcare systems, smart manufacturing, environment monitoring, and smart logistics. This paper provides integration, summarizes and surveys some of the security techniques especially hybrid techniques that can be applied with healthcare applications in IoT environment. 展开更多
关键词 IOT Healthcare APPLICATIONS HYBRID SECURITY techniques BODY Area networks
在线阅读 下载PDF
MCDA techniques used in optimization of weights and ratings of DRASTIC model for groundwater vulnerability assessment 被引量:1
16
作者 Prashant Kumar Reema Sharma Subhasis Bhaumik 《Data Science and Management》 2022年第1期28-41,共14页
DRASTIC is a very simple and common model used for the assessment of groundwater to contamination.This model is widely used across the world in various hydrogeological environments for groundwater vulnerability assess... DRASTIC is a very simple and common model used for the assessment of groundwater to contamination.This model is widely used across the world in various hydrogeological environments for groundwater vulnerability assessment.The Ohio Water Well Association(OWWA)developed DRASTIC model in 1987.Over the years,several modifications have been made in this model as per the need of the regional assessment of groundwater to contamination.This model has fixed weights for its parameters and fixed ratings for the sub-parameters under the main parameters.The weights and ratings of DRASTIC parameters were fixed on the basis of Delphi network technique,which is the best technique for the consensus-building of experts,but it lacks scientific explanations.Over the years,several optimization techniques have been used to optimize these weights and ratings.This work intends to present a critical analysis of decision optimization techniques used to get the optimum values of weights and ratings.The inherent pros and cons and the optimization challenges associated with these techniques have also been discussed.The finding of this study is that the application of MCDA optimization techniques used to optimize the weights and ratings of DRASTIC model to assess the vulnerability of groundwater depend on the availability of hydrogeological data,the pilot study area and the level of required accuracy for earmarking the vulnerable regions.It is recommended that one must choose the appropriate MCDA technique for the particular region because unnecessary complex structure for optimization process takes more time,efforts,resources,and implementation costs. 展开更多
关键词 DRASTIC Model Vulnerability index Analytic Hierarchy Process MCDA techniques Neural networks Fuzzy logic
在线阅读 下载PDF
SAFT-VNDN: A Socially-Aware Forwarding Technique in Vehicular Named Data Detworking
17
作者 Amel Boudelaa Zohra Abdelhafidi +4 位作者 Nasreddine Lagraa Chaker Abdelaziz Kerrache Muhammad Bilal Daehan Kwak Mohamed Bachir Yagoubi 《Computers, Materials & Continua》 SCIE EI 2022年第11期2495-2512,共18页
Vehicular Social Networks(VSNs)is the bridge of social networks and Vehicular Ad-Hoc Networks(VANETs).VSNs are promising as they allow the exchange of various types of contents in large-scale through Vehicle-to-Vehicl... Vehicular Social Networks(VSNs)is the bridge of social networks and Vehicular Ad-Hoc Networks(VANETs).VSNs are promising as they allow the exchange of various types of contents in large-scale through Vehicle-to-Vehicle(V2V)and Vehicle-to-Infrastructure(V2I)communication protocols.Vehicular Named Data Networking(VNDN)is an auspicious communication paradigm for the challenging VSN environment since it can optimize content dissemination by decoupling contents from their physical locations.However,content dissemination and caching represent crucial challenges in VSNs due to short link lifetime and intermittent connectivity caused by vehicles’high mobility.Our aim with this paper is to improve content delivery and cache hit ratio,as well as decrease the transmission delay between end-users.In this regard,we propose a novel hybrid VNDN-VSN forwarding technique based on social communities,which allows requester vehicles to easily find the most suitable forwarder or producer among the community members in their neighborhood area.Furthermore,we introduce an effective caching mechanism by dividing the content store into two parts,one for community private contents and the second one for public contents.Simulation results show that our proposed forwarding technique can achieve a favorable performance compared with traditional VNDN,in terms of data delivery ratio,average data delivery delay,and cache hit ratio. 展开更多
关键词 Vehicular Social networks(VSNs) Vehicular Named Data networking forwarding technique social communities
在线阅读 下载PDF
Detection of Behavioral Patterns Employing a Hybrid Approach of Computational Techniques
18
作者 Rohit Raja Chetan Swarup +5 位作者 Abhishek Kumar Kamred Udham Singh Teekam Singh Dinesh Gupta Neeraj Varshney Swati Jain 《Computers, Materials & Continua》 SCIE EI 2022年第7期2015-2031,共17页
As far as the present state is concerned in detecting the behavioral pattern of humans(subject)using morphological image processing,a considerable portion of the study has been conducted utilizing frontal vision data ... As far as the present state is concerned in detecting the behavioral pattern of humans(subject)using morphological image processing,a considerable portion of the study has been conducted utilizing frontal vision data of human faces.The present research work had used a side vision of human-face data to develop a theoretical framework via a hybrid analytical model approach.In this example,hybridization includes an artificial neural network(ANN)with a genetic algorithm(GA).We researched the geometrical properties extracted from side-vision human-face data.An additional study was conducted to determine the ideal number of geometrical characteristics to pick while clustering.The close vicinity ofminimum distance measurements is done for these clusters,mapped for proper classification and decision process of behavioral pattern.To identify the data acquired,support vector machines and artificial neural networks are utilized.A method known as an adaptiveunidirectional associative memory(AUTAM)was used to map one side of a human face to the other side of the same subject.The behavioral pattern has been detected based on two-class problem classification,and the decision process has been done using a genetic algorithm with best-fit measurements.The developed algorithm in the present work has been tested by considering a dataset of 100 subjects and tested using standard databases like FERET,Multi-PIE,Yale Face database,RTR,CASIA,etc.The complexity measures have also been calculated under worst-case and best-case situations. 展开更多
关键词 Adaptive-unidirectional-associative-memory technique artificial neural network genetic algorithm hybrid approach
在线阅读 下载PDF
Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment
19
作者 Aljuaid Turkea Ayedh M Ainuddin Wahid Abdul Wahab Mohd Yamani Idna Idris 《Computers, Materials & Continua》 SCIE EI 2024年第9期4663-4686,共24页
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control sy... Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources.This paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN method.This technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access decision-making.The proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy rate.Additionally,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern organizations.Furthermore,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management. 展开更多
关键词 BYOD security access control access control decision-enforcement deep learning neural network techniques TabularDNN MULTILAYER dynamic adaptable FLEXIBILITY bottlenecks performance policy conflict
在线阅读 下载PDF
Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions
20
作者 Tala Talaei Khoei Hadjar Ould Slimane Naima Kaabouch 《Communications and Network》 2022年第4期119-170,共52页
One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks ba... One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions. 展开更多
关键词 Smart Grid Architecture Cyber-Attacks network Security CONFIDENTIALITY Integrity Availability ACCOUNTABILITY Countermeasures Detection techniques
在线阅读 下载PDF
上一页 1 2 136 下一页 到第
使用帮助 返回顶部