The Journal of Supercomputing - Wireless sensor networks (WSNs) are typically deployed environments, often very hostile and without assistance. A certain level of security must be provided.... 相似文献
Neural Computing and Applications - In order to provide benchmark performance for Urdu text document classification, the contribution of this paper is manifold. First, it provides a publicly... 相似文献
Neural Computing and Applications - Security is one of the primary concerns when designing wireless networks. Along detecting user identity, it is also important to detect the devices at the... 相似文献
Neural Computing and Applications - This paper presents an adaptive fuzzy fault-tolerant tracking control for a class of unknown multi-variable nonlinear systems, with external disturbances,... 相似文献
In the era of Industry 4.0, the ease of access to precise measurements in real-time and the existence of machine-learning (ML) techniques will play a vital role in building practical tools to isolate inefficiencies in energy-intensive processes. This paper aims at developing an abnormal event diagnosis (AED) tool based on ML techniques for monitoring the operation of industrial processes. This tool makes it easier for operators to accomplish their tasks and to make quick and accurate decisions to ensure highly efficient processes. One of the most popular ML techniques for AED is the multivariate statistical control (MSC) method; it only requires the dataset of the normal operating conditions (NOC) to detect and identify the variables that contribute to abnormal events (AEs). Despite the popularity of MSC, it is challenging to select the appropriate method for detecting and isolating all possible abnormalities a complex industrial process can experience. To address this limitation and improve efficiency, we have developed a generic methodology that integrates different ML techniques into a unified multiagent based approach, the selected ML techniques are supposed to be built using only the normal operating condition. For the sake of demonstration, we chose a combination of two ML methods: principal component analysis and k-nearest neighbors (k-NN). The k-NN was integrated into the proposed multiagent to take into account the nonlinearity and multimodality that frequently occur in industrial processes. In addition, we modified a k-NN method proposed in the literature to reduce computation time during real-time detection and isolation. Finally, the proposed methodology was successfully validated to monitor the energy efficiency of a reboiler located in a thermomechanical pulp mill.
One of the important aspects in achieving better performance for transient stability assessment (TSA) of power systems employing
computational intelligence (CI) techniques is by incorporating feature reduction techniques. For small power system the number
of features may be small but when larger systems are considered the number of features increased as the size of the systems
increases. Apart from employing faster CI techniques to achieve faster and accurate TSA of power system, feature reduction
techniques are needed in reducing the input features while preserving the needed information so as to make faster training
of the CI technique. This paper presents feature reductions techniques used, namely correlation analysis and principle component
analysis, in reducing number of input features presented to two CI techniques for TSA, namely probabilistic neural network
(PNN) and least squares support vector machines (LS-SVM). The proposed feature reduction techniques are implemented and tested
on the IEEE 39-bus test system and 87-bus Malaysia’s power system. Numerical results are presented to demonstrate the performance
of the feature reduction techniques and its effects on the accuracies and time taken for training the two CI techniques. 相似文献
In this paper, we present an interactive edutainment system for the children that leverages multimedia and RFID technologies in a seamless manner. The proposed system allows children to learn about new objects/entities by tapping on physical objects through a specially designed RFID-Bluetooth based Tangible User Interface (TUI) tool. The output of the system is delivered as a set of appropriate multimedia representations related to the objects being tapped. The TUI uses RFID technology for object identification and Bluetooth communication to transmit data to the computer where the system??s software is running. We incorporated our system in three games that allow children of different ages to benefit from the system??s functionalities and encourage them to interact with it. 相似文献
Significant growth of multimedia content on the World Wide Web (or simply ??Web??) has made it an essential part of peoples lives. The web provides enormous amount of information, however, it is very important for the users to be able to gauge the trustworthiness of web information. Users normally access content from the first few links provided to them by search engines such as Google or Yahoo!. This is assuming that these search engines provide factual information, which may be popular due to criteria such as page rank but may not always be trustworthy from the factual aspects. This paper presents a mechanism to determine trust of websites based on the semantic similarity of their multimedia content with already established and trusted websites. The proposed method allows for dynamic computation of the trust level of websites of different domains and hence overcomes the dependency on traditional user feedback methods for determining trust. In fact, our method attempts to emulate the evolving process of trust that takes place in a user??s mind. The experimental results have been provided to demonstrate the utility and practicality of the proposed method. 相似文献
Cookies are the primary means for web applications to authenticate HTTP requests and to maintain client states. Many web applications (such as those for electronic commerce) demand a secure cookie scheme. Such a scheme needs to provide the following four services: authentication, confidentiality, integrity, and anti-replay. Several secure cookie schemes have been proposed in previous literature; however, none of them are completely satisfactory. In this paper, we propose a secure cookie scheme that is effective, efficient, and easy to deploy. In terms of effectiveness, our scheme provides all of the above four security services. In terms of efficiency, our scheme does not involve any database lookup or public key cryptography. In terms of deployability, our scheme can be easily deployed on existing web services, and it does not require any change to the Internet cookie specification. We implemented our secure cookie scheme using PHP and conducted experiments. The experimental results show that our scheme is very efficient on both the client side and the server side.A notable adoption of our scheme in industry is that our cookie scheme has been used by Wordpress since version 2.4. Wordpress is a widely used open source content management system. 相似文献