With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further, the existing Deep Learning (DL) can be employed to identify anonymous intrusions. Therefore, the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection (HGSODL-ID) model for the IIoT environment. The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format. The HGSO algorithm is employed for Feature Selection (HGSO-FS) to reduce the curse of dimensionality. Moreover, Sparrow Search Optimization (SSO) is utilized with a Graph Convolutional Network (GCN) to classify and identify intrusions in the network. Finally, the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model. The proposed HGSODL-ID model was experimentally validated using a benchmark dataset, and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches. 相似文献
The use of crowdsourcing in a pedagogically supported form to partner with learners in developing novel content is emerging as a viable approach for engaging students in higher-order learning at scale. However, how students behave in this form of crowdsourcing, referred to as learnersourcing, is still insufficiently explored.
Objectives
To contribute to filling this gap, this study explores how students engage with learnersourcing tasks across a range of course and assessment designs.
Methods
We conducted an exploratory study on trace data of 1279 students across three courses, originating from the use of a learnersourcing environment under different assessment designs. We employed a new methodology from the learning analytics (LA) field that aims to represent students' behaviour through two theoretically-derived latent constructs: learning tactics and the learning strategies built upon them.
Results
The study's results demonstrate students use different tactics and strategies, highlight the association of learnersourcing contexts with the identified learning tactics and strategies, indicate a significant association between the strategies and performance and contribute to the employed method's generalisability by applying it to a new context.
Implications
This study provides an example of how learning analytics methods can be employed towards the development of effective learnersourcing systems and, more broadly, technological educational solutions that support learner-centred and data-driven learning at scale. Findings should inform best practices for integrating learnersourcing activities into course design and shed light on the relevance of tactics and strategies to support teachers in making informed pedagogical decisions. 相似文献
Active matrix prestressed microelectromechanical shutter displays enable outstanding optical properties as well as robust operating performance. The microelectromechanical systems (MEMS) shutter elements have been optimized for higher light outcoupling efficiency with lower operation voltage and higher pixel density. The MEMS elements have been co-fabricated with self-aligned metal-oxide thin-film transistors (TFTs). Several optimizations were required to integrate MEMS process without hampering the performance of both elements. The optimized display process requires only seven photolithographic masks with ensuring proper compatibility between MEMS shutter and metal-oxide TFT process. 相似文献
The edge computing model offers an ultimate platform to support scientific and real-time workflow-based applications over the edge of the network. However, scientific workflow scheduling and execution still facing challenges such as response time management and latency time. This leads to deal with the acquisition delay of servers, deployed at the edge of a network and reduces the overall completion time of workflow. Previous studies show that existing scheduling methods consider the static performance of the server and ignore the impact of resource acquisition delay when scheduling workflow tasks. Our proposed method presented a meta-heuristic algorithm to schedule the scientific workflow and minimize the overall completion time by properly managing the acquisition and transmission delays. We carry out extensive experiments and evaluations based on commercial clouds and various scientific workflow templates. The proposed method has approximately 7.7% better performance than the baseline algorithms, particularly in overall deadline constraint that gives a success rate.
The Journal of Supercomputing - This paper designs and develops a computational intelligence-based framework using convolutional neural network (CNN) and genetic algorithm (GA) to detect COVID-19... 相似文献
Data available in software engineering for many applications contains variability and it is not possible to say which variable helps in the process of the prediction. Most of the work present in software defect prediction is focused on the selection of best prediction techniques. For this purpose, deep learning and ensemble models have shown promising results. In contrast, there are very few researches that deals with cleaning the training data and selection of best parameter values from the data. Sometimes data available for training the models have high variability and this variability may cause a decrease in model accuracy. To deal with this problem we used the Akaike information criterion (AIC) and the Bayesian information criterion (BIC) for selection of the best variables to train the model. A simple ANN model with one input, one output and two hidden layers was used for the training instead of a very deep and complex model. AIC and BIC values are calculated and combination for minimum AIC and BIC values to be selected for the best model. At first, variables were narrowed down to a smaller number using correlation values. Then subsets for all the possible variable combinations were formed. In the end, an artificial neural network (ANN) model was trained for each subset and the best model was selected on the basis of the smallest AIC and BIC value. It was found that combination of only two variables’ ns and entropy are best for software defect prediction as it gives minimum AIC and BIC values. While, nm and npt is the worst combination and gives maximum AIC and BIC values. 相似文献
In this study, we demonstrate Zn1?xFexS (x = 0.0, 0.25, 0.50, 0.75, and 1.0) device applications by reporting electronic, magnetic, and optical properties, computed with Wien2k software, using density functional theory (DFT). The modified Becke and Johnson (mBJ) potential has been applied to accurately determine the material band gap. The presence of half-metallic ferromagnetism (HMF) is demonstrated. Moreover, the observed ferromagnetism is justified in terms of various splitting energies and the exchange constants. The Fe magnetic moment decreases from 4.0 μB due to the strong p ? d hybridization. A complete set of various optical parameters is also presented. The variation in the calculated static dielectric constant, due to Fe doping, is inversely related to the band gap that verifies Penn’s model. Moreover, the band gap of ZnS is tunable by the Fe doping, from ultraviolet to visible regions, depicting that the materials are appropriate for optoelectronic devices. 相似文献
We present the results of experimental study of the electric discharge between metal electrodes of various geometry and technical water within the pressure range of 8 × 103–105 Pa at the saw-tooth voltage generator frequency, f = 40 MHz, and the interelectrode distance, l = 3–30 mm. We consider transfer of the streamer discharge into spark one depending on the geometry of the metal electrode and its material. We investigate the electrical characteristics of the discharge between the plate electrode and the technical water within a wide pressure range. The essential influence of the streamer discharge type on the ozone release within the investigated parameters range is discovered. 相似文献
Six Sigma is a quality philosophy and methodology that aims to achieve operational excellence and delighted customers. The cost of poor quality depends on the sigma quality level and its corresponding failure rate. Six Sigma provides a well-defined target of 3.4 defects per million. This failure rate is commonly evaluated under the assumption that the process is normally distributed and its specifications are two-sided. However, these assumptions may lead to implementation of quality-improvement strategies that are based on inaccurate evaluations of quality costs and profits. This paper defines the relationship between failure rate and sigma quality level for inverse Gaussian processes. The inverse Gaussian distribution has considerable applications in describing cycle times, product life, employee service times, and so on. We show that for these processes attaining Six Sigma target failure rate requires higher quality efforts than for normal processes. A generic model is presented to characterise cycle times in manufacturing systems. In this model, the asymptotic production is described by a drifted Brownian motion, and the cycle time is evaluated by using the first passage time theory of a Wiener process to a boundary. The proposed method estimates the right efforts required to reach Six Sigma goals. 相似文献