Abstract: Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches.
Abstract: The real-time and extensive interactive interfaces of social media platforms have reshaped the internal and external knowledge synergy modes of enterprises, bringing many opportunities for ...
Abstract: Heart sound auscultation has been applied in clinical usage for early screening of cardiovascular diseases. Due to the high demand for auscultation expertise, automatic auscultation can help ...
Abstract: Due to the poor lighting condition and limited dynamic range of digital imaging devices, the recorded images are often under-/over-exposed and with low contrast. Most of previous single ...
Abstract: In this study, to improve the accuracy of path tracking in intelligent vehicles, we propose an intelligent vehicle path-tracking control method based on improved model predictive control ...
Abstract: In this paper, the direct adaptive neural control is proposed for a class of uncertain nonaffine nonlinear systems with unknown nonsymmetric input saturation. Based on the implicit function ...
Abstract: This paper describes a method of designing arrays of crosspoints for use in telephone switching systems in which it will always be possible to establish a connection from an idle inlet to an ...
Abstract: This article addresses the design issue of fuzzy asynchronous fault detection filter (FAFDF) for a class of nonlinear Markov jump systems by an event-triggered (ET) scheme. The ET scheme can ...
Abstract: Maxwell's equations are replaced by a set of finite difference equations. It is shown that if one chooses the field points appropriately, the set of finite difference equations is applicable ...
Abstract: The digital twin of a life-cycle rolling bearing is significant for its degradation performance analysis and health management. This article proposes a digital twin model of life-cycle ...