|
|
|
Cong Tuan Truong, Thanh Hung Nguyen, Van Quang Vu, Viet Hoang Do and Duc Toan Nguyen
This study proposes a low-cost and reliable smart fire alarm system that utilizes ultraviolet (UV) detection technology with an aspherical lens to detect fires emitting photons in the 185?260 nm range. The system integrates the aspherical lens with an ac...
ver más
|
|
|
|
|
|
|
Kwangho Song and Yoo-Sung Kim
An enhanced multimodal stacking scheme is proposed for quick and accurate online detection of harmful pornographic contents on the Internet. To accurately detect harmful contents, the implicative visual features (auditory features) are extracted using a ...
ver más
|
|
|
|
|
|
|
Zheng-Lian Su, Xun-Lin Jiang, Ning Li, Hai-Feng Ling and Yu-Jun Zheng
Unmanned aerial vehicles (UAVs) have been widely used for target detection in modern battlefields. From the viewpoint of the opponents, false target jamming is an effective approach to decrease the UAV detection ability or probability, but currently ther...
ver más
|
|
|
|
|
|
|
Abdel Hamid Mbouombouo Mboungam, Yongfeng Zhi and Cedric Karel Fonzeu Monguen
Radar detection is a technology frequently used to detect objects and measure the range, angle, or velocity of those objects. Several studies have been performed to improve the accuracy and performance of detection methods, but they encountered a strong ...
ver más
|
|
|
|
|
|
|
Yun-Wei Lin, Yuh-Hwan Liu, Yi-Bing Lin and Jian-Chang Hong
Deep learning models are often trained with a large amount of labeled data to improve the accuracy for moving object detection in new fields. However, the model may not be robust enough due to insufficient training data in the new field, resulting in som...
ver más
|
|
|
|
|
|
|
Yi Liang, Turdi Tohti and Askar Hamdulla
In the existing false information detection methods, the quality of the extracted single-modality features is low, the information between different modalities cannot be fully fused, and the original information will be lost when the information of diffe...
ver más
|
|
|
|
|
|
|
Jovana Mijalkovic and Angelo Spognardi
Network Intrusion Detection Systems (NIDS) represent a crucial component in the security of a system, and their role is to continuously monitor the network and alert the user of any suspicious activity or event. In recent years, the complexity of network...
ver más
|
|
|
|
|
|
|
Robert Bold, Haider Al-Khateeb and Nikolaos Ersotelos
Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a Servi...
ver más
|
|
|
|
|
|
|
Eungyu Lee, Yongsoo Lee and Teajin Lee
Many studies attempt to apply artificial intelligence (AI) to cyber security to effectively cope with the increasing number of cyber threats. However, there is a black box problem such that it is difficult to understand the basis for AI prediction. False...
ver más
|
|
|
|
|
|
|
Iffat Gheyas, Gregory Epiphaniou, Carsten Maple and Subhash Lakshminarayana
The safe and efficient function of critical national infrastructure (CNI) relies on the accurate demand forecast. Cyber-physical system-based demand forecasting systems (CDFS), typically found in CNI (such as energy, water, and transport), are highly vul...
ver más
|
|
|
|
|
|
|
Moslem Dehghani, Taher Niknam, Mohammad Ghiasi, Pierluigi Siano, Hassan Haes Alhelou and Amer Al-Hinai
Cyber-physical threats as false data injection attacks (FDIAs) in islanded smart microgrids (ISMGs) are typical accretion attacks, which need urgent consideration. In this regard, this paper proposes a novel cyber-attack detection model to detect FDIAs b...
ver más
|
|
|
|
|
|
|
Qian Huang, Chenghung Hsieh, Jiaen Hsieh and Chunchen Liu
Artificial intelligence (AI) is fundamentally transforming smart buildings by increasing energy efficiency and operational productivity, improving life experience, and providing better healthcare services. Sudden Infant Death Syndrome (SIDS) is an unexpe...
ver más
|
|
|
|
|
|
|
Hai Huang, Jia Zhu and Junsheng Mu
Sensing strategy directly influences the sensing accuracy of a spectrum sensing scheme. As a result, the optimization of a sensing strategy appears to be of great significance for accuracy improvement in spectrum sensing. Motivated by this, a novel sensi...
ver más
|
|
|
|
|
|
|
This paper provides a novel bad data detection processor to identify false data injection attacks (FDIAs) on the power system state estimation. The attackers are able to alter the result of the state estimation virtually intending to change the result of...
ver más
|
|
|
|
|
|
|
Tong Liu, Hanlin Sheng, Zhaosheng Jin, Li Ding, Qian Chen, Rui Huang, Shengyi Liu, Jiacheng Li and Bingxiong Yin
This paper presents an effective method for measuring oil debris with high confidence to ensure the wear monitoring of aero-engines, which suffers from severe noise interference, weak signal characteristics, and false detection. First, an improved variat...
ver más
|
|
|
|
|
|
|
Ivana Ramljak, Dinko Begu?ic and Josip Lorincz
To ensure effective spectrum usage, cognitive radio networks (CRNs) are being investigated extensively. The important function of CRNs is spectrum sensing (SS). This is the process of sensing the unused frequency spectrum and deciding whether the signal ...
ver más
|
|
|
|
|
|
|
Andi Besse Rimba, Martiwi Diah Setiawati, Abu Bakar Sambah and Fusanori Miura
Flooding has been increasing since 2004 in Japan due to localized heavy rainfall and geographical conditions. Determining areas vulnerable to flooding as one element of flood hazard maps related to disaster management for urban development is necessary. ...
ver más
|
|
|
|
|
|
|
Andi Besse Rimba, Martiwi Diah Setiawati, Abu Bakar Sambah and Fusanori Miura
Flooding has been increasing since 2004 in Japan due to localized heavy rainfall and geographical conditions. Determining areas vulnerable to flooding as one element of flood hazard maps related to disaster management for urban development is necessary. ...
ver más
|
|
|
|
|
|
|
Jing Chen, Tong Li and Rui Zhu
False messages sent by malicious or selfish vehicle nodes will reduce the operation efficiency of the Internet of Vehicles, and can even endanger drivers in serious cases. Therefore, it is very important to detect malicious vehicle nodes in the network i...
ver más
|
|
|
|
|
|
|
Yehav Alkaher and Israel Cohen
In this paper, we address the problem of howling detection in speech reinforcement system applications for utilization in howling control mechanisms. A general speech reinforcement system acquires speech from a speaker?s microphone, and delivers a reinfo...
ver más
|
|
|
|