Zobrazeno 1 - 10
of 313
pro vyhledávání: '"Jung-Chun Liu"'
Publikováno v:
Sensors, Vol 24, Iss 8, p 2531 (2024)
This paper focuses on the use of smart manufacturing in lathe-cutting tool machines, which can experience thermal deformation during long-term processing, leading to displacement errors in the cutting head and damage to the final product. This study
Externí odkaz:
https://doaj.org/article/10a0aa95aa3c462b8b18c5150d255549
Publikováno v:
IEEE Access, Vol 10, Pp 124464-124474 (2022)
With the ubiquity of high-speed networks and cloud technologies, hyper-convergence (HC) has become commonplace and satisfies flex allocation requirements. This study compared the VMware virtual storage area network (vSAN), which has the largest marke
Externí odkaz:
https://doaj.org/article/60aa657658464f46a7585f7fc02ee686
Publikováno v:
IEEE Access, Vol 8, Pp 7842-7850 (2020)
Figuring the network's hidden abnormal behavior can reduce network vulnerability. This paper presents a detailed architecture in which the collected log data of the network can be processed and analyzed. We process and integrate on-campus network inf
Externí odkaz:
https://doaj.org/article/a10b984bf4374e17981abc31a9961bef
Publikováno v:
Computers, Materials & Continua; 2023, Vol. 77 Issue 1, p1143-1164, 22p
Publikováno v:
Sensors, Vol 22, Iss 3, p 1187 (2022)
Assessing mental workload is imperative for avoiding unintended negative consequences in critical situations such as driving and piloting. To evaluate mental workload, measures of eye movements have been adopted, but unequivocal results remain elusiv
Externí odkaz:
https://doaj.org/article/36458b5e51dd46faa26926ec4480c9ea
Publikováno v:
Soft Computing. 26:5143-5157
The usage of artificial intelligence and machine learning methods on cyberattacks increasing significantly recently. For the defense method of cyberattacks, it is possible to detect and identify the attack event by observing the log data and analyzin
Publikováno v:
Neural Computing and Applications.
Publikováno v:
Advances in Mechanical Engineering, Vol 9 (2017)
To solve a non-deterministic polynomial-hard problem, we can adopt an approximate algorithm for finding the near-optimal solution to reduce the execution time. Although this approach can come up with solutions much faster than brute-force methods, th
Externí odkaz:
https://doaj.org/article/99e24da5cb434f64b5b8a70172e0a942
Recently, 5G networks have gradually surrounded our living environments to color our everyday lives and make our daily activities more convenient than before. However, in 5G networks, packet P transmitted from local UPFA of a 5G network, e.g., 5G-A,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e6a3c283d831e48749841b40b2d1c0df
https://doi.org/10.21203/rs.3.rs-1899860/v1
https://doi.org/10.21203/rs.3.rs-1899860/v1
Publikováno v:
The Journal of Supercomputing. 77:10984-11003
Network log data is significant for network administrators, since it contains information on every event that occurs in a network, including system errors, alerts, and packets sending statuses. Effectively analyzing large volumes of diverse log data