Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
512 result(s) for "Lee, Chi-Cheng"
Sort by:
Performance Measurement System and Quality Management in Data-Driven Industry 4.0: A Review
The birth of mass production started in the early 1900s. The manufacturing industries were transformed from mechanization to digitalization with the help of Information and Communication Technology (ICT). Now, the advancement of ICT and the Internet of Things has enabled smart manufacturing or Industry 4.0. Industry 4.0 refers to the various technologies that are transforming the way we work in manufacturing industries such as Internet of Things, cloud, big data, AI, robotics, blockchain, autonomous vehicles, enterprise software, etc. Additionally, the Industry 4.0 concept refers to new production patterns involving new technologies, manufacturing factors, and workforce organization. It changes the production process and creates a highly efficient production system that reduces production costs and improves product quality. The concept of Industry 4.0 is relatively new; there is high uncertainty, lack of knowledge and limited publication about the performance measurement and quality management with respect to Industry 4.0. Conversely, manufacturing companies are still struggling to understand the variety of Industry 4.0 technologies. Industrial standards are used to measure performance and manage the quality of the product and services. In order to fill this gap, our study focuses on how the manufacturing industries use different industrial standards to measure performance and manage the quality of the product and services. This paper reviews the current methods, industrial standards, key performance indicators (KPIs) used for performance measurement systems in data-driven Industry 4.0, and the case studies to understand how smart manufacturing companies are taking advantage of Industry 4.0. Furthermore, this article discusses the digitalization of quality called Quality 4.0, research challenges and opportunities in data-driven Industry 4.0 are discussed.
Design and Implementation of an ML and IoT Based Adaptive Traffic-Management System for Smart Cities
The rapid growth in the number of vehicles has led to traffic congestion, pollution, and delays in logistic transportation in metropolitan areas. IoT has been an emerging innovation, moving the universe towards automated processes and intelligent management systems. This is a critical contribution to automation and smart civilizations. Effective and reliable congestion management and traffic control help save many precious resources. An IoT-based ITM system set of sensors is embedded in automatic vehicles and intelligent devices to recognize, obtain, and transmit data. Machine learning (ML) is another technique to improve the transport system. The existing transport-management solutions encounter several challenges resulting in traffic congestion, delay, and a high fatality rate. This research work presents the design and implementation of an Adaptive Traffic-management system (ATM) based on ML and IoT. The design of the proposed system is based on three essential entities: vehicle, infrastructure, and events. The design utilizes various scenarios to cover all the possible issues of the transport system. The proposed ATM system also utilizes the machine-learning-based DBSCAN clustering method to detect any accidental anomaly. The proposed ATM model constantly updates traffic signal schedules depending on traffic volume and estimated movements from nearby crossings. It significantly lowers traveling time by gradually moving automobiles across green signals and decreases traffic congestion by generating a better transition. The experiment outcomes reveal that the proposed ATM system significantly outperformed the conventional traffic-management strategy and will be a frontrunner for transportation planning in smart-city-based transport systems. The proposed ATM solution minimizes vehicle waiting times and congestion, reduces road accidents, and improves the overall journey experience.
Security and Privacy in Wireless Sensor Networks: Advances and Challenges
Wireless sensor networks (WSNs) have evolved over the last few decades due to the availability of low-cost, short-range and easy deployed sensors. WSN systems focus on sensing and transmittingthe real-time sense information of a specific monitoring environment for the back-end system to do further processing and analysis [...].
Discovery of a Weyl fermion semimetal and topological Fermi arcs
A Weyl semimetal is a new state of matter that hosts Weyl fermions as emergent quasiparticles and admits a topological classification that protects Fermi arc surface states on the boundary of a bulk sample. This unusual electronic structure has deep analogies with particle physics and leads to unique topological properties. We report the experimental discovery of a Weyl semimetal, tantalum arsenide (TaAs). Using photoemission spectroscopy, we directly observe Fermi arcs on the surface, as well as the Weyl fermion cones and Weyl nodes in the bulk of TaAs single crystals. We find that Fermi arcs terminate on the Weyl fermion nodes, consistent with their topological character. Our work opens the field for the experimental study of Weyl fermions in physics and materials science.
AutoML-ID: automated machine learning model for intrusion detection using wireless sensor network
Momentous increase in the popularity of explainable machine learning models coupled with the dramatic increase in the use of synthetic data facilitates us to develop a cost-efficient machine learning model for fast intrusion detection and prevention at frontier areas using Wireless Sensor Networks (WSNs). The performance of any explainable machine learning model is driven by its hyperparameters. Several approaches have been developed and implemented successfully for optimising or tuning these hyperparameters for skillful predictions. However, the major drawback of these techniques, including the manual selection of the optimal hyperparameters, is that they depend highly on the problem and demand application-specific expertise. In this paper, we introduced Automated Machine Learning (AutoML) model to automatically select the machine learning model (among support vector regression, Gaussian process regression, binary decision tree, bagging ensemble learning, boosting ensemble learning, kernel regression, and linear regression model) and to automate the hyperparameters optimisation for accurate prediction of numbers of k -barriers for fast intrusion detection and prevention using Bayesian optimisation. To do so, we extracted four synthetic predictors, namely, area of the region, sensing range of the sensor, transmission range of the sensor, and the number of sensors using Monte Carlo simulation. We used 80% of the datasets to train the models and the remaining 20% for testing the performance of the trained model. We found that the Gaussian process regression performs prodigiously and outperforms all the other considered explainable machine learning models with correlation coefficient (R = 1), root mean square error (RMSE = 0.007), and bias = − 0.006. Further, we also tested the AutoML performance on a publicly available intrusion dataset, and we observed a similar performance. This study will help the researchers accurately predict the required number of k -barriers for fast intrusion detection and prevention.
LT-FS-ID: Log-Transformed Feature Learning and Feature-Scaling-Based Machine Learning Algorithms to Predict the k-Barriers for Intrusion Detection Using Wireless Sensor Network
The dramatic increase in the computational facilities integrated with the explainable machine learning algorithms allows us to do fast intrusion detection and prevention at border areas using Wireless Sensor Networks (WSNs). This study proposed a novel approach to accurately predict the number of barriers required for fast intrusion detection and prevention. To do so, we extracted four features through Monte Carlo simulation: area of the Region of Interest (RoI), sensing range of the sensors, transmission range of the sensor, and the number of sensors. We evaluated feature importance and feature sensitivity to measure the relevancy and riskiness of the selected features. We applied log transformation and feature scaling on the feature set and trained the tuned Support Vector Regression (SVR) model (i.e., LT-FS-SVR model). We found that the model accurately predicts the number of barriers with a correlation coefficient (R) = 0.98, Root Mean Square Error (RMSE) = 6.47, and bias = 12.35. For a fair evaluation, we compared the performance of the proposed approach with the benchmark algorithms, namely, Gaussian Process Regression (GPR), Generalised Regression Neural Network (GRNN), Artificial Neural Network (ANN), and Random Forest (RF). We found that the proposed model outperforms all the benchmark algorithms.
ECS-NL: An Enhanced Cuckoo Search Algorithm for Node Localisation in Wireless Sensor Networks
Node localisation plays a critical role in setting up Wireless Sensor Networks (WSNs). A sensor in WSNs senses, processes and transmits the sensed information simultaneously. Along with the sensed information, it is crucial to have the positional information associated with the information source. A promising method to localise these randomly deployed sensors is to use bio-inspired meta-heuristic algorithms. In this way, a node localisation problem is converted to an optimisation problem. Afterwards, the optimisation problem is solved for an optimal solution by minimising the errors. Various bio-inspired algorithms, including the conventional Cuckoo Search (CS) and modified CS algorithm, have already been explored. However, these algorithms demand a predetermined number of iterations to reach the optimal solution, even when not required. In this way, they unnecessarily exploit the limited resources of the sensors resulting in a slow search process. This paper proposes an Enhanced Cuckoo Search (ECS) algorithm to minimise the Average Localisation Error (ALE) and the time taken to localise an unknown node. In this algorithm, we have implemented an Early Stopping (ES) mechanism, which improves the search process significantly by exiting the search loop whenever the optimal solution is reached. Further, we have evaluated the ECS algorithm and compared it with the modified CS algorithm. While doing so, note that the proposed algorithm localised all the localisable nodes in the network with an ALE of 0.5–0.8 m. In addition, the proposed algorithm also shows an 80% decrease in the average time taken to localise all the localisable nodes. Consequently, the performance of the proposed ECS algorithm makes it desirable to implement in practical scenarios for node localisation.
Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments
In the Internet of Things (IoT), numerous devices can interact with each other over the Internet. A wide range of IoT applications have already been deployed, such as transportation systems, healthcare systems, smart buildings, smart factories, and smart cities. Wireless sensor networks (WSNs) play crucial roles in these IoT applications. Researchers have published effective (but not entirely secure) approaches for merging WSNs into IoT environments. In IoT environments, the security effectiveness of remote user authentication is crucial for information transmission. Computational efficiency and energy consumption are crucial because the energy available to any WSN is limited. This paper proposes a notably efficient and secure authentication scheme based on temporal credential and dynamic ID for WSNs in IoT environments. The Burrows-Abadi-Needham (BAN) logic method was used to validate our scheme. Cryptanalysis revealed that our scheme can overcome the security weaknesses of previously published schemes. The security functionalities and performance efficiency of our scheme are compared with those of previous related schemes. The result demonstrates that our scheme's security functionalities are quantitatively and qualitatively superior to those of comparable schemes. Our scheme can improve the effectiveness of authentication in IoT environments. Notably, our scheme has superior performance efficiency, low computational cost, frugal energy consumption, and low communication cost.
Discovery of a new type of topological Weyl fermion semimetal state in MoxW1−xTe2
The recent discovery of a Weyl semimetal in TaAs offers the first Weyl fermion observed in nature and dramatically broadens the classification of topological phases. However, in TaAs it has proven challenging to study the rich transport phenomena arising from emergent Weyl fermions. The series Mo x W 1− x Te 2 are inversion-breaking, layered, tunable semimetals already under study as a promising platform for new electronics and recently proposed to host Type II, or strongly Lorentz-violating, Weyl fermions. Here we report the discovery of a Weyl semimetal in Mo x W 1− x Te 2 at x =25%. We use pump-probe angle-resolved photoemission spectroscopy (pump-probe ARPES) to directly observe a topological Fermi arc above the Fermi level, demonstrating a Weyl semimetal. The excellent agreement with calculation suggests that Mo x W 1− x Te 2 is a Type II Weyl semimetal. We also find that certain Weyl points are at the Fermi level, making Mo x W 1− x Te 2 a promising platform for transport and optics experiments on Weyl semimetals. A Type II Weyl fermion semimetal has been predicted in Mo x W 1− x Te 2 , but it awaits experimental evidence. Here, Belopolski et al . observe a topological Fermi arc in Mo x W 1− x Te 2 , showing it originates from a Type II Weyl fermion and offering a new platform to study novel transport phenomena in Weyl semimetals.
An Ensemble Tree-Based Model for Intrusion Detection in Industrial Internet of Things Networks
With less human involvement, the Industrial Internet of Things (IIoT) connects billions of heterogeneous and self-organized smart sensors and devices. Recently, IIoT-based technologies are now widely employed to enhance the user experience across numerous application domains. However, heterogeneity in the node source poses security concerns affecting the IIoT system, and due to device vulnerabilities, IIoT has encountered several attacks. Therefore, security features, such as encryption, authorization control, and verification, have been applied in IIoT networks to secure network nodes and devices. However, the requisite machine learning models require some time to detect assaults because of the diverse IIoT network traffic properties. Therefore, this study proposes ensemble models enabled with a feature selection classifier for Intrusion Detection in the IIoT network. The Chi-Square Statistical method was used for feature selection, and various ensemble classifiers, such as eXtreme gradient boosting (XGBoost), Bagging, extra trees (ET), random forest (RF), and AdaBoost can be used for the detection of intrusion applied to the Telemetry data of the TON_IoT datasets. The performance of these models is appraised based on accuracy, recall, precision, F1-score, and confusion matrix. The results indicate that the XGBoost ensemble showed superior performance with the highest accuracy over other models across the datasets in detecting and classifying IIoT attacks.