Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Optimal Design of Drying Process of the Potatoes with Multi-Agent Reinforced Deep Learning

    Mohammad Yaghoub Abdollahzadeh Jamalabadi*

    Frontiers in Heat and Mass Transfer, Vol.22, No.2, pp. 511-536, 2024, DOI:10.32604/fhmt.2024.051004

    Abstract Heat and mass transport through evaporation or drying processes occur in many applications such as food processing, pharmaceutical products, solar-driven vapor generation, textile design, and electronic cigarettes. In this paper, the transport of water from a fresh potato considered as a wet porous media with laminar convective dry air fluid flow governed by Darcy’s law in two-dimensional is highlighted. Governing equations of mass conservation, momentum conservation, multiphase fluid flow in porous media, heat transfer, and transport of participating fluids and gases through evaporation from liquid to gaseous phase are solved simultaneously. In this model, the… More >

  • Open Access

    ARTICLE

    Enhanced Primary User Emulation Attack Inference in Cognitive Radio Networks Using Machine Learning Algorithm

    N. Sureka*, K. Gunaseelan

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1893-1906, 2022, DOI:10.32604/iasc.2022.026098

    Abstract Cognitive Radio (CR) is a competent technique devised to smart sense its surroundings and address the spectrum scarcity issues in wireless communication networks. The Primary User Emulation Attack (PUEA) is one of the most serious security threats affecting the performance of CR networks. In this paper, machine learning (ML) principles have been applied to detect PUEA with superior decision-making ability. To distinguish the attacking nodes, Reinforced Learning (RL) and Extreme Machine Learning (EML-RL) algorithms are proposed to be based on Reinforced Learning (EML). Various dynamic parameters like estimation error, attack detection efficiency, attack estimation rate, More >

Displaying 1-10 on page 1 of 2. Per Page