In electrical energy distribution, losses are a challenging problem, among these losses electricity theft plays a prominent role. Not only Pakistan but many other countries throughout the world face this challenge. th...
详细信息
this paper investigates how to build efficient and secure data identification in edge computing for smart power grid. the current solutions, such as access control and data labelling, have limitations due to security ...
详细信息
In industrial automation scenarios, communication mostly relies on serial communication, such as RS-485 and other common standards. the traditional communication method usually adopts the active communication mode, al...
详细信息
As cloud computing is increasingly embraced by people and organizations for information storage and processing, security is a major concern. Cryptographic algorithms are utilized to guarantee the privacy and integrity...
详细信息
作者:
Kuppili, RohanAgarwal, KhusbooBhosale, TanmayGouthaman, P.School of Computing
College of Engineering and Technology Srm Institute of Science and Technology Department of Networking and Communications Kattankulathur603203 India School of Computing
Srm Institute of Science and Technology Faculty of Engineering and Technology Department of Networking and Communications Kattankulathur603203 India
Innovative technology for weapon detection during security monitoring is necessary today due to the rising threats of violence and terror. the paper discusses a detailed design of a weapon detection system intended fo...
详细信息
Withthe current development of industrial Internet technology, the number of interconnected industrial control devices is increasing, the throughput of key data in industrial Internet networks is increasing, and the ...
详细信息
Withthe rapid development of power communication network, software version update have become a heavy task in network operation and maintenance. It's necessary to manage software versions on an automated and inte...
详细信息
Flexflow is an advanced web application designed to provide personalized dietary recommendations tailored to individual needs and health goals. By considering factors such as age, sex, height, weight, activity level, ...
详细信息
the widespread use of various software in power communication networks introduces more and more challenges, particularly in ensuring the security and stability of software updates. Large language models (LLMs) withth...
详细信息
Fog computing is an innovative approach that brings cloud computing capabilities to the edge of the network, and it has great potential for enterprises looking to improve real-time data processing and lower latency. H...
详细信息
暂无评论