Mobile devices such as smartphones are increasingly being used to record personal, delicate, and security information such as images, emails, and payment information due to the growth of wearable computing. It is beco...
详细信息
Interoperable, internet-connected distributed energy resource (DER) devices in power systems create a new attack vector for malicious cyber-actors. Modern control systems primarily focus on transmission and sub-transm...
详细信息
the usage of various sensors in vehicles has increased withthe generalization of advanced driver assistance systems (ADAS). To ensure the safety of drivers and pedestrians, considering the accuracy of measured sensor...
the usage of various sensors in vehicles has increased withthe generalization of advanced driver assistance systems (ADAS). To ensure the safety of drivers and pedestrians, considering the accuracy of measured sensor data is essential. In this paper, we propose a data correction system for enhancing the accuracy of distance data from an ultrasonic sensor utilizing an AI processor. the proposed system detects the motion of an object and adjusts the obtained distance data to align with an ideal gradient of sequential data. Experimental results of the proposed system show an error detection rate of 90.6%.
this paper presents nonlinear partial feedback linearized control scheme for AC microgrid connected DC-AC voltage source converters. the feedback linearization approach partially linearizes the nonlinear dynamical mod...
详细信息
ISBN:
(纸本)9781665436137
this paper presents nonlinear partial feedback linearized control scheme for AC microgrid connected DC-AC voltage source converters. the feedback linearization approach partially linearizes the nonlinear dynamical model of the DC-AC converters. A standard PD controller is applied to the linearized model to regulate the output voltage of the distributed generations. the proposed controller performance is illustrated under two different scenarios: demand load change in common AC-bus, and another one is three-phase to ground short-circuit fault.
the real-time data collection and monitoring process demands Wireless sensor Networks (WSNs) as a pivotal technology that employs randomly distributed battery-operated sensor modules to facilitate seamless data transm...
详细信息
ISBN:
(数字)9798350376753
ISBN:
(纸本)9798350376760
the real-time data collection and monitoring process demands Wireless sensor Networks (WSNs) as a pivotal technology that employs randomly distributed battery-operated sensor modules to facilitate seamless data transmission from remote and often hostile environments. the versatility of WSNs extends across various domains, including monitoring of smart cities. By harnessing the power of WSNs, we can optimise processes, enhance productivity, and mitigate risks more effectively. Clustering is the widely discussed concrete part of the energy mitigating process. We wish to evaluate the clustering in WSN withthe Fuzzy C-Means Clustering, K-medoid clustering, and K-means. the clustering process was analysed withthe estimation of the silhouette score. In order to assess their performance, numerous simulations are conducted in the MATLAB environment. Furthermore, we discussed their mean silhouette score, clustering ability for different scenarios in WSN.
Human Activity Recognition - HAR is one of the most popular area in the filed of sensor technology and smart learning algorithms. Deep learning algorithms are immensely exploited in HAR systems as it eliminates the ne...
详细信息
the proceedings contain 70 papers. the topics discussed include: permissionless blockchain-based sybil-resistant self-sovereign identity utilizing attested execution secure processors;monitoring provenance of delegate...
ISBN:
(纸本)9781665461047
the proceedings contain 70 papers. the topics discussed include: permissionless blockchain-based sybil-resistant self-sovereign identity utilizing attested execution secure processors;monitoring provenance of delegated personal data with blockchain;agent-based modelling of bitcoin consensus without block rewards;the Philos Trust algorithm: preventing exploitation of distributed trust;cryptocurrency price prediction with multi-task multi-step sequence-to-sequence modeling;analysis of Polkadot: architecture, internals, and contradictions;blockchain-based federated learning for industrial metaverses: incentive scheme with optimal Aoi;blockchain-based solutions for education credentialing system: comparison and implications for future development;Mosaic - a blockchain consensus algorithm based on random number generation;and a scalable blockchain-based smart contract model for decentralized voltage stability using Sharding technique.
the widespread application of cloud computing technology makes data show an explosive growth trend, and poses new challenges to traditional data management technology. Existing cloud storage systems generally use dist...
详细信息
To ensure the safety of subway and maintain a good operating environment is the primary task of station operating units. therefore, the environmental and passenger detection of the key locations in the subway station ...
详细信息
the proceedings contain 70 papers presendted at a virtual meeting. the special focus in this conference is on computing in Engineering and Technology. the topics include: Credit Point Based Voluntary Work Analysis: An...
ISBN:
(纸本)9789811927188
the proceedings contain 70 papers presendted at a virtual meeting. the special focus in this conference is on computing in Engineering and Technology. the topics include: Credit Point Based Voluntary Work Analysis: An Integrated Model Based on Proper Waste Disposal, Fitness Contribution and Social Work Index;empathic Chatbot: Emotional Astuteness for Mental Health Well-Being;Service Placement in Edge computing with AI Based Techniques;state of the Art on Cloud-Information Flow Control;A Smart Energy Optimization and Collision Avoidance Routing Strategy for IoT systems in the WSN Domain;secure Data Aggregation Model for People Centric Sensing Networks;energy Efficient Routing Protocol for Multisink Wireless sensor Networks;attention Based Deep Learning Techniques for Question Classification in Question Answering systems;a Perceptive Node Transposition and Network Reformation in Wireless sensor Network;A Hybrid RSS/ToA Based Situational Awareness Technique for Indoor Massive MIMO Wireless System;sleeping Node Scheduling Method Based Redundant Node Energy Reduction in Wireless sensor Networks;cloud computing Based Workload Prediction Using Cluster Machine Learning Approach;spatiotemporal Based Power Control Scheme for D2D Communication in 5G IoT Networks with QoS Constraints;sentiment of Primary Features in Aspect Based Sentiment Analysis of Hindi Reviews;An Optimized Cloud-Based Solution for Small-Scale Non-IT Business Firms: An Experimental Analysis;Cyber-Attack Prevention Based on Modified LVQ in SDN Using Neural Networks;performance Analysis of Scalable Transactions in distributed Data Store;distributed Data Register Technology as the Main Component of Economic Decentralization;securing Blood Distribution systems Using Blockchain;SelectGoREATech: Selection of Goal-Oriented Requirements Elicitation and Analysis Techniques;preface.
暂无评论