Autonomous vehicles (AVs) are susceptible to cyberattacks due to their reliance on vehicle-to-everything (V2X) communication. this research proposes a Gradient Boosting-based intrusion detection system to safeguard AV...
详细信息
this paper presents a systematic review of the literature on the application of blockchain technology to improve the security of cyber-physical systems. the objective of the article was to identify current challenges,...
详细信息
the aging trajectories of lithium-ion batteries show nonlinear changes and the standard extreme learning machine (ELM) results show instability. To solve these problems, a battery RUL prediction model combining VMD ap...
详细信息
Mobile robots used in modern automation must have strong localization capabilities in challenging environments. this work suggests a method of lidar artificial landmark localization that exploits structural elements o...
详细信息
Accurate 3D geometric modeling is essential for surgeons to diagnose and to operate in time. Clear and accurate image segmentation methods are the premise issue of accurate geometric modeling. Due to the complex chara...
详细信息
Smart accident detection systems are those that recognize accidents automatically. the Internet of things, or IoT, can connect the detectors and transmit the information to the destination. It can also perform operati...
详细信息
the Inclined Geosynchronous Orbit (IGSO) satellite has garnered significant attention for its extensive coverage and high-latitude capabilities. Traditionally, tracking methods rely on Two Line Element (TLE) data for ...
详细信息
the proceedings contain 25 papers. the topics discussed include: machine learning-based task allocation in computational networks;reinforcement learning based edge microservice migration strategy under resource constr...
ISBN:
(纸本)9798350369007
the proceedings contain 25 papers. the topics discussed include: machine learning-based task allocation in computational networks;reinforcement learning based edge microservice migration strategy under resource constraints;distributed sensor-assisted DNN-based massive-MIMO channel reconstruction;modeling and evaluation of low-frequency noise influence in a MIMO communication system;an anonymous authentication scheme based on blind signatures for the FIDO protocol;MANETs connectivity management for age of information decreasing in real-time applications;the equivalence principle for adaptive load balancing in networks and systems;how useful is communication scheduling for distributed training?;and HeavyCache: a generic sketch for summarizing data streams.
the intelligent question-answering system for electrical knowledge can be used to popularize electrical knowledge and increase public understanding of the power *** can also serve as an auxiliary tool for training and...
详细信息
Intelligent systems are not a new concept. It is generally accepted that the term 'artificial intelligence' or AI was first coined by Professor John McCarthy in 1956 and prior to that Alan Turing introduced wh...
详细信息
ISBN:
(纸本)9783031347344;9783031347351
Intelligent systems are not a new concept. It is generally accepted that the term 'artificial intelligence' or AI was first coined by Professor John McCarthy in 1956 and prior to that Alan Turing introduced what became known as the Turing Test in his 1950 paper, the Imitation Game. Given this relative longevity, it is perhaps surprising that the uptake of AI based systems in some sectors such as healthcare and education has been limited. this paper considers the deployment of an intelligent system in an educational context and proposes a model to inform the design of such based upon the relationship between trust and acceptance.
暂无评论