Blockchain technology has gained reputation over the years, and its potential in revolutionizing the world is absolute. Blockchain offers enhanced security, transparency, credibility, and authenticity in storing data....
详细信息
the cognitive complexity of a software determines the human comprehension effort to determine its underlying logic. the human comprehension effort preliminary depends on the person, who deals withthe software, the so...
详细信息
Withthe exponential increase in the number of mobile devices in the battlefield environment, UAV technology and edge computingtechnology have been widely used in battlefield command and communication processes. Base...
详细信息
ISBN:
(数字)9781665482233
ISBN:
(纸本)9781665482233
Withthe exponential increase in the number of mobile devices in the battlefield environment, UAV technology and edge computingtechnology have been widely used in battlefield command and communication processes. Based on this, this paper proposes a battlefield-oriented Flying ad-hoc networks based on mobile edge computing (FAN-MEC), and combines Software Defined Network (SDN) technology to optimize the network architecture. At the same time, this paper introduces the functional architecture and command architecture of the network, and finally introduces the related research on key technologies.
An integration of computer vision algorithms, machine learning, and deep learning to extract information from digital photos is particularly important in dermatology for the early identification and treatment of disea...
详细信息
this research work addresses issues related to developing an effective and efficient Animal Footprint, classification and tracking system. Successful attempts towards developing algorithmic models for animal segmentat...
详细信息
In the field of mechanical fault diagnosis, deep learning models have demonstrated strong performance. However, limited focus has been directed towards the robustness of these models in resisting adversarial attacks. ...
详细信息
Advancements in the field of Image processing, remotely controlled Unmanned Aerial Vehicle (UAV) and battery technologies it has become a promising solution to the modern world when it comes to surveillance and produc...
详细信息
Request-response computing is a model of communications in which a client requests for service and the server responds with response. It is a model that is most widely used in modern day computing and is more reliable...
详细信息
Multiple-Input-Multiple-Output technology has been instrumental in the way we communicate wirelessly. It is a key factor in the overwhelming growth of modern communication systems, providing higher data transfer and i...
详细信息
Traffic sign recognition is crucial in enabling intelligent driving. this paper proposes a robust hierarchical traffic sign image recognition algorithm that maintains local topology. the algorithm is divided into two ...
详细信息
暂无评论