Atmospheric duct (AD) is a natural phenomenon affected by humidity or air pressure diversities, which impacts the propagation of electromagnetic signals. Recent studies have been focused on ADH prediction based on met...
详细信息
As the number of the Internet of things (IoT) devices connected to the internet increases, the amount of data explodes. this leads to a higher demand for internet speed during data transfer and more requirements for c...
详细信息
ISBN:
(数字)9798331531836
ISBN:
(纸本)9798331531843
As the number of the Internet of things (IoT) devices connected to the internet increases, the amount of data explodes. this leads to a higher demand for internet speed during data transfer and more requirements for computing power and storage in central servers. To address these issues and enable real-time data processing while reducing network bandwidth utilization, edge computing has become a promising solution. this article focuses on the development of the IoT application on the edge computing platform in case of the mobility of the User Equipment (UE) to solve problems like latency and network bandwidth occupation for IoT applications while moving between two zones. the methodology involves simulating a network model to evaluate performance metrics such as latency and bandwidth under mobility conditions. Results demonstrate that latency is reduced to approximately 30-50 ms during UE mobility, highlighting the efficacy of Multi-access Edge computing (MEC) in IoT systems. these findings suggest that edge computing can significantly enhance the performance of time-sensitive IoT applications.
the proceedings contain 61 papers. the special focus in this conference is on Soft computing Models in Industrial and Environmental applications. the topics include: Improving the Efficiency of Production Pr...
ISBN:
(纸本)9783031750090
the proceedings contain 61 papers. the special focus in this conference is on Soft computing Models in Industrial and Environmental applications. the topics include: Improving the Efficiency of Production Processes by Reducing Human Errors Using Intelligent Methods;automated Semantic Labelling of Images Generated with Deep Diffusion Probabilistic Models;wastewater Quality Indicator Estimation Using Machine Learning and Data Augmentation Techniques;a Virtual Avatar for Sign Language Signing;comparison of D-Wave Quantum computing Environment Solvers for a Two-Machine Jobs Scheduling Problem;hybrid Fuzzy-Based Method for Optimally Selecting Aircraft for Low-Cost Carriers Operating Medium-Haul Flights;two Way Ranging Positioning Methods Analysis Under Optimized Sensor Deployments;human Acoustic Events Detection as Anomalies in Industrial Environments Using Shallow Unsupervised Techniques;Machine Learning in the Last-Mile Delivery: Modified Q-Learning for the TSP;IoT and AI Based Security System – Design and Implementation;characterization of Cattle Behavior Based on Dimensional Reduction Techniques;time Series Forecasting in Agriculture: Explainable Deep Learning with Lagged Feature Selection;artificial Intelligence Methodology for Run-to-Target Manufacturing;multi-robot Path Planning Problem Applied to real World Enviroment;an Approach of Optimization in Capacitated Vehicle Routing Problem in Logistics Distribution;bayesian Generation of Synthetic Data;learning-Based Models for Intelligent Control Over Air Conditioning Units in a Smart Building;predicting Power Generation from Photovoltaic Energy System;photovoltaic Generation Forecasting for Intelligent Management in Energy Communities;application of Neural Models in Solar Radiation Measurements for a Better Data Gathering Quality;caravels: A Decentralized Container-Based Infrastructure for Sustainable Human-Centric Intelligent Energy Communities;Production Scheduling for Energy Cost Optimization with Constraints: Com
Digital Twins (DTs) are digital representations of physical objects or processes that can be used for their computer-based analysis. this technique has been used in different fields to analyze, simulate, and optimize ...
详细信息
In this research investigation, the authors present some important applications of the rigor presentment in the universal representation theory, rigor I, II, and III. these include—outline solution to the Poincare’s...
详细信息
this report explores the integration of high-end neural network models into embedded systems, its advantages over the high-end computers and Cloud-based inferencing to overcome the drawbacks such as cost, power consum...
详细信息
the proceedings contain 68 papers. the special focus in this conference is on computing, Communications, and Cyber Security. the topics include: Compact and High-Gain RFID Reader Antennas for Future Internet of things...
ISBN:
(纸本)9789819773701
the proceedings contain 68 papers. the special focus in this conference is on computing, Communications, and Cyber Security. the topics include: Compact and High-Gain RFID Reader Antennas for Future Internet of things applications;Enabling Modern IoT Solutions with RFID Devices via an Integrated Feeding Network-Fed Ultra-Wide HPBW Patch Antenna Array;A Compact and Extremely Stiffness CPW-Fed Metal-Only Patch Antenna Array for Unlimited Lifetime 2U CubeSat Mission Capabilities;Jeans-Based UWB UHF Textile Patch Antenna for IoT applications;Design and Fabrication of PCB-Based Proximity Sensors for Application in Automatic Railway Crossing System;feaTrim-ViT: Vision Transformer Trimming with One Shot Neural Architecture Search in Continuous Optimisation Space and Efficient Feature Selection;detecting Depressive Symptoms on Social Media: A Comprehensive Review of Methodologies and Strategies for Suicide Prevention;enhancing Video Content Accessibility through YouTube Transcript Summarization;Enhanced Rear-End Collision Detection and Localization Scheme Using LSTM, DRNN, and DNN in Fog-Based Internet of Vehicles;security threats and Data Protection Methods Used in Cloud computing: A Review;load Balancing Algorithms for Cloud computing Performance: A Review;seamless Mobility: Innovating the Digital Service Landscape in Telecom Industry;Pandemic Pulse: Unveiling Insights withthe Global Health Tracker through AI and ML;CNN-Based Model for real-time Identification of Face Masks;a Systematic Review of Deepfake Detection Using Learning Techniques and Vision Transformer;probabilistic Forecasting Prediction Model for Anticipating Days with Elevated Air Pollution;optimizing Graph Colorings: Unleashing the Power of Heuristic Algorithms for Enhanced Problem-Solving;a Load Balancing Approach Using Binary Search;enhancing Software Reliability through Hybrid Metaheuristic Optimization.
Vehicle-to-Everything (V2X) communication is crucial for the advancement of modern transportation systems, enabling real-time, dependable, and actionable data exchange. this technology facilitates the dissemination of...
详细信息
ISBN:
(纸本)9783031800191;9783031800207
Vehicle-to-Everything (V2X) communication is crucial for the advancement of modern transportation systems, enabling real-time, dependable, and actionable data exchange. this technology facilitates the dissemination of Basic Safety Messages (BSMs) between vehicles and infrastructure, thereby enhancing safety, mobility, and environmental applications. Ensuring the integrity and accuracy of V2X data is vital for effective decision-making. this paper leverages the VEINS simulation framework to introduce 25 new sophisticated attacks aimed at four newly developed safety applications. these applications have been meticulously developed from scratch. Moreover, we introduce a multi-label attack generation technique, enabling multiple simultaneous attacks within a single data packet. For instance, coordinated attacks where speed adjustments are synchronized with changes in acceleration, increasing their complexity and detection difficulty. Central to our work are the advanced detection mechanisms designed to operate on Roadside Units (RSUs). these mechanisms employ trained algorithms to identify and neutralize malicious packets in real-time simulations, significantly bolstering the security of V2X systems. this comprehensive framework not only aims to reinforce the security infrastructure of V2X networks but also to guide standardization efforts and inform deployment strategies. Additionally, the implementation of digital certificates for digital signatures serves as a primary defense against malicious entities, ensuring the authenticity and integrity of V2X communications. Our objective is to provide the security community with an effective tool for developing a resilient and secure V2X ecosystem.
Withthe increase of computing-intensive and delay-sensitive applications, mobile edge computing (MEC) technology has sprung up. It effectively satisfies the needs of user equipment (UE) for real-timecomputing resour...
详细信息
Traffic flow data is essential for urban planning, logistics, transport management, and similar applications. However, achieving full sensor coverage across a road network is often infeasible due to high installation ...
详细信息
暂无评论