Modern healthcare is going through a big change because of the way that new tools are proposed. This paper works at how the Internet of Things (IoT), heterogeneous data transfer and processing, and Artificial Intellig...
详细信息
This paper addresses a risk-sensitive remote estimation problem for cyber-physical systems (CPSs) where the accurate model of a dynamic system is not completely known or may differ from the assumed model. In CPSs, sen...
详细信息
ISBN:
(数字)9798350368031
ISBN:
(纸本)9798350368048
This paper addresses a risk-sensitive remote estimation problem for cyber-physical systems (CPSs) where the accurate model of a dynamic system is not completely known or may differ from the assumed model. In CPSs, sensors and the monitoring control center are remotely located. Sensors transmit the measurements via unreliable wireless communication channels that are vulnerable to cyber-attacks. Specifically, attackers can inject false data to alter the measurements in the communication channel or attack sensors. To tackle this, we design a risk-sensitive filtering algorithm to operate under false data injection attacks. The proposed estimator aims to minimize the risk-sensitive error criterion, defined as the expectation of the accumulated exponential quadratic error. Simulation results demonstrate the effectiveness of the proposed algorithm.
This design is based on single chip microcomputer intelligent home speech recognition control system, the system is composed of software and hardware parts. The hardware part basically includes the voice recognition p...
详细信息
The proliferation of IoT devices has led to various computer vision applications, where addressing bandwidth and latency challenges through edge nodes presents significant benefits. However, there are still existing g...
详细信息
ISBN:
(纸本)9798350304831
The proliferation of IoT devices has led to various computer vision applications, where addressing bandwidth and latency challenges through edge nodes presents significant benefits. However, there are still existing gaps and a need for improvements to optimize IoT applications, especially in the field of computer vision, by overcoming limited resources and enhancing device performance. Addressing these challenges is essential to unlock the full potential of IoT applications in real-world scenarios. This paper evaluates the use of lightweight container technology for computer vision applications which using different algorithms, such as Haar Cascades, HOG and CNN with YOLO algorithm, on edge devices and provides a comprehensive comparison and analysis of different versions of computer vision applications in containers in terms of processing ability, and performance. It focuses on containerizing computer vision applications using Docker to achieve safe execution of multiple applications on these devices without interference and to enable flexibility, efficiency, portability, scalability, and isolation. The study also examines the resource usage, execution time, and receiving time of containerized computer vision applications. The research findings significantly advance our understanding of computer vision processing in IoT and edge computing, thereby opening up new avenues for real-time computing scenarios. These insights have the potential to drive transformative advancements in the field, enabling more efficient and accurate computer vision applications in IoT and paving the way for enhanced real-time decision-making, automation, and intelligent systems.
Learning driving policies to control autonomous vehicles via reinforcement learning (RL) offers a solution to learn optimal driving behavior directly from sensor data. However, designing a reward function that leads t...
详细信息
Among the main causes of cancer-related death worldwide are lung and colon cancers. Early malignant tumour discovery and precise classification of them define both appropriate treatment and better patient outcomes. Th...
详细信息
In many European countries, up to 90% of glass is recycled. The glass is often collected in large, open, publicly placed metallic or plastic containers. In order to optimize the collection process, reliable informatio...
详细信息
This research study proposes a novel approach to secure communication that blends RSA cryptography and steganography. Using Java, Python, and JavaScript, the authors describe a full framework for secretly sending and ...
详细信息
Genetic algorithm (GA) is an effective method for path planning problems. As a powerful variant of GA, island genetic algorithm (IGA) has considerable improvement in performance. In this paper, a new island model of G...
详细信息
The increased use of commercial Unmanned Aerial Vehicles (UAVs) has generated a great interest in their potential to be used for transporting loads and other equipment. However, as the attraction of a UAV is its versa...
暂无评论