The effective approach of monitoring electricity using an IOT-CLOUD computing system and an electricity sensor. The use of smart energy metres and electricity sensors in IOT-CLOUD computing-powered smart automation de...
详细信息
This article delves into cloud computing technologies, addressing the challenges and concerns that arise in this domain, specifically focusing on resource allocation. We investigate and compare three optimization algo...
详细信息
Digital information exchange has become commonplace due to the growth of the internet and information technology breakthroughs. Academic institutions are placing a greater emphasis on developing digital campuses, of w...
详细信息
ISBN:
(纸本)9798331540661;9798331540678
Digital information exchange has become commonplace due to the growth of the internet and information technology breakthroughs. Academic institutions are placing a greater emphasis on developing digital campuses, of which digital libraries are an essential part. Though cloud computing is a well-known idea, what matters more are the security precautions performed within the cloud environment. Numerous technologies have been developed in recent years to offer cloud network security. This paper investigates the integration of Virtual Private Networks (VPNs) for improving data security and access control in library management systems, which enables logical separation between public and private clouds, to facilitate remote access to digital library resources securely and effectively. There are undoubtedly many risks to the public cloud because resources within it are accessible to everybody. With the aid of the Amazon Virtual Private Cloud (VPC), these potential risks are effectively avoided. We have presented VPC principles and examples in this article, along with an explanation of the benefits and necessity of VPC. The implementation involves creating a VPC, setting up gateways, configuring route tables, and establishing both private and public subnets. Secure Shell (SSH) keys and EC2 instances are utilized to deploy OpenVPN, followed by RDP connections. This setup provides a secure, encrypted tunnel specifically for the library management website, allowing authorized users to access resources from anywhere.
Wireless network simulation is the main method to evaluate network performance and communication equipment to access the network. It plays an important role in the whole life cycle of wireless network. Wireless networ...
详细信息
Cooperative embodied AI systems, where multiple agents collaborate to accomplish complex, long-horizon tasks, show significant promise for real-world applications. These systems integrate perception, cognition, and ac...
Hybrid renewable generators are attractive solutions to achieve sustainable and clean electric power. Such systems require proper component selection criteria and control strategies as these systems can operate in iso...
详细信息
ISBN:
(纸本)9798350348033
Hybrid renewable generators are attractive solutions to achieve sustainable and clean electric power. Such systems require proper component selection criteria and control strategies as these systems can operate in isolated and grid-connected mode. This paper aims to illustrate the design, control, and investigation of two different stand-alone distributed generation (DG) configurations based on proton exchange membrane fuel cell (PEMFC) and wind energy conversion systems (WECS). Apart from these stand-alone system configurations, the paper also investigates a grid-connected WECS-FC-based hybrid DG model in order to validate the design and control aspects of a typical grid-integrated hybrid system. A special emphasis is given to the effect of unbalance fault or a voltage sag in a grid-connected hybrid system. It is significant to state that the design of a hybrid energy system is also dependent on the control philosophy adopted. Thus, the typical control philosophy for interfacing inverter which is operating either in stand-alone or in gridconnected mode is also discussed in this paper. The above investigation studies assist the research community with the typical design calculations and also with the proposal of new fault ride-through (FRT) control schemes.
This study introduces an optimized Mobile Edge computing (MEC) framework specifically designed for telemedicine applications. By integrating deep reinforcement learning (DRL), we develop a system that enhances task of...
详细信息
Smart energy encompasses concepts and technologies designed to ensure a sustainable energy future for humanity. One innovative solution for energy generation in isolated areas, where conventional energy sources are no...
详细信息
Low-power operation of power-hungry MOX sensors is usually achieved by duty cycling them periodically. However, a difficulty arises if a sensor is operated at irregular time intervals due to intermittent energy availa...
详细信息
ISBN:
(纸本)9781665439299
Low-power operation of power-hungry MOX sensors is usually achieved by duty cycling them periodically. However, a difficulty arises if a sensor is operated at irregular time intervals due to intermittent energy availability in energy-neutral or batteryless applications. In this work, we propose a compensation method which re-maps on-demand measurements to virtually duty-cycled readings in the value domain by taking the duration of the last off-time into account. We evaluate our compensation algorithm based on Sensirion's SGP30 sensor and achieve up to 79% accuracy improvement compared to uncompensated measurements.
Attention Deficit Hyperactivity Disorder (ADHD) profoundly impacts children, often extending into adulthood. Timely identification and intervention are critical. This paper explores ADHD assessment by integrating chil...
详细信息
暂无评论