In the age of automation, a growing number of devices require high dimensional data to increase the reliability of the machines to better predict and classify objects for autonomous decision-making. 3D object detectio...
详细信息
Traffic congestion is an inescapable issue in contemporary urban life, leading to time wastage and increased accident risks. This paper presents an innovative approach that harnesses machine learning and computer visi...
详细信息
This paper develops a new ontological-based approach to network slicing in 5G backhaul networks, targeting low- or ultra-low-latency services. Our approach supports a modified A∗ approach with management of congestion...
详细信息
Hardware is the foundation of many systems ranging from embeddedsystems, and Internet of Things devices, to cyber–physical systems. The increasing design complexity of hardware continues to challenge our ability to ...
详细信息
Hardware is the foundation of many systems ranging from embeddedsystems, and Internet of Things devices, to cyber–physical systems. The increasing design complexity of hardware continues to challenge our ability to provide robust security guarantees, thereby undermining the security of systems and resulting in security breaches and leakage of private information. The direct and indirect costs of addressing security vulnerabilities (e.g., root cause analysis, deploying fixes and mitigations, and risk of product recalls) not only damage the reputation of a company, but also prolong time-to-market deadlines, thereby squeezing the supply chain. To this end, researchers from academia and industry have been developing tools and techniques that can help identify and mitigate security issues in hardware, thereby building a bedrock for system security. One important task toward this ambitious goal is to identify the best set of attack and defense tools and techniques in hardware and embedded security, which typically spans many communities ranging from devices to circuits to architecture to CAD to cryptography. This special issue presents the articles selected during the third edition of the workshop “Top Picks in Hardware and embedded Security” (shortly, Top Picks) held virtually (due to COVID-19) on November 5, 2021, “co-located” with the ieee/ACM internationalconference on Computer- Aided Design.
This study presents the development and evaluation of a smart wearable belt designed for comprehensive health monitoring and fall detection. The wearable integrates advanced sensors, including vibration and heartbeat,...
详细信息
As malfunctioning devices may lead to expensive plant downtimes or to severe safety risks, monitoring of industrial plants and their devices is a crucial task. There are many providers for device monitoring solutions ...
详细信息
ISBN:
(数字)9781665499965
ISBN:
(纸本)9781665499965
As malfunctioning devices may lead to expensive plant downtimes or to severe safety risks, monitoring of industrial plants and their devices is a crucial task. There are many providers for device monitoring solutions on the market. However, integrating third-party monitoring approaches into real industrial systems, especially for time-critical data, is complicated due to mismatching APIs and different parties using different formats for specifying the involved assets and data. This leads to expensive, time-taking, and error-prone manual work. In this paper, we present an edge-computing-based approach to integrate monitoring functionality in an industrial IoT system. It addresses the presented challenges by combining edge computing with an Industry 4.0 information modeling and access format, the Asset Administration Shell.
The article describes a new method for image detection using machine learning, based on the development of sophisticated security systems tailored for examining digital media to identify and scrutinize altered images....
详细信息
This paper introduces Agri Sage, a mobile application aimed at addressing critical challenges in modern agriculture. Agri Sage integrates real-time plant disease detection using machine learning, an e-commerce platfor...
详细信息
Recent advancements in the field of Extended reality (XR) have increasingly integrated AI (Artificial Intelligence) technologies to enhance user experience and interactions. These are now crucial in XR applications in...
详细信息
As the complexity and scale of project management continue to grow, traditional project management methods struggle to meet the demands for efficiency and transparency. Intelligent project management leverages modern ...
详细信息
暂无评论