This research aims to integrate TrOCR, an advanced Optical Character Recognition (OCR) technology, with the Langchain framework for Document question answering on image-based queries. The college has many number of st...
详细信息
This study introduces a novel FLOPs-Aware Knowledge Distillation (FAKD) framework tailored for TinyML applications in agriculture. By integrating Floating Point Operations (FLOPs) as a regularization term into the dis...
详细信息
We propose a new method that transmits a frame containing event location information in V2I LAN environments upon the occurrence of an event. In traditional navigation systems, external servers connected via the inter...
详细信息
ISBN:
(纸本)9791188428137
We propose a new method that transmits a frame containing event location information in V2I LAN environments upon the occurrence of an event. In traditional navigation systems, external servers connected via the internet analyze traffic conditions and calculate estimated travel times based on real-time traffic information, GPS data, and user information. The results are then transmitted to the in-vehicle navigation system. However, these systems have limitations in immediately reflecting delays caused by real-time accidents in route settings. We propose an event information delivery method that quickly triggers a change to a new route by transmitting event information (such as accidents or blockages) within the local area, without communicating with servers in external networks. In addition, we describe a packet format in which location information is included in the header to reduce the delay and algorithms applied to the proposed method for transmitting event information from the AMU and replanning route based on event information in the AMU. To evaluate the performance of this new system, we calculate the end-to-end delay in the worst case and assess the effectiveness of the proposed system based on this. Copyright 2025 Global IT research Institute (GIRI). All rights reserved.
With the deepening reform and construction of the police system, it is imperative to fully utilize technologies such as artificial intelligence, big data, blockchain, cloud computing, and the Internet of Things to rap...
详细信息
The growing demand for renewable electricity resources has improved the need for green and reliable electricity storage structures. Batteries have emerged as one of the number one solution for storing renewable electr...
详细信息
We developed a novel theoretical model of a dual-wavelength laser amplifier based on intra-cavity pumping technology. In this model, we derived analytical expressions for the output power of the dual-wavelength laser ...
详细信息
Multi-unmanned aerial vehicle path planning encounters challenges with effective obstacle avoidance and collaborative operation. The study proposes a swarm planning technique for unmanned aerial vehicles, based on an ...
详细信息
This research focused on developing and implementing a fault detection model for photovoltaic (PV) systems in remote areas, utilizing a Fuzzy-Based Multiple Linear Regression (FMLR) approach. The study aimed to addres...
详细信息
Automated Audio Captioning (AAC) focuses on producing detailed descriptions for a wide range of sounds, including those from nature and human activities. Recently, this field has garnered significant research attentio...
详细信息
The Open Charge Point Protocol is a widely adopted communication standard that facilitates interoperability between Charge Points and Central Systems in the electric vehicle charging ecosystem. This paper explores the...
详细信息
ISBN:
(纸本)9791188428137
The Open Charge Point Protocol is a widely adopted communication standard that facilitates interoperability between Charge Points and Central Systems in the electric vehicle charging ecosystem. This paper explores the security implications of OCPP 1.6, with a particular focus on the risks posed by spoofed or unauthorized messages. We propose a rollback mechanism utilizing the DataTransfer PDU to mitigate these risks, allowing the Central System to trigger reversion of unauthorized changes at the CP level. The proposed solution ensures secure, efficient management of configurations and mitigates potential threats such as replay attacks, spoofed requests, and unauthorized modifications. This paper contributes to the growing body of knowledge on securing EV charging infrastructure by highlighting underexplored vulnerabilities in OCPP 1.6 and providing practical solutions to enhance the security and resilience of the protocol. Copyright 2025 Global IT research Institute (GIRI). All rights reserved.
暂无评论