This paper presents a design scheme of a smart shoe device based on the Internet of Things technology and integrated navigation system, aiming to provide more effective and convenient safety products for the elderly, ...
详细信息
This research presents a novel weapon detection system that combines state-of-the-art technologies for enhanced security. The system integrates a Convolutional Neural Network (CNN) for precise image-based weapon class...
详细信息
This paper presents a full analysis of the state of electrification technologies today, including a synopsis of recent developments and new trends. Electrification is essential to the transformation of many industries...
详细信息
This paper aims at the problem of lightweight design of a leading tank truck production enterprise in China. It analyzes the methods of lightweight and combines them with the actual requirements. Using ANSYS software,...
详细信息
In this project, ant algorithm and neural network technology are organically integrated to study a new fault diagnosis method. Then the ant algorithm is used to optimize the weight of the neural network, and the optim...
详细信息
Cardiac-related diseases always lead to fatal consequences around the globe. This research includes vague data analysis of the data related to cardiac anomalies. This study proposes a method to develop a dimension red...
详细信息
The growth in data volume poses a challenge to query processing. On the other hand, advancements in technology have made multicore CPUs available in many inexpensive servers. so parallel query based on multicore CPU i...
详细信息
The purpose of this conference paper is to reveal the current state of seismic performance research on bamboo structural buildings based on a systematic literature review. The significant contribution by China to this...
详细信息
Aiming at LEACH protocol in wireless sensor network energy consumption problems such as imbalance, random selection of cluster nodes, a LEACH-PM protocol was proposed, leveraging a fixed cluster swarm and multi-hop tr...
详细信息
Malicious URLs promoting threats like phishing and malware result in massive financial losses worldwide. Automated identification of such URLs before users access them is crucial for cybersecurity. This paper investig...
详细信息
暂无评论