With the continuous development of human society, the global warming caused by greenhouse gas emissions is becoming more and more serious. In order to better cope with global warming, this paper uses the SARIMA model ...
详细信息
We present an optimal power allocation method to improve the energy efficiency (EE) of visible light communications (VLC) based on non-orthogonal multiple access (NOMA). The EE optimization model is established under ...
详细信息
ISBN:
(纸本)9798350374377
We present an optimal power allocation method to improve the energy efficiency (EE) of visible light communications (VLC) based on non-orthogonal multiple access (NOMA). The EE optimization model is established under the constraints of minimum data rate, maximum transmission power, successive interference cancellation (SIC) and direct current (DC) bias of the multiplexing light-emitting diodes (LEDs). Then an iterative power allocation algorithm is proposed to exploit the solution of the EE optimization problem. The simulation results show that the proposed power allocation algorithm can significantly improve the system EE.
DevOps is a software development and IT operations approach that emphasizes collaboration, automation, and efficiency throughout the software development lifecycle (SDLC). DevSecOps builds on this idea by adding secur...
详细信息
Nonlinear vector autoregression (NVAR), as an effective alternative to traditional reservoir computing (RC), has garnered significant attention in the field of time series prediction in recent years. Unlike convention...
详细信息
Spark plugs are vital components in a variety of industries, yet their fault diagnosis is still performed manually. We propose a vision-based, low-power spark plug fault diagnosis system. We present two use cases for ...
详细信息
To combat water inefficiencies and subpar agricultural yields, Agriculture 4.0 incorporates Industry 4.0 technologies into farming methods. Examples of these solutions include smart irrigation systems. Agriculture 4.0...
详细信息
Critical machine-type relationships (mc MTC) has become known as a crucial element within the Business Internet of Things (IoT) ecosystem, showcasing lucrative opportunities in disciplines like autonomous vehicles, in...
详细信息
Utilizing the cloud implies having organized assets, particularly information and administration, accessible at whatever point you would like them without requiring uncommon client courses of action. More as of late, ...
详细信息
ISBN:
(纸本)9798350368109
Utilizing the cloud implies having organized assets, particularly information and administration, accessible at whatever point you would like them without requiring uncommon client courses of action. More as of late, CC has developed into a arrange of both open and private datacenters advertising clients a single online course of action. By putting preparing and information capacity closer to the end clients, edge computing may be a forward-thinking approach to computers that guarantees to speed up reaction times and spare transfer speed. Versatile phone applications are dispersed by means of versatile gadgets that give scattered computing. By the by, security concerns with CC and edge computing, such deciding client defenselessness and organization together declaration, make it troublesome to rapidly distinguish compute models. Machine learning is the consider of computational processes on computers that truly gotten to be way better with involvement. In this investigate extend, we offer an examination of CC security dangers, issues, and strategies that utilize one or more ML calculations. Fortification, semi-supervised, uncontrolled, and synchronized learning are among the obvious machine learning computations that are surveyed in arrange to fathom cloud security issues. Following, we compare the points of interest, drawbacks, and focuses of intrigued of each methodology to decide how viably it was executed. Furthermore, we select to investigate up and coming ponders centered on secure CC models. Since cloud computing offers unmatched adaptability, adaptability, and cost-efficiency, it has totally changed how businesses store, process, and oversee information. But this fast acknowledgment has moreover brought up genuine security issues, requiring solid and intelligent security strategies to defend basic information. With the improvement of advanced strategies for danger location, inconsistency recognizable proof, and interruption avoidance, machine learning (ML) a
In the article, a method of synthesizing stable control laws for ball and beam system in the presence of disturbances is presented based on synergetic control theory. The ball and beam system is a short mechanical sys...
详细信息
The proceedings contain 141 papers. The topics discussed include: power comprehensive energy optimization scheme based on improved PSO algorithm;new energy distribution network scheduling based on optimized PSO;time d...
ISBN:
(纸本)9781643684864
The proceedings contain 141 papers. The topics discussed include: power comprehensive energy optimization scheme based on improved PSO algorithm;new energy distribution network scheduling based on optimized PSO;time domain dielectric spectrum analysis of high voltage bushing insulation state based on wavelet transform;modeling and simulation of intelligent vehicle flow guidance based on agent;a video resource recommendation system based on deep learning;human motion data acquisition system of intelligent motion bracelet based on human-computer interaction;fast estimation model of green building project cost based on support vector regression machine;intelligent recommendation method for talent resources based on big data;improved human resource allocation method based on genetic algorithm;and intelligent temperature monitoring for high voltage cable with non-invasive low power consumption.
暂无评论