The article examines the application of a method for processing experimental data in measurement systems by generating hypotheses about the presence of a given set of parameters and estimating their probability. The d...
详细信息
This paper presents a real-time robotic movement control system (RMCS) utilizing hand gesture recognition through a Cascaded CNN-SVM approach. The system was designed to enhance human-robot interaction by allowing use...
详细信息
Mobile robots continue to play a pivotal role in various industries, safeguarding their operations against unauthorized access and cyber-attacks becomes increasingly critical. The burgeoning adoption of ubiquitous ser...
详细信息
Accurate fetal growth evaluation is critical for monitoring pregnancy health and delivering appropriate prenatal treatment. We provide a unique strategy for improving the precision of fetal growth assessment by mergin...
详细信息
A novel robust composite event-triggered model predictive control method is proposed for linear parameter-varying systems. The proposed controller integrates the nominal and robust compensation elements for optimal co...
详细信息
As a matter of fact, communication has been rapidly developed in recent years. This research examines the technological upgrade from 5G to 6G, focusing on protocol improvements, hardware advances, and future challenge...
详细信息
In today's world, automatic coffee makers are essential to provide effective and refreshing beverage service. This paper introduces an innovative control algorithm specifically designed for coffee automation syste...
详细信息
Automating the configuration of 5G core networks (CNs) is crucial for meeting increasingly diverse and specialized application requirements. In this paper, we propose an intent-driven automation model for configuring ...
详细信息
The growing need for high-performance, energy-efficient computing devices has led to the continued development of approximate computing techniques. A high-speed variable precision approximate BFloat16 multiplier is pr...
详细信息
As our cities become more intelligent and more connected with new technologies like 6G, improving communication between vehicles and infrastructure is essential while reducing energy consumption. This study proposes a...
详细信息
ISBN:
(纸本)9781728190549
As our cities become more intelligent and more connected with new technologies like 6G, improving communication between vehicles and infrastructure is essential while reducing energy consumption. This study proposes a secure framework for vehicle-to-infrastructure (V2I) backscattering near an eavesdropping vehicle to maximize the sum secrecy rate of V2I backscatter communication over multiple coherence slots. This sustainable framework aims to jointly optimize the reflection coefficients at the backscattering vehicle, carrier emitter power, and artificial noise at the infrastructure, along with the target vehicle's linear trajectory in the presence of an eavesdropping vehicle in the parallel lane. To achieve this optimization, we separated the problem into three parts: backscattering coefficient, power allocation, and trajectory design problems. We respectively adopted parallel computing, fractional programming, and finding all the candidates for the global optimal solution to obtain the global optimal solution for these three problems. Our simulations verified the fast convergence of our alternating optimization algorithm and showed that our proposed secure V2I backscattering outperforms the existing benchmark by over 4.7 times in terms of secrecy rate for 50 slots. Overall, this fundamental research on V2I backscattering provided insights to improve vehicular communication's connectivity, efficiency, and security.
暂无评论