Cyberization is the foundation of vehicle electrification and automation, requiring the deployment of ever-increasing on-board sensing, communication, and computing services. However, vehicle cyberization also introdu...
详细信息
Cyberization is the foundation of vehicle electrification and automation, requiring the deployment of ever-increasing on-board sensing, communication, and computing services. However, vehicle cyberization also introduces new cyber vulnerabilities. In this article, we discuss the opportunities and challenges of using the common 12/24V automotive batteries as sensors and actuators to provide vehicles with three-pronged physical security protection: driver authentication, vehicle access control, and vehicle intrusion detection.
Intelligent automation has revolutionized logistics operations, especially warehouse management. This study provides an in-depth investigation into improving inventory management through the use of artificial intellig...
详细信息
The home automation System is a system in which home devices can be monitored and controlled remotely. Home automation is gaining popularity due to several advantages of the system. Fast-growing internet of things, th...
详细信息
Ensuring the security of Programmable Logic controllers (PLC) is crucial to protect Industrial control Systems (ICS) from potential risks and vulnerabilities. Therefore, research of security methodologies for PLCs has...
详细信息
ISBN:
(纸本)9798350358513;9798350358520
Ensuring the security of Programmable Logic controllers (PLC) is crucial to protect Industrial control Systems (ICS) from potential risks and vulnerabilities. Therefore, research of security methodologies for PLCs has been present for many years, including investigations of attack vectors and attack prevention at an early stage. The most common attack vectors of PLCs are carried out remotely, which might be mitigated by isolating PLCs to outer network. However, potential risks and vulnerabilities cannot be completely eliminated. This paper presents an attack vector of isolated PLCs by exploiting their backplane bus, which serves as the innermost communication layer of the system. By utilizing this layer, attackers may avoid confrontation with conventional softwarebased security techniques that protect PLCs from unauthorized access. To evaluate the feasibility of our technique, a malicious device is developed and enhanced to attack the industrial PLC called Revolution Pi (RevPi). Finally, countermeasures to prevent such attacks are proposed.
Gazecon, the proposed system uses eye gaze or eye control which is a non-verbal communication method that enables people with disabilities to put forward their requirements/needs. With the help of an eye control syste...
详细信息
Gazecon, the proposed system uses eye gaze or eye control which is a non-verbal communication method that enables people with disabilities to put forward their requirements/needs. With the help of an eye control system, people with disabilities can move without the assistance of others. This is very beneficial not only for the individuals with disabilities but also for the future of natural input. This system works in a manner where the web- camera of the device first detects the position of the eyes. Then the pupil of the eye is traced along with the various pupil variations as well. This tracing helps the disabled person to track their needs with their eyes and convey their needs to the caretaker. Since this system entirely depends on eye tracking technology, it is called a vision-controlled communication system. This paper consists of the experimentation results of the proposed system in different conditions like illumination, occlusion and quality difference in the feed in which the proposed system out performs all the existing solutions with a considerable accuracy.
In order to prevent contamination in R&D labs, a person counting and bending stance detection system is proposed in this study. The model can identify and monitor up to three people while bending into positions to...
详细信息
The proceedings contain 36 papers. The topics discussed include: towards efficient alternating current optimal power flow analysis on graphical processing units;perspective projection approach to a faster UAV navigati...
ISBN:
(纸本)9798350399837
The proceedings contain 36 papers. The topics discussed include: towards efficient alternating current optimal power flow analysis on graphical processing units;perspective projection approach to a faster UAV navigation and obstacle avoidance learning;using temporal user profiles in collaborative filtering recommender system;using genetic algorithms for load balancing in cloud computing;a simple and elegant method for computing the inverse z-transform of rational functions;enhancing performance of CUDA quicksort through pivot selection and branching avoidance methods;proposal of a model for credit risk prediction based on deep learning methods and smote techniques for imbalanced dataset;computation of discrete-time analytic signals;application of discrete-time analytic signals in power system analysis;analyzing transfer learning efficacy with different feature sets for occupancy detection;the synergy of linear regression, fuzzy functional dependencies and linguistic summaries: a case of heat islands in Bratislava;feature importance analysis for power circuit breaker vibration-based condition assessment;and decentralized multi-robot formation control using reinforcement learning.
This paper presents the development and implementation of an IoT-based Smart Home automation System using intelligent sensors. The system integrates various sensors, such as motion detectors, temperature, and gas sens...
详细信息
Breast cancer is a dreadful disease prevalent among most women these days. The cause of these is still a mystery, some believe that this might be due to the lifestyle followed in this era. Mammography, a screening met...
详细信息
The primary objective of this research is to develop a small slotted microstrip patch antenna with a defected ground plane that can effectively detect brain tumors. The proposed antenna design utilizes an FR4 substrat...
详细信息
暂无评论