Hydraulic system comprehension forms the pillar ofnumerous engineering fields;however, its academic assimilation remains intricate. Addressing this, our research introduces a digital twin-enabled virtual hydraulic wor...
详细信息
Indoor positioning systems (IPS) continue to encounter significant challenges in achieving meter-level accuracy, particularly in large and intricate environments such as airports, hospitals, and industrial sites. Desp...
详细信息
Mammalian locomotion is a complex behavior arising from interaction between neural and biomechanical systems, driven by rhythmic activity originating in the spinal cord. Although it has been extensively studied, the s...
详细信息
This study investigates the prediction of tropospheric ozone concentration, a critical aspect of air quality assessment. We utilized machine learning techniques, including Multilayer Perceptron (MLP), Deep Neural Netw...
详细信息
Saudi Arabia's Vision 2030 emphasizes renewable energy to drive sustainable development, particularly leveraging solar power due to abundant sunshine. However, integrating solar photovoltaic (PV) systems into exis...
详细信息
Sign language recognition and translation (SLRT) aims to convert sign language into textual representation, which holds significant importance for the deaf community. Sign language possesses complex and diverse gramma...
详细信息
The increasing prevalence of Android malware necessitates the development of robust and accurate prediction models to safeguard users and their sensitive data. This study aims to develop reliable Android malware predi...
详细信息
Fatigue is a prevalent issue that disrupts the overall well-being of individuals, leading to impaired cognitive functions such as learning, thinking, reasoning, remembering, and problem-solving. Chronic fatigue signif...
详细信息
This article presents a comparative analysis of two simulation environments for robots and robotic systems - Gazebo and CoppeliaSim. The study evaluates their functionality and effectiveness for teaching students robo...
详细信息
The Cyber Kill Chain is a concept used to model the steps an intruder must perform in order to achieve their objectives. It comprises a series of steps that must be accomplished by the attacker [1]. Most defense mecha...
详细信息
暂无评论