Across all industries, cloud-based automated control systems have completely changed how operational and environmental parameters are tracked and controlled. With cloud-integrated systems for real-time data collection...
详细信息
ISBN:
(数字)9798331518578
ISBN:
(纸本)9798331518585
Across all industries, cloud-based automated control systems have completely changed how operational and environmental parameters are tracked and controlled. With cloud-integrated systems for real-time data collection, processing, and control, this concept presents intelligent, remote-controlled workshops and control rooms. To guarantee accurate control of crucial variables like temperature, humidity, pressure, and equipment efficiency, these systems make use of IoT devices, AI techniques, and big data analytics. Through sophisticated data perspectives, the cloud-based strategy enables predictive maintenance, improves flexibility, and lowers operating expenses. Stakeholders may make prompt, data-driven choices from anywhere with remote access to control rooms. These seminars provide practical experience with cloud-controlled settings and function as training and development centres. The system's flexibility to meet a range of industrial demands is further enhanced by its compatibility with external tools and equipment. The design, deployment, and possible uses of cloud-based control systems are covered in this paper, with an emphasis on how they might promote operational excellence, energy efficiency, and smart manufacturing.
In this paper, we examine the cybersecurity vulnerability assessment method of medical software. Medical software processes patient sensitive data and is linked to various medical devices and systems in real time. Due...
详细信息
ISBN:
(数字)9798331510756
ISBN:
(纸本)9798331510763
In this paper, we examine the cybersecurity vulnerability assessment method of medical software. Medical software processes patient sensitive data and is linked to various medical devices and systems in real time. Due to these characteristics, medical software is highly likely to be exposed to various cybersecurity threats such as ransomware, data leakage, and medical device hacking. Based on the international standard IEC TS 60601-4-5, we propose threat modeling, vulnerability scanning, and penetration testing as a methodology for assessing the security vulnerabilities of medical software. Through this, we can identify security vulnerabilities in advance and prepare measures to respond quickly. We can prevent security threats and improve the safety of medical software through response strategies such as security patches and updates, network separation, data encryption, and security education. In conclusion, strengthening the security of medical software is essential to maintain patient safety and the reliability of the medical system, and systematic security assessment and continuous response are required.
In the era of fragmented learning, using social media for English learning has become mainstream. College English teaching requires continuous understanding of students' online and offline learning situations and ...
详细信息
ISBN:
(数字)9798331522216
ISBN:
(纸本)9798331522223
In the era of fragmented learning, using social media for English learning has become mainstream. College English teaching requires continuous understanding of students' online and offline learning situations and needs. Information such as the English learning topics discussed by students on social media and the areas of learning they focus on will provide important references for teachers in planning teaching and selecting teaching cases. This paper collects relevant college student English topic information from the Weibo platform and applies the GPU-DMM (Graphic Processing Unit-Dirichlet Multinomial Mixtures) semantically enhanced topic model to perform topic mining on English topics. It obtains the corresponding document-topic distribution and topic-word distribution, analyzes the differences between different topics, and identifies the focus points of college students in English learning. Finally, the information of different topics is visually displayed to systematically reflect the topical characteristics of college student English discussions.
Neuromorphic computing is a new data analytical paradigm that mimics the behavior of biological neural systems to offer better computational power. State-of-the-art performance in conventional deep learning models (CN...
详细信息
ISBN:
(数字)9798331543891
ISBN:
(纸本)9798331543907
Neuromorphic computing is a new data analytical paradigm that mimics the behavior of biological neural systems to offer better computational power. State-of-the-art performance in conventional deep learning models (CNNs and transformers) comes at the expense of exorbitant energy and computation time. The real-time processing, low latency, and better energy efficiency make neuromorphic architectures to be a more appealing solution to kiosks where inferences on a large scale of data are being performed. In this paper, we discuss neuromorphic computing, how it can minimize data processing, its superiority compared to traditional AI models, and its future selection for diverse applications. Neuromorphic systems demonstrate a scalable way to the next-generation artificial intelligence by taking advantage of event-driven processing and dedicated hardware
Passive RFID tag localization has been mostly focused on monostatic and/or synchronized setups. This work moves a few steps further and performs real-time localization with distributed, i.e., multistatic radios, which...
详细信息
ISBN:
(数字)9798331509057
ISBN:
(纸本)9798331509064
Passive RFID tag localization has been mostly focused on monostatic and/or synchronized setups. This work moves a few steps further and performs real-time localization with distributed, i.e., multistatic radios, which are also unsynchronized at the carrier level. It succeeds by exploiting the elliptical direction of arrival (EllDoA) algorithm with a “playback” carrier frequency offset (CFO) mitigation method, showing localization feasibility at a small error cost, even with very cheap software defined radios. The inherent carrier phase offset (CPO) of such distributed setups is addressed, and it is shown that the calibration step needs to be performed only once, and not for further reruns of the experiment; thus, the proposed method is suitable for many real-world and real-time applications, which has not been shown before, to the best of our knowledge.
Operational metrics for Machine Learning systems (MLsystems) are crucial for maintaining consistent performance in real-world applications. However, achieving this reliability is challenging due to the need for standa...
详细信息
ISBN:
(数字)9798331533366
ISBN:
(纸本)9798331533373
Operational metrics for Machine Learning systems (MLsystems) are crucial for maintaining consistent performance in real-world applications. However, achieving this reliability is challenging due to the need for standardized metrics designed for MLsystems functioning in dynamic and uncertain conditions. This literature survey explores reliable MLsystems, aiming to unify the current advancements, highlight knowledge gaps, and suggest future research paths for reliable MLsystems. Our research highlights significant advancements in developing Self-Adaptive System (SAS) architectures focused on MLSystem applications. The survey underscores the importance of contemporary softwareengineering standards, SAS architectures, and N-Version Programming (NVP) in attaining reliable MLsystems. However, more attention is required on operational metrics that capture upstream stimuli and downstream responses. Thus, a major challenge lies in creating a reliable MLSystem that operates independently of the Machine Learning (ML) artifact, ensuring that upstream sources produce expected downstream responses, even in a changing environment. The paper advocates for architectural focus, ensuring reliable MLSystem metrics from real-world case studies. This research trajectory lays a foundation for future reliable MLSystem studies, aiming to improve the Technology Readiness Level (TRL) for predictive manufacturing, diagnostics, and electricity grid management applications.
This research work introduces a new system that utilizes Generative Pretrained Transformer (GPT) Large Language Models (LLMs) to enable language-based control for Unmanned Aerial Vehicles (UAVs). The system enables no...
详细信息
ISBN:
(数字)9798331542726
ISBN:
(纸本)9798331542733
This research work introduces a new system that utilizes Generative Pretrained Transformer (GPT) Large Language Models (LLMs) to enable language-based control for Unmanned Aerial Vehicles (UAVs). The system enables nonexpert users to easily control UAVs using natural language. It integrates GPT-4o-mini model with the widely used open-source ArduPilot software. The developed system supports both audio and written inputs and accommodates multiple languages. The LLM reasons about the request and generates the required functionality. OpenAI's API (Application Programming Interface) and Function Calling are used to implement the task.
As computer programs run in the highly complex systems of hierarchical software and hardware, it is difficult to be visually observed, the problem of function parameter passing has become a pain point for teachers and...
详细信息
ISBN:
(数字)9798331540883
ISBN:
(纸本)9798331540890
As computer programs run in the highly complex systems of hierarchical software and hardware, it is difficult to be visually observed, the problem of function parameter passing has become a pain point for teachers and students. There are four ways to pass parameters, and no programming language can support all the four ways. To meet the needs of different learners, an online virtual experiment platform of parameter passing is developed, where the experiments of four methods parameter passing can be carried out. In addition, the experiments could be done by a mobile phone, which the space-time limit of learning is broken. In virtual simulation module, the dynamic changes of computer memory could be simulated and displayed when the function pseudo-code is running, so that the parameter passing process becomes intuitive, and it is easy for students to understand the working mechanism of function parameter passing. Finally, the teaching goal is achieved by the joint action of the other modules, such as basic training, extended improvement and test enhancement, etc. The results of practice show that the enthusiasm and initiative of students are improved, and it has obvious results in assisting students to master the knowledge of function parameter passing.
The Humanoid Digital Twin (HDT) has found several applications in Industrial Automation, Healthcare etc. and has been the subject of interest for researchers. Since it involves intricate hardware and software interfac...
详细信息
ISBN:
(数字)9798350380460
ISBN:
(纸本)9798350380477
The Humanoid Digital Twin (HDT) has found several applications in Industrial Automation, Healthcare etc. and has been the subject of interest for researchers. Since it involves intricate hardware and software interfaces, there is a real need to evolve newer architectures that seamlessly enable the working of the humanoid and its digital twin with good synchronization for real time applications. This paper proposes a generic architectural framework for developing a HDT. The architecture has been validated by the implementation of the Humanoid integrated with the digital twin. Also emphasized is the mechanism to make sure, the movement from one position to the other is smooth.
This study introduces a novel approach for designing fork antennas optimized for the Ultra-Wideband (UWB) frequency band using machine learning. The aim is to develop a parameterized model predicting antenna dimension...
详细信息
暂无评论