Implementing a wireless mesh network in a real-life scenario requires a significant systems.engineering effort to turn a network concept into a complete system. This paper presents an evaluation of a fielded system wi...
详细信息
ISBN:
(数字)9781665495127
ISBN:
(纸本)9781665495134
Implementing a wireless mesh network in a real-life scenario requires a significant systems.engineering effort to turn a network concept into a complete system. This paper presents an evaluation of a fielded system within the DARPA Subterranean (SubT) Challenge Final Event that contributed to a 3rd place finish. Our system included a team of air and ground robots, deployable mesh extender nodes, and a human operator base station. This paper presents a real-world evaluation of a stack optimized for air and ground robotic exploration in a RF-limited environment under practical system design limitations. Our highly customizable solution utilizes a minimum of non-free components with form factor options suited for UAV operations and provides insight into network operations at all levels. We present performance metrics based on our performance in the Final Event of the DARPA Subterranean Challenge, demonstrating the practical successes and limitations of our approach, as well as a set of lessons learned and suggestions for future improvements.
Deep learning developed in the last decade and has been established as recent, modern and very promising technique with large potential to be successfully applied in various domains. Despite deep learning outperforms ...
详细信息
In the current development process of the energy industry, the application of distributed energy in power systems.is increasing, and at the same time, it has brought new impacts and challenges to the safety and stabil...
详细信息
The proceedings contain 46 papers. The topics discussed include: marker less hand gesture tracking using smart phones;friendnet backdoor: indentifying backdoor attack that is safe for friendly deep neural network;impr...
ISBN:
(纸本)9781450376907
The proceedings contain 46 papers. The topics discussed include: marker less hand gesture tracking using smart phones;friendnet backdoor: indentifying backdoor attack that is safe for friendly deep neural network;improving core topics discovery in semantic markup literature: a combined approach;an integrated of fuzzy rule base system and TOPSIS technique for multi-attribute decision making;efficient semantic segmentation through dense upscaling convolutions;dynamic image quality analysis and comparison between 6MHz and 8MHz bandwidths for DVB-C digital TV system;a cooperative trust evaluation scheme for tactical wireless sensor networks;and the moderating effects of mentoring in ERP systems.
In recent years, vehicles became a complex network of ECUs and sensors that communicate with each other and their environment. Vehicle data from these connected vehicles is processed and shared with multiple 3rd party...
详细信息
The proceedings contain 62 papers. The special focus in this conference is on Big-Data and Cloud computing. The topics include: Classification of gender from face images and voice;an outlier detection approach on cred...
ISBN:
(纸本)9789811552847
The proceedings contain 62 papers. The special focus in this conference is on Big-Data and Cloud computing. The topics include: Classification of gender from face images and voice;an outlier detection approach on credit card fraud detection using machine learning: A comparative analysis on supervised and unsupervised learning;unmasking file-based cryptojacking;selection of a virtual machine within a scheduler (dispatcher) using enhanced join idle queue (ejiq) in cloud data center;an analysis of remotely triggered malware exploits in content management system-based web applications;gsm-based design and implementation of women safety device using internet of things;a novel approach on various routing protocols for wsn;fraud detection for credit card transactions using random forest algorithm;deep learning application in iot health care: A survey;L1 norm SVD-based ranking scheme: A novel method in big data mining;context aware text classification and recommendation model for toxic comments using logistic regression;self-supervised representation learning framework for remote crop monitoring using sparse autoencoder;determination of elements in human urine for transient biometrics;optimal placement of green power generation in the radial distribution system using harmony search algorithm;data security and privacy protection in cloud computing: A review;Re-ranking ODI batsman using JJ metric;intelligent cloud load balancing using elephant herd optimization;a quest for best: A detailed comparison between drakvuf-vmi-based and cuckoo sandbox-based technique for dynamic malware analysis;cloudstore: A framework for developing progressive streaming games;classification of dga botnet detection techniques based on dns traffic and parallel detection technique for dga botnet.
The power system constitutes a complex network where security is the priority. Contingency analysis emerges as a longstanding and widely embraced technique aimed at preemptively assessing the severity of potential out...
详细信息
ISBN:
(数字)9798350354379
ISBN:
(纸本)9798350354386
The power system constitutes a complex network where security is the priority. Contingency analysis emerges as a longstanding and widely embraced technique aimed at preemptively assessing the severity of potential outages and their ramifications, thereby facilitating necessary actions to uphold the power grid's security. Given the considerable number of components within the system, scrutinizing individual contingencies proves to be a laborious endeavour. However, it is imperative to identify those contingencies that could potentially trigger severe conditions within the power system. This is accomplished by using the fast decoupling load flow (FDLF) approach to compute performance indices, such as the reactive power performance index (PIv) and active performance index (PIp), for each transmission line outage. Subsequently, contingency ranking is performed within the MATLAB environment, furnishing operators with insights ranging from the most critical to the least significant outages in the power system. The integration of distributed generation (DG) into distribution networks is pursued with the objective of augmenting system performance indices. DGs are incorporated into load flow analysis employing either a constant power factor model (CPF) or a variable reactive power model (VRP), contingent upon the output power characteristics. These models are seamlessly integrated into the load flow analysis. The efficacy of this approach has been validated through testing on both IEEE 5-Bus and IEEE 14-Bus systems.by integrating mathematical models of DGs.
The proceedings contain 196 papers. The special focus in this conference is on Innovative computing and Communication. The topics include: Tracking of soccer players using optical flow;selection of probabilistic data ...
ISBN:
(纸本)9789811551475
The proceedings contain 196 papers. The special focus in this conference is on Innovative computing and Communication. The topics include: Tracking of soccer players using optical flow;selection of probabilistic data structures for spv wallet filtering;hybrid bf-pso algorithm for automatic voltage regulator system;malware classification using multi-layer perceptron model;protocol random forest model to enhance the effectiveness of intrusion detection identification;detecting user’s spreading influence using community structure and label propagation;bagging- and boosting-based latent fingerprint image classification and segmentation;selecting social robot by understanding human–robot interaction;flooding and forwarding based on efficient routing protocol;evaluating user influence in social networks using k-core;hardware-based parallelism scheme for image steganography speed up;predicting group size for software issues in an open-source software development environment;wireless cnc plotter for pcb using android application;epileptic seizure detection using machine learning techniques;analysis of minimum support price prediction for indian crops using machine learning and numerical methods;a robust methodology for creating large image datasets using a universal format;a comparative empirical evaluation of topic modeling techniques;an analysis of machine learning techniques for flood mitigation;link prediction in complex network: Nature inspired gravitation force approach;hridaya kalp: A prototype for second generation chronic heart disease detection and classification;depression anatomy using combinational deep neural network;two-stream mid-level fusion network for human activity detection;content classification using active learning approach;analysis of navic multipath signal sensitivity for soil moisture in presence of vegetation;transaction privacy preservations for blockchain technology;deeper into image classification.
Agriculture is the major contributor of national revenue for many developing countries. The embryonic of Internet of things (IoT) and wireless smart sensor network (WSSN) for precision agriculture provides automated s...
详细信息
Automatic modulation identification and parameter estimation of digital communication signals are the key technologies in communication systems. In recent years, with the rapid development of modern communication and ...
详细信息
暂无评论