Security and privacy of vehicular communication are the two major challenges in vehicular network. In this paper, we have proposed a system model that focuses on security and privacy preservation of vehicles...
详细信息
The proceedings contain 40 papers. The special focus in this conference is on 3D Imaging Technologies-Multidimensional Signal Processing and Deep Learning. The topics include: Sensitivity Analysis of NVH Structure of ...
ISBN:
(纸本)9789811631795
The proceedings contain 40 papers. The special focus in this conference is on 3D Imaging Technologies-Multidimensional Signal Processing and Deep Learning. The topics include: Sensitivity Analysis of NVH Structure of Car Body Based on Modal Analysis;research on the Design of Nutrition and Sports Health Management System Based on Artificial Intelligence;research on English Word Intelligent Learning System Based on Mobile Education Concept;research on the Application of Big Data Analysis in English Language Education;CFD Analysis of Droplet Diffusion in Negative Pressure Ward;research on Cognitive Analysis Method of Command Mechanism Based on Operational Data Flow Motifs;confirmatory Factor Analysis of Place Attachment in Agritourism;application of Computer Sensor and Detection technology in Mechatronics;establishment of Smart Customer Service System Based on Data Mining;a Drawing of Digital Printing Gamut Map;application and Development of Natural Language Processing Service in Intelligent Customer Service System;research on University Network Ecological Governance Based on Block Chain technology;research on Informatization Construction of University Laboratory Under the Background of New Infrastructure;run-Time Prediction Practices of Multimedia Web Design in technology Management;Design and Simulation of Orthogonal Frequency-Division Multiplexing (OFDM) Signaling;research on Intelligent Financial Framework of Colleges and Universities in Information Age;VHF Band Dual-Channel High-Power Transmitter and Receiver Module;Research and Implementation of Point Multiplication Over Elliptic Curve GF(2m) Based on VLSI;non-contact Hand Sanitizer Auxiliary Device for Public Places;Simulation of Young’s Double Slit Interference Experiment Based on MATLAB;an Improved Contour Feature Extraction Method for the Image Butterfly Specimen.
Driving comfort is a non-trivial issue as it could pose adverse health issues particularly to those who travel-long distances. In the present study, we identify the optimum speed during cornering in order to reduce th...
详细信息
Nowadays, material handling with the help of robotics knowledge is the emerging part in our day-to-day life. Material handling can be used to diminish the physical efforts. The cost-efficient Bluetooth-controlled robo...
详细信息
ISBN:
(纸本)9789811508295;9789811508288
Nowadays, material handling with the help of robotics knowledge is the emerging part in our day-to-day life. Material handling can be used to diminish the physical efforts. The cost-efficient Bluetooth-controlled robot car has made it possible for increasing number of handling tasks that is the main benefit of this paper. In this paper, we have designed and implemented the Bluetooth-controlled robot car for material handling using Arduino, pyroelectric infrared (PIR) sensor, and Bluetooth module which prove to be lower in cost than the preexisting designs. This device can be beneficial to farmers, storage godowns, educational organization, and general public for reducing their physical labors.
Machine Learning has an important role in extraction of useful information out of sextillion bytes of data collected per day. The focus of machine learning is the development of computer programs that can access data ...
详细信息
The proceedings contain 19 papers. The special focus in this conference is on Security for Information technology and Communications. The topics include: An Ind-CCA2 Attack Against the 1st- and2nd-Round Versions of N...
ISBN:
(纸本)9783030692544
The proceedings contain 19 papers. The special focus in this conference is on Security for Information technology and Communications. The topics include: An Ind-CCA2 Attack Against the 1st- and2nd-Round Versions of NTS-KEM;behaviour-Based Biometrics for Continuous User Authentication to Industrial Collaborative Robots;secure Speaker Recognition System Using Homomorphic Encryption;Reliable RFID Offline Privacy;virtualization and Automation for Cybersecurity Training and Experimentation;long-Term Secure Deniable Group Key Establishment;card-Based Covert Lottery;hardware-Accelerated Cryptography for Software-Defined Networks with P4;security Analysis Using Subjective Attack Trees;off-the-Shelf Security Testing Platform for Contactless systems;a New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap 2 k -Residuosity Assumption;new Insights on Differential and Linear Bounds Using Mixed Integer Linear Programming;secure Card-Based Cryptographic Protocols Using Private Operations Against Malicious Players;decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers;A Scalable Simulation of the BB84 Protocol Involving Eavesdropping;approach to Cryptography from Differential Geometry with Example;On Using zk-SNARKs and zk-STARKs in Blockchain-Based Identity Management.
In recent years, there has been a significant increase in the automotive industry, which has increased the number of vehicles based on internal combustion engines (ICEs). Limitation of oil supplies and environmental d...
详细信息
The epidemic COVID-19 has shaken the globe through its cruelty, and its spread rate continues to rise daily. This paper highlights the clinical stance in the COVID-19 research studies, where time-series statistical an...
详细信息
the article suggests a method for constructing classifier of external environmental impacts on functioning of information systems. Defined parameters of external influences on the system, presented using the fuzzy mac...
详细信息
Data mining is comprehended as a procedure used to get important data from any more extensive cluster of raw data. It infers assessment of data designs in huge data sets utilizing at least one or more applications. Da...
详细信息
暂无评论