Illegal logging causes widespread deforestation. Global consequences. Controlling when, where, and how illegal actions occur would help protect trees and decrease deforestation. Because people don't know this, ill...
详细信息
Automatic road anomaly detection and recognition systems are essential due to their effect on the comfort and safety of drivers and passengers. Drivers should be aware of bad road conditions and the existence of anoma...
详细信息
This paper analyses,simulates and verifies an experimental prototype of a four-phase interleaved DC-DC *** is based on a SEPIC-Cuk *** developed prototype has been used in single-input multiple-output(SIMO)*** combine...
详细信息
This paper analyses,simulates and verifies an experimental prototype of a four-phase interleaved DC-DC *** is based on a SEPIC-Cuk *** developed prototype has been used in single-input multiple-output(SIMO)*** combined converter allows obtaining dual output voltages of the same value,from a single input DC voltage and with only a power *** interleaved DC-DC converters achieve a better dynamic response and low ripple,maintaining their *** converter is connected in parallel,thereby managing their losses by distributing them between more components,which facilitates the thermal management of the multiphase converter and allows handling high power values in small sizes with respect to solutions for a single *** control strategies were applied:synchronous operation mode(SOM)and interleaved operation mode(IOM).The simulation results allow the comparison of both operational modes,verifying that the IOM presents advantages with respect to the ripple at the input and output *** experimental prototype was designed for a distributed power architecture and bipolar DC microgrid(MG).
Routing protocols, responsible for determining optimal paths, fall into two main categories: reactive and proactive protocols. In the realm of reactive routing protocols, exemplified by Ad hoc On-demand Distance Vecto...
详细信息
Routing protocols, responsible for determining optimal paths, fall into two main categories: reactive and proactive protocols. In the realm of reactive routing protocols, exemplified by Ad hoc On-demand Distance Vector (AODV), routes are created only when there is an actual data transmission requirement. In contrast, proactive routing protocols maintain pre-computed paths to all potential destinations, resulting in reduced resource utilization within reactive protocols and continuous route maintenance within proactive ones. Reactive routing protocols are resource efficient as they establish routes as needed, while proactive counterparts maintain routing tables for all possible destinations, ensuring constant route availability regardless of data transmission demands. This paper primarily concentrates on the reactive routing protocol category, focusing on real-time path optimization and routing information updates. In the context of Vehicular Internet of Things (VIoT) networks, where malicious entities might attempt to flood, mislead, or impersonate routing packets, it is imperative to ensure robust security measures within the routing protocol. Unfortunately, secure routing protocols in VIoT networks, including AODV, SAODV, and SGHRP, often exhibit inefficiencies and impose a high overhead. To address these challenges, this research paper introduces the Security Metrics and Authentication-based RouTing (SMART) protocol for VIoT networks, with a focus on enhancing security while minimizing overhead. The SMART protocol utilizes the Merkle tree for hash (digest) generation, which is then encrypted using Elliptic Curve Cryptography (ECC) to reduce overhead. This proposed protocol enhances security by authenticating the source and incorporating security metrics into the routing information. To assess the performance of the SMART protocol, simulations were conducted using Network Simulator-2 (NS2). The results demonstrated an improved packet delivery ratio, red
TextNetTopics is an innovative Latent Dirichlet Allocation-based topic selection method for training text classification models. One main limitation is its computationally intensive scoring mechanism, especially when ...
详细信息
Multi‐object tracking in autonomous driving is a non‐linear *** better address the tracking problem,this paper leveraged an unscented Kalman filter to predict the object's *** the association stage,the Mahalanob...
详细信息
Multi‐object tracking in autonomous driving is a non‐linear *** better address the tracking problem,this paper leveraged an unscented Kalman filter to predict the object's *** the association stage,the Mahalanobis distance was employed as an affinity metric,and a Non‐minimum Suppression method was designed for *** the detections fed into the tracker and continuous‘predicting‐matching’steps,the states of each object at different time steps were described as their own continuous *** conducted extensive experiments to evaluate tracking accuracy on three challenging datasets(KITTI,nuScenes and Waymo).The experimental results demon-strated that our method effectively achieved multi‐object tracking with satisfactory ac-curacy and real‐time efficiency.
Industry 5.0 emphasizes human-centric approaches in technological advancement, particularly crucial in healthcare applications such as prosthetics development. While individual technologies like additive manufacturing...
详细信息
This study aims to develop and implement a Strategic Facility Planning process at a highly regulated manufacturing site to optimise manufacturing space and capacity in a facility running out of space. The project demo...
详细信息
The lethargicness among the corporation in solving the issues and problems in the local residential areas have resulted in a drastic rise in the street problems like faulty street lights, electricity problem, bad cond...
详细信息
Data privacy concerns in the power systems sector significantly complicate the sharing and integration of sensitive operational data among various independent entities. This challenge is particularly pronounced when d...
详细信息
暂无评论