This article presents the equilibrium analysis of a game composed of heterogeneous electric vehicles (EVs) and a power distribution system operator (DSO) as the players, and charging station operators (CSOs) and a tra...
详细信息
Academic scholars have focused a lot of emphasis on the application of machine learning (ML) techniques for compiler improvements. The use of machine learning strength compilers in the general-purpose sector is still ...
详细信息
Within this paper, we offer a momentous arrangement named "E-navigation: The Boon for Outwardly Disabled"pointed at revolutionizing the lives of people confronting visual disabilities. This groundbreaking fr...
详细信息
Large amounts of unstructured data are currently trending on social media and the Web. Finding pertinent information fast from such a large unstructured corpus is difficult for individuals. Text summarizing is the pro...
详细信息
Diabetes is a prevalent circumstance that is also the core cause of numerous serious health issues, such as neurological disorders, heart attack, and stroke. So that it is placing a growing burden in the global health...
详细信息
Lung Cancer is nowadays becoming a very common disease and a significant reason for death among Indians. Lung cancer often comes in two different forms: small- cell lung cancer and non-small-cell lung cancer. Among al...
详细信息
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are ha...
详细信息
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are handy to use,but they are susceptible to stolen smart card attacks and few other notable security *** prefer to use Web applications that guarantee for security against several security attacks,especially insider attacks,which is *** of several existing schemes prove the security pitfalls of the protocols from preventing security attacks,specifically insider *** paper introduces LAPUP:a novel lightweight authentication protocol using physically unclonable function(PUF)to prevent security attacks,principally insider *** PUFs are used to generate the security keys,challenge-response pair(CRP)and hardware signature for designing the *** transmitted messages are shared as hash values and encrypted by the keys generated by *** messages are devoid of all possible attacks executed by any attacker,including insider *** is also free from stolen verifier attacks,as the databases are secured by using the hardware signature generated by *** analysis of the protocol exhibits the strength of LAPUP in preventing insider attacks and its resistance against several other security *** evaluation results of the communication and computation costs of LAPUP clearly shows that it achieves better performance than existing protocols,despite providing enhanced security.
This paper presents a novel approach to mitigating traffic issues through the development of an AI- driven intelligent traffic congestion identificationand signal switching system. The proposed system aims to improve ...
详细信息
This paper explores the transformative potential of digital twin technology in vertical centrifugal casting (VCC), a cornerstone manufacturing process for high-integrity cylindrical components. By integrating real-tim...
详细信息
The creation of intelligent traffic systems is essential in the age of smart cities and developing technologies in order to guarantee effective and secure transportation networks. This study uses the state-of-the-art ...
The creation of intelligent traffic systems is essential in the age of smart cities and developing technologies in order to guarantee effective and secure transportation networks. This study uses the state-of-the-art YOLO (You Only Look Once) v8 deep learning architecture to give a novel solution to the problems of real-time car and pedestrian recognition in video frames. The suggested method is centered on obtaining useful data from video streams, especially when it comes to recognizing cars and pedestrians in individual frames. In this context, we show that YOLO version 8 is accurate and effective through a series of thorough trials and assessments. YOLO version 8 is used for object recognition after pictures from video frames are captured as part of the research method. Our technology can quickly recognize and track automobiles and people by using real- time visual analysis. We also look at how this technology may be used in driverless cars, traffic control, and spying. The report also explores the technological aspects of YOLO version 8, emphasizing its advancements over earlier versions, including increased resilience, speed, and accuracy. We go over the process of training and fine-tuning needed for best results when it comes to traffic monitoring. We demonstrate the system’s capacity to properly recognize cars and pedestrians, even in difficult settings like changing illumination conditions and occlusions, by thorough testing and validation on many datasets. The findings demonstrate how this technology has the ability to completely transform traffic management and improve road safety. Finally, using YOLO version 8 for real-time car and pedestrian recognition in video frames, this research study provides an intelligent traffic system. The technology exhibits encouraging outcomes, laying the path for further advancements in intelligent transportation, traffic optimization, and public safety.
暂无评论