Language-based text provide valuable insights into people’s lived experiences. While traditional qualitative analysis is used to capture these nuances, new paradigms are needed to scale qualitative research effective...
详细信息
Person re-identification (Re-ID) has been widely used in public security and surveillance. Due to the influence of different shooting times and locations, can lead to lighting variations in the images captured by the ...
详细信息
Managing the classroom and lab activities in the university and reporting process for the problems that occur during lectures is a hard process that needs more consideration. This study addresses challenges faced by t...
详细信息
ISBN:
(数字)9798350353839
ISBN:
(纸本)9798350353846
Managing the classroom and lab activities in the university and reporting process for the problems that occur during lectures is a hard process that needs more consideration. This study addresses challenges faced by technicians and academic staff in university classrooms, emphasizing the need for a streamlined automated issue reporting system. This paper proposes a comprehensive system aimed at improving communication, efficiency, and effectiveness in addressing classroom issues, benefiting technicians, students, and lecturers. Quantitative Analysis and evaluation of the system's user experience from instructors and technicians showed highly positive outcomes, indicating its high effectiveness in managing classroom issues and improving overall classroom management. Moreover, the statistical test revealed no statistically significant differences (α= 0.05) in the willingness to use the classroom issue management system between technicians and academic staff, indicating similar user perceptions and readiness for both groups to utilize the system.
The use of reward functions to structure AI learning and decision making is core to the current reinforcement learning paradigm;however, without careful design of reward functions, agents can learn to solve problems i...
详细信息
The complexity of the entire process of supply chain management (SCM) is quite cumbersome and traditional way of handling it is devoid of proper authentication and security and very often suffers from human errors in ...
详细信息
The complexity of the entire process of supply chain management (SCM) is quite cumbersome and traditional way of handling it is devoid of proper authentication and security and very often suffers from human errors in dealing with flaws in quality control process of SCM. While it may have started with shipment tracking, the outcome of using IoT on supply chains has spread to every link in the chain. For instance, manufacturers are employing Internet-enabled sensors in production to find product faults, resulting in higher-quality production runs. Physical Unclonable Function (PUF) is a security mechanism that exploits the unique, unrepeatable physical characteristics of hardware components to generate distinct cryptographic keys or identifiers, typically for a semiconductor device like an Internet of Things (IoT) device. The unique identification of IoT devices along the supply chain is implemented by using PUFs as tamper-resistant IDs. Blockchain, the distributed, immutable ledger, on the other hand is the disruptive technology that provides higher security as compared to traditional centralized systems. The integration of PUF and blockchain proves to be quite interesting while handling the above issues of authentication. A smart contract on the blockchain is a software code that executes spontaneously as and when the conditions of the contract or agreement are satisfied. Hence after authentication process the results are fed to blockchain smart contract for the final validation. This paper presents a novel permissioned blockchain smart contract-based lightweight authentication scheme for SCM using PUF of IoT known as SPUFChain. Informal and formal security analysis (using AVISPA and BAN logic) of the proposed framework show its potential to combat several attack scenarios like man-in-the middle, non-repudiation, impersonation, replay attacks and many other security features as compared to other related schemes. The processing time (~13.8ms) is better than existing
The world population continues to increase with a large proportion of this increase happening in Africa just as predicated by Food and Agriculture Organization of the United Nation. To meet the demand of feeding this ...
详细信息
This research proposes a novel artificial decision-marking framework suitable for modern smart sensor networks and carbon-based biosensor systems which deals with uncertainty and the peculiarity of the data. To achiev...
详细信息
Robots are getting deployed at home and in industries, becoming an integral part of our daily lives. Sophisticated mechanisms are required to make the joints of the robots compact and simple. In this paper, we have de...
详细信息
Breast cancer is one of the most widespread kinds of cancer, especially in women, and it has a high mortality rate. With the help of technology, it is possible to develop a computer-aided method for the diagnosis of b...
详细信息
Existing research on speaker and emotional voice conversion often focuses on separate tasks, neglecting their joint exploration. Furthermore, the limited availability of emotional corpora for target speakers poses a s...
详细信息
暂无评论