The modernization of the information communication infrastructure of the regional data transmission network has advanced in order to increase the maximum transmission speed of existing transport routes, ensuring the q...
详细信息
The modernization of the information communication infrastructure of the regional data transmission network has advanced in order to increase the maximum transmission speed of existing transport routes, ensuring the quality of the service and its reliability. In the present research work, a new approach for the 3D visibility network algorithm has been developed, showing how graph theory applied to wireless sensor networks (WSNs) enables technological development for new solutions in areas such as public infrastructure. The possibility of determining in such networks whether an area of interest is sufficiently covered by a given set of sensors by means of the Voronoi diagram is discussed. The parking dynamics and parking system were modeled with cellular neural networks (CNNs) based on weather conditions, and magnetic parking sensors were replaced with pillar sensors. The proposed method has proven its effectiveness in determining the position of the minimum sensors covering the area of interest, in order to find a solution in the occupation of parking spaces in the presence of different weather conditions. The proposed approach and experimental results offer potential applications in various fields such as lighting and rendering, motion planning, pattern recognition, computer graphics and computational geometry, in order to conduct studies on problems and perspectives of pillar sensor technology while reducing costs compared to magnetic ones.
There are many difficulties in managing and detecting preterm pregnancies, especially in the early stages. Analyzing electrohysterogram data, which show the electrical activity of uterine muscles, is a promising non-i...
详细信息
Quantum computing is progressing at a fast rate and there is a real threat that classical cryptographic methods can be compromised and therefore impact the security of blockchain networks. All of the ways used to secu...
详细信息
Brain dynamics big data is of increasing promise for many applications like epilepsy detection and cognitive understanding, with the advancements of consumer technology. However, the deep-source brain measurement is d...
详细信息
ISBN:
(数字)9798331521165
ISBN:
(纸本)9798331521172
Brain dynamics big data is of increasing promise for many applications like epilepsy detection and cognitive understanding, with the advancements of consumer technology. However, the deep-source brain measurement is difficult. In this study, we target the brain electroencephalogram (EEG) application, and investigate the deep-source EEG generation from surface EEG towards convenient big data. The deep learning algorithm has been developed to mine different configurations of the surface EEG streams, including the single-channel and multi-channel cases, for deep-source EEG generation. Promising experiments on the epilepsy application have been conducted, demonstrating the great promise of deep-learning-empowered deep-source EEG generation. This study will greatly advance brain dynamics mining towards smart consumer technology.
3D human pose estimation (HPE) has improved significantly through Graph Convolutional Networks (GCNs), which effectively model body part ***, GCNs have limitations, including uniform feature transformations across nod...
详细信息
Can current robotic technologies truly replicate the full scope and intricacies of human labour? In practice, the adoption of robots remains limited, especially in open, unstructured environments commonly encountered ...
Can current robotic technologies truly replicate the full scope and intricacies of human labour? In practice, the adoption of robots remains limited, especially in open, unstructured environments commonly encountered in everyday scenarios such as services, healthcare, agriculture,construction, and numerous other fields. From the perspective of general robotic manipulation, the challenges arise from three factors.
Secure Multiparty Computation (SMC) facilitates secure collaboration among multiple parties while safeguarding the privacy of their confidential data. This paper introduces a two-party quantum SMC protocol designed fo...
详细信息
This study employs the User-Centered Design (UCD) methodology to develop a mobile health (mHealth) application (app) specifically tailored for Bangladeshi women with Gestational Diabetes Mellitus (GDM). GDM affects ap...
详细信息
Organizations are adopting technological innovations to transform payment systems due to challenges with traditional methods, such as slow speed and high fees. These challenges have prompted a shift towards blockchain...
详细信息
暂无评论