People's interest in self-driving cars is increasing day by day. How they affect our daily lives and how they benefit us in different ways. These cars are also called robotic cars. These vehicles work with the lat...
详细信息
The growing popularity of social media platforms and microblogging websites has led to an increase in the expression of views and opinions. However, conversations and debates on these platforms often lead to the use o...
详细信息
We investigate the observables of the one-dimensional model for anomalous transport in semiconductor devices where diffusion arises from scattering at dislocations at fixed random positions, known as the Lévy-Lor...
详细信息
We investigate the observables of the one-dimensional model for anomalous transport in semiconductor devices where diffusion arises from scattering at dislocations at fixed random positions, known as the Lévy-Lorentz gas. To gain insight into the microscopic properties of such a stochastically complex system, deterministic dynamics known as the slicer map and fly-and-die dynamics are used. We analytically derive the generalized position autocorrelation function of these dynamics and study the special case, the 3-point position correlation function. For this, we derive single-parameter-dependent scaling and compare it with the numerically estimated 3-point position autocorrelation of the Lévy-Lorentz gas, for which the analytical expression is still an open question. Here we obtained a remarkable agreement between them, irrespective of any functional relationship with time. Moreover, we demonstrate that the position moments and the position autocorrelations of these systems scale in the same fashion, provided the times are large enough and far enough apart. Other observables, such as velocity moments and correlations, are reported to distinguish the systems.
This research aims to develop a smart traffic light system that can improve traffic flow in urban areas. The proposed system uses sensors, cameras, and software to adjust the timing of traffic signals based on real-ti...
This research aims to develop a smart traffic light system that can improve traffic flow in urban areas. The proposed system uses sensors, cameras, and software to adjust the timing of traffic signals based on real-time traffic conditions. In this study, a Raspberry Pi 4 and MATLAB software was used to build the smart traffic controller. The detection part of the system involves several steps, including removing noise and retrieving information to calculate the number of cars detected. The system then switches traffic lights based on the detected car count. The MATLAB Image Acquisition and Computer Vision toolboxes were used to obtain and analyze the video frames received from the connected cameras. The detector uses the Gaussian Mixture Model to suppress frequently occurring features and to detect abnormal features, which are then used to detect changes caused by moving objects. Morphological operations are used to remove noise from the output. Finally, the system counts the cars detected by the Foreground Detector and switches the traffic lights accordingly. The proposed approach can help reduce traffic congestion and improve the overall flow of traffic in urban areas.
With growing urbanization there is a need to manage vehicle-to-vehicle communication for intelligent communication in congested traffic. The performance of the widely used routing protocols AODV, DSDV, DSR, LAR, and Z...
With growing urbanization there is a need to manage vehicle-to-vehicle communication for intelligent communication in congested traffic. The performance of the widely used routing protocols AODV, DSDV, DSR, LAR, and ZRP is examined in this research in relation to traffic circumstances on a particular highway. Utilizing OSM data, integrated with NS2 and SUMO, realistic traffic scenarios are simulated. ZRP is a hybrid protocol that handles local communication within zones and LAR bridges the gap between the nodes and zones. This increases communication efficiency. Simulation of scenarios gives a clearer idea of how the dissemination is happening and helps in performance analysis. The protocols are assessed using important performance criteria in this study by means of a methodical approach that includes data collecting, simulation, and execution. Comparison of the metrics for the protocols helps in protocol selection for given scenarios, optimization, and standardized evaluation. The specific metrics considered for performance evaluation include Packet Delivery Ratio, Average End-to-End Delay, Average Throughput, Packet Drop Rate, and Normalized Routing Load.
There is a need for tool support for structured planning, execution and analysis of simulation-based training for crisis response and management. As a central component of an architecture for such tool support, we out...
详细信息
In this work,we proposed a diffuse-interface model for the dendritic growth with thermosolutal *** this model,the sharp boundary between the fluid and solid dendrite is firstly replaced by a thin but nonzero thickness...
详细信息
In this work,we proposed a diffuse-interface model for the dendritic growth with thermosolutal *** this model,the sharp boundary between the fluid and solid dendrite is firstly replaced by a thin but nonzero thickness diffuse interface,which is described by the order parameter,and the diffuse-interface based governing equations for the dendritic growth are *** solve the model for the dendritic growth with thermosolutal convection,we also developed a diffuse-interface multirelaxation-time lattice Boltzmann(LB)*** this method,the order parameter in the phase-field equation is combined into the force caused by the fluid-solid interaction,and the treatment on the complex fluid-solid interface can be *** addition,four LB models are designed for the phase-field equation,concentration equation,temperature equation and the Navier-Stokes equations in a unified ***,we performed some simulations of the dendritic growth to test the present diffuse-interface LB method,and found that the numerical results are in good agreements with some previous works.
The coronavirus disease 19 (COVID-19), caused by the Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-COV-2), is an infectious disease constituting the most significant challenge to human and socio-economic devel...
详细信息
Computer games continue to present challenging experimental fields for developing Artificial Intelligence (AI) models. With Case-Based Reasoning and Clustering, this work proposes novel cases and clusters-based reuse ...
详细信息
In the last ten years, quantum computing has made substantial progress, presenting a strong challenge to traditional encryption methods that depend on solving discrete algorithmic problems. With the advent of the quan...
详细信息
ISBN:
(数字)9798350379945
ISBN:
(纸本)9798350379952
In the last ten years, quantum computing has made substantial progress, presenting a strong challenge to traditional encryption methods that depend on solving discrete algorithmic problems. With the advent of the quantum era, conventional encryption methods are becoming more susceptible to attacks. This paper investigates possible attacks that exploit vulnerabilities in quantum cryptography, specifically investigating weaknesses in quantum key distribution (QKD) systems. The text thoroughly explores advanced attack strategies of photon number splitting highlight the existing vulnerabilities. The goal is to highlight the need for strong safeguards to protect against these threats, which requires continuous research and development to improve the robustness of quantum cryptography algorithms. The experimental investigation includes analyzing crucial parameters, including quantum channel length, loss, QKD protocol, quantum bit error rate (QBER), signal-to-noise ratio (SNR), as well as attack parameters such as probability of photon number splitting (PNS), eavesdropper distance, and detection efficiency. The evaluation includes performance indicators such as secure key rate, quantum bit error rate (QBER) vs distance, vulnerability to photon number splitting (PNS) attacks, and the influence on the pace of key generation.
暂无评论