The supply chain network is one of the most important areas of focus in the majority of business circumstances. Blockchain technology is a feasible choice for secure information sharing in a supply chain network. Desp...
详细信息
Iris segmentation and localization in unconstrained environments are challenging due to long distances, illumination variations, limited user cooperation, and moving subjects. Some existing methods in the literature h...
详细信息
To minimize the disturbance of the Tunnel Boring Machine (TBM) cutterhead on the surrounding rock during the coal mine roadway excavation process and ensure that the cutterhead rotation speed achieves fast tracking pe...
详细信息
In the real world, planar networks commonly model utility distribution networks such as gas pipelines, water distribution, city's electric grid, and transportation networks like railways and highways. Evaluating t...
详细信息
Each year, car accidents impact billions of people, resulting in numerous casualties. Consequently, road safety remains a top priority for nations worldwide. This project aims to enhance driver safety through a feedba...
详细信息
Brain networks typically exhibit characteristic synchronization patterns where several synchronized clusters coexist. On the other hand, neurological disorders are considered to be related to pathological synchronizat...
详细信息
Robinson lists are adopted in many countries to protect phone subscribers against commercial spam calls. In its essence, they collect the denial of the subscribers to be contacted by marketing operators. Nowadays, all...
详细信息
Finite-difference time-domain is a numerical method used for modelling of computational electrodynamics. The method is resource intensive, especially regarding memory usage since multiple memory accesses are required ...
详细信息
Credit card is getting increasingly more famous in budgetary exchanges, simultaneously frauds are likewise expanding. In the past, fraud practitioners were identified using rule-based master frameworks, which ignored ...
详细信息
Sensing systems onboard unmanned vehicles operate in an environment of constrained computational resources. A cyber-Attack may primarily aim to degrade these computing devices and, ultimately, incapacitate the sensing...
详细信息
暂无评论