The exponential expansion of mobile communication traffic, fuelled by a rising number of smart devices and sophisticated applications, has put significant pressure on existing cellular network architectures. The 6G ne...
详细信息
This paper addresses the challenges associated with signaling load in 5G Core (5GC) by proposing innovative architectural solutions based on Open Radio Access Network (Open-RAN), and Software-Defined Networking (SDN)....
详细信息
This study provides an innovative architectural model for e-Health systems that aims to improve cyber resilience while maintaining high availability under fluctuating traffic loads. We examined typical cybersecurity i...
详细信息
Accelerometers are inertial sensors that detect acceleration and forces along three orthogonal axes, then the readings are produced as a digital or analog signal and used in various applications. Microelectromechanica...
详细信息
Human Activity Recognition (HAR) is a research area that involves wearable devices integrating inertial and/or physiological sensors to classify human actions and status across various application domains, such as hea...
详细信息
Traffic sign detection and recognition (TSDR) is a pivotal component of contemporary transportation systems, designed to enhance road safety and operational efficiency. In an era where automation is indispensable, TSD...
详细信息
Our system, submitted to the Nuanced Arabic Dialect Identification (NADI-23), tackles the first sub-task: Closed Country-level dialect identification. In this work, we propose a model that is based on an ensemble of l...
The challenge of credit card fraud presents a significant threat to both consumers and financial institutions alike, leading to substantial economic detriment. In response, this research applies various machine learni...
详细信息
Robotic arms play an important role in the automation industry. Robotic arms plan processing paths based on the shape of the workpiece. However, the processing path often deviates due to inaccurate placement of the wo...
详细信息
Fifth-generation (5G) networks are prone to jamming attacks, which are particularly dangerous in mission-critical applications such as factory automation. In this paper, we present a simple method to detect jamming at...
详细信息
暂无评论