Fraud detection in smart grids is critical to ensure reliable and efficient energy distribution, preventing significant financial losses and maintaining grid stability. This project presents an advanced fraud detectio...
详细信息
Effective management of semi-perishable food items is essential for minimising waste, maintaining food safety, and supporting sustainability efforts. This paper introduces the Responsibility Index for Sustainability a...
详细信息
Sign gestures play a crucial role in communication for the deaf community, emphasizing the need for effective translation systems. Hand gestures convey thoughts more rapidly than other actions, making them essential f...
详细信息
This paper investigates a cooperative motion planning problem for large-scale connected autonomous vehicles (CAVs) under limited communications, which addresses the challenges of high communication and computing resou...
详细信息
This paper investigates a cooperative motion planning problem for large-scale connected autonomous vehicles (CAVs) under limited communications, which addresses the challenges of high communication and computing resource requirements. Our proposed methodology incorporates a parallel optimization algorithm with improved consensus ADMM considering a more realistic locally connected topology network, and time complexity of $\mathcal {O}(N)$ is achieved by exploiting the sparsity in the dual update process. To further enhance the computational efficiency, we employ a lightweight evolution strategy for the dynamic connectivity graph of CAVs, and each sub-problem split from the consensus ADMM only requires managing a small group of CAVs. The proposed method implemented with the receding horizon scheme is validated thoroughly, and comparisons with existing numerical solvers and approaches demonstrate the efficiency of our proposed algorithm. Also, simulations on large-scale cooperative driving tasks involving up to 100 vehicles are performed in the high-fidelity CARLA simulator, which highlights the remarkable computational efficiency, scalability, and effectiveness of our proposed development. Demonstration videos are available at https://***/icadmm_cmp_carla. IEEE
The online food order and delivery service is becoming a very popular web-based application in Bangladesh. These days, a growing number of individuals are interested in ordering a variety of foods online. In addition,...
详细信息
With this work, a technical method for identifying Indian Sign Language is attempted to be developed. This work attempted to create a system for recognizing the hand movements from Indian Sign Language using machine l...
详细信息
Distributed network attacks are referred to, usually, as Distributed Denial of Service (DDoS) attacks. These attacks take advantage of specific limitations that apply to any arrangement asset, such as the framework of...
详细信息
As Deep Neural Network models become more accurate, the associated AI applications experience higher inference runtimes. This results in increased overall communication latency within the edge-cloud continuum, where t...
详细信息
作者:
Khadse, ShrikantGourshettiwar, PalashPawar, Adesh
Faculty of Engineering and Technology Wardha442001 India
Faculty of Engineering and Technology Department of Computer Science and Medical Engineering Wardha442001 India
Department of Computer Science and Medical Engineering Maharashtra Wardha442001 India
Meta-learning aims to create Artificial Intelligence (AI) systems that can adapt to new tasks and improve their performance over time without extensive retraining. The advent of meta-learning paradigms has fundamental...
详细信息
Some of the significant new technologies researched in recent studies include BlockChain(BC),Software Defined Networking(SDN),and Smart Industrial Internet of Things(IIoT).All three technologies provide data integrity...
详细信息
Some of the significant new technologies researched in recent studies include BlockChain(BC),Software Defined Networking(SDN),and Smart Industrial Internet of Things(IIoT).All three technologies provide data integrity,confidentiality,and integrity in their respective use cases(especially in industrial fields).Additionally,cloud computing has been in use for several years *** information is exchanged with cloud infrastructure to provide clients with access to distant resources,such as computing and storage activities in the *** are also significant security risks,concerns,and difficulties associated with cloud *** address these challenges,we propose merging BC and SDN into a cloud computing platform for the *** paper introduces“DistB-SDCloud”,an architecture for enhanced cloud security for smart IIoT *** proposed architecture uses a distributed BC method to provide security,secrecy,privacy,and integrity while remaining flexible and *** in the industrial sector benefit from the dispersed or decentralized,and efficient environment of ***,we described an SDN method to improve the durability,stability,and load balancing of cloud *** efficacy of our SDN and BC-based implementation was experimentally tested by using various parameters including throughput,packet analysis,response time,bandwidth,and latency analysis,as well as the monitoring of several attacks on the system itself.
暂无评论