We revisit the familiar scenario involving two parties in relative motion, in which Alice stays at rest while Bob goes on a journey at speed βc along an arbitrary trajectory and reunites with Alice after a certain pe...
详细信息
The rapid but uneven education development worldwide is creating many challenges. Changing conditions and rules in engineering fields such as programming, automation, and electronics are not always followed by changes...
The rapid but uneven education development worldwide is creating many challenges. Changing conditions and rules in engineering fields such as programming, automation, and electronics are not always followed by changes in education. Employers expect potential candidates to be current with the latest domain competencies and soft skills. The idea is to hire candidates with both knowledge (theoretical and practical) and experience in reflection and collaboration skills. Universities can not always keep up with the development of technology and the adaptation of curricula because change happens so quickly. Therefore, upgrades are needed in engineering education. Focusing education solely on measurable knowledge and results is a simple but often insufficient approach to presenting the entire curriculum within the time frame of a course. Our study of about 150 engineering students in Poland and Norway included the role of students' experiences in hands-on activities, especially labs. The research aimed to determine what students expect, what influences their results, and what complications may arise. The study results show that students often struggle with time management, prioritizing, and understanding practical tasks. In addition, there is a difference between students with and without practical work experience. Our research showed that both groups of students did not achieve all their intended educational goals for various reasons. Therefore, adapting the current teaching system to the student's needs and requirements is important.
In recent years, online social networks and online news venues have become some of the main news and event-related information spreading mediums. Although using these mediums has facilitated the speed of accessing inf...
详细信息
This paper presents a mobility prediction model as part of a handover mechanism combining centralized and decentralized network control to improve performance and resilience in tactical networks. Our approach utilizes...
This paper presents a mobility prediction model as part of a handover mechanism combining centralized and decentralized network control to improve performance and resilience in tactical networks. Our approach utilizes mobility prediction to optimally switch between control modes, minimizing packet loss from live user data flows and maximizing the duration of centralized control connectivity. The prediction model ingests mobility trace files, extracts supplementary mobility features, and employs a Recurrent Neural Network (RNN) to forecast system states representing the network link quality. We evaluate the model using two mobility paradigms: Gauss-Markov and Manhattan-Grid. For the Gauss-Markov model, our method achieves 44% accuracy in predicting network states 60 seconds into the future and up to 72% accuracy for 5-second predictions. Our approach exhibits higher accuracy with the Manhattan-Grid model, attaining 67% and 82% for 60 and 5-second predictions, respectively. A comparative analysis with a previously implemented RSSI-based mechanism demonstrates that our prediction-based mechanism enhances centralized control connectivity duration by 56% and mitigates packet loss by 1.24%. This work contributes to advancing adaptive handover mechanisms for complex tactical networks.
Digital watermarking of interactive media content has become an active experimentation field in recent years. In addition to reviewing some of the methods that have been developed for various media types; a general st...
Digital watermarking of interactive media content has become an active experimentation field in recent years. In addition to reviewing some of the methods that have been developed for various media types; a general structure for watermark engrafting and identification is outlined. We highlight a few of these application-oriented differences, including copyright protection, substantiation, tamper identification, and data hiding, as well as the technological and system conditions for different media types such as digital photos, digital files, digital audio, and text. We describe a general structure for digital watermarking-based image copyright protection in this approach. In this paper, we outline the pre-processing and implementation of tide marking technique where Twofish algorithm and double encryption is described. The image processing toolbox is also specified by comparing five different image processing techniques. In addition, the post implementation is carried out with the wavelet toolbox and matlab coder to analyze signal, image properties and generate the efficient code for embedding the text.
Predictive maintenance using machine learning is a powerful technique for industries seeking to enhance their operations with minimize downtime. In an IoT-enabled Industry 4.0 environment, this approach can be taken t...
Predictive maintenance using machine learning is a powerful technique for industries seeking to enhance their operations with minimize downtime. In an IoT-enabled Industry 4.0 environment, this approach can be taken to a new level by leveraging the vast amounts of data generated by connected devices. To implement a machine learning methodology to projecting conservation in an Industry 4.0 environment, several key steps need to be taken. First, data from IoT devices across the industrial ecosystem should be collected and centralized in a data lake or similar storage system. This data should include information on equipment health, sensor readings, and other relevant metrics. Next, the data should be preprocessed and transformed to ensure its quality and consistency. This may involve cleaning, normalization, and feature engineering to create relevant variables for use in machine learning models. Once the data has been preprocessed, a range of machine learning models can be trained on it to predict equipment failures or other maintenance issues. This may involve ongoing tuning and optimization of model hyperparameters or retraining the models on new data as it becomes available. Finally, the predictions generated by the machine learning models should be integrated into a broader maintenance management system to enable timely action. This may include triggering maintenance requests, generating work orders, or even automating maintenance tasks through the use of robots or other industrial automation technologies. By implementing a machine learning method to projecting preservation in an IoT-enabled Industry 4.0 environment, industries can optimize their operations, minimize downtime, and improve overall equipment effectiveness.
Dataset search is receiving increasing attention in a scholar's daily research practice. In biodiversity research, dataset retrieval in particular is a challenging and time-consuming task as most search services i...
详细信息
Currently, a lot of universities are offering Java programming courses for teaching the first-step object-oriented programming language. For novice students, to master writing readable codes using proper names for var...
详细信息
We present a partitioned neural network-based framework for learning of fluid-structure interaction (FSI) problems. We decompose the simulation domain into two smaller sub-domains, i.e., fluid and solid domains, and i...
详细信息
E-Health Record Security Research on a Cloud-Based Multi-Layer Framework reaches its climax in a string of noteworthy discoveries, demonstrating how the framework may transform cloud health data security. The framewor...
E-Health Record Security Research on a Cloud-Based Multi-Layer Framework reaches its climax in a string of noteworthy discoveries, demonstrating how the framework may transform cloud health data security. The framework's multi-tiered design proved to be an effective barrier against a wide range of cyber threats, protecting the privacy and security of patients' medical records. An important factor in the varied healthcare industry is the fact that it can be easily scaled and adjusted to meet the needs of healthcare providers of varied sizes and capabilities. Nevertheless, there are obstacles that need to be addressed, according to the report. These include the difficulty of implementation and the ongoing need for upgrades and modifications to address changing cyber threats and technical advances. Healthcare firms must continuously implement educational programs due to the reliance on user compliance and training. With an eye toward the future, this structure lays the groundwork for more sophisticated studies in the subject. Potential research directions include improving cross-platform compatibility, optimizing resource utilization to reduce performance implications, and integrating AI and ML for automated threat response and predictive analytics.
暂无评论