The internet of things technology has developed almost all the sectors including energy management. In traditional energy management system meters are used to recording the number of units and electricity used but the...
详细信息
With the advent of the Internet, the multimedia business has experienced explosive growth and is now available to consumers worldwide. Particularly important to this growth has been the dominance of over-the-top (OTT)...
详细信息
The optimization of civil engineering structures is critical for enhancing structural performance and material efficiency in engineering *** optimization approaches seek to determine the optimal design,by considering ...
详细信息
The optimization of civil engineering structures is critical for enhancing structural performance and material efficiency in engineering *** optimization approaches seek to determine the optimal design,by considering material performance,cost,and structural *** design approaches aim to reduce the built environment’s energy use and carbon *** comprehensive review examines optimization techniques,including size,shape,topology,and multi-objective approaches,by integrating these *** trends and advancements that contribute to developing more efficient,cost-effective,and reliable structural designs were *** review also discusses emerging technologies,such as machine learning applications with different optimization *** of truss,frame,tensegrity,reinforced concrete,origami,pantographic,and adaptive structures are covered and *** techniques are explained,including metaheuristics,genetic algorithm,particle swarm,ant-colony,harmony search algorithm,and their applications with mentioned structure *** and non-linear structures,including geometric and material nonlinearity,are *** role of optimization in active structures,structural design,seismic design,form-finding,and structural control is taken into account,and the most recent techniques and advancements are mentioned.
Joint segmentation and registration of images is a focused area of research nowadays. Jointly segmenting and registering noisy images and images having weak boundaries/intensity inhomogeneity is a challenging task. In...
详细信息
Localisation of machines in harsh Industrial Internet of Things(IIoT)environment is necessary for various ***,a novel localisation algorithm is proposed for noisy range measurements in IIoT *** position of an unknown ...
详细信息
Localisation of machines in harsh Industrial Internet of Things(IIoT)environment is necessary for various ***,a novel localisation algorithm is proposed for noisy range measurements in IIoT *** position of an unknown machine device in the network is estimated using the relative distances between blind machines(BMs)and anchor machines(AMs).Moreover,a more practical and challenging scenario with the erroneous position of AM is considered,which brings additional uncertainty to the final position ***,the AMs selection algorithm for the localisation of BMs in the IIoT network is *** those AMs will participate in the localisation process,which increases the accuracy of the final location ***,the closed‐form expression of the proposed greedy successive anchorization process is derived,which prevents possible local convergence,reduces computation,and achieves Cramér‐Rao lower bound accuracy for white Gaussian measurement *** results are compared with the state‐of‐the‐art and verified through numerous simulations.
The condition of the ocean is monitored through a network of acoustic sensor nodes. After the transmitter and receiver nodes are formed, they are placed in a shallow sea environment. Underwater communication takes mor...
详细信息
Protecting the privacy of data in the multi-cloud is a crucial *** mining is a technique that protects the privacy of individual data while mining those *** most significant task entails obtaining data from numerous r...
详细信息
Protecting the privacy of data in the multi-cloud is a crucial *** mining is a technique that protects the privacy of individual data while mining those *** most significant task entails obtaining data from numerous remote *** algorithms can obtain sensitive information once the data is in the data *** traditional algorithms/techniques promise to provide safe data transfer,storing,and retrieving over the cloud *** strategies are primarily concerned with protecting the privacy of user *** study aims to present data mining with privacy protection(DMPP)using precise elliptic curve cryptography(PECC),which builds upon that algebraic elliptic curve *** approach enables safe data exchange by utilizing a reliable data consolidation approach entirely reliant on rewritable data concealing ***,it outperforms data mining in terms of solid privacy procedures while maintaining the quality of the *** approximation error,computational cost,anonymizing time,and data loss are considered performance *** suggested approach is practical and applicable in real-world situations according to the experimentalfindings.
Cybersecurity prevents harmful assaults on computers, networks, and mobile devices. Included in the category of cyber-attacks are threats like as malware, distributed denial of service assaults, phishing, spoofing, co...
详细信息
The main objective of this research is to utilize the technologies of cloud computing in the applications of the IoT. The IoT network is divided into three layers: the cloud computing layer, the edge layer, and the fo...
详细信息
Safety of railway is the major problem worldwide. It has problems like cracks or any fault in the railway tracks. These problems can cause severe accidents if it is not detected regularly and early. In traditional fau...
详细信息
暂无评论