This systematic literature review delves into the dynamic realm of graphical passwords, focusing on the myriad security attacks they face and the diverse countermeasures devised to mitigate these threats. The core obj...
详细信息
This paper deals with the problem of distributed formation tracking control and obstacle avoidance of multivehicle systems(MVSs)in complex obstacle-laden *** MVS under consideration consists of a leader vehicle with a...
详细信息
This paper deals with the problem of distributed formation tracking control and obstacle avoidance of multivehicle systems(MVSs)in complex obstacle-laden *** MVS under consideration consists of a leader vehicle with an unknown control input and a group of follower vehicles,connected via a directed interaction topology,subject to simultaneous unknown heterogeneous nonlinearities and external *** central aim is to achieve effective and collisionfree formation tracking control for the nonlinear and uncertain MVS with obstacles encountered in formation maneuvering,while not demanding global information of the interaction *** this goal,a radial basis function neural network is used to model the unknown nonlinearity of vehicle dynamics in each vehicle and repulsive potentials are employed for obstacle ***,a scalable distributed adaptive formation tracking control protocol with a built-in obstacle avoidance mechanism is *** is proved that,with the proposed protocol,the resulting formation tracking errors are uniformly ultimately bounded and obstacle collision avoidance is *** simulation results are elaborated to substantiate the effectiveness and the promising collision avoidance performance of the proposed scalable adaptive formation control approach.
The heart, being a crucial organ, necessitates meticulous care. Accurate information is essential for identifying heart-related disorders. Precise patient data is vital for hospitals to effectively predict and treat c...
详细信息
Anomaly detection refers to recognition of events different from normal ones for example road accident, fight, robbery, arsenal etc. Anomaly identification in real world surveillance videos is an important application...
详细信息
computer-Aided Diagnostic (CAD) systems enhance clinical decision-making, providing more accurate and streamlined processes. CAD systems based on Content-Based Image Retrieval (CBIR) serve as visual tools that strengt...
详细信息
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this...
详细信息
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this research provides a Three-Layered Security Access model(TLSA)aligned to an intrusion detection mechanism,access control mechanism,and data encryption *** TLSA underlines the need for the protection of sensitive *** proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard(AES).For data transfer and storage,this encryption guarantees the data’s authenticity and ***,the solution employs the AES encryption algorithm to secure essential data before storing them in the Cloud to minimize unauthorized ***-based access control(RBAC)implements the second strategic level,which ensures specific personnel access certain data and *** RBAC,each user is allowed a specific role and *** implies that permitted users can access some data stored in the *** layer assists in filtering granular access to data,reducing the risk that undesired data will be discovered during the *** 3 deals with intrusion detection systems(IDS),which detect and quickly deal with malicious actions and intrusion *** proposed TLSA security model of e-commerce includes conventional levels of security,such as encryption and access control,and encloses an insight intrusion detection *** method offers integrated solutions for most typical security issues of cloud computing,including data secrecy,method of access,and *** extensive performance test was carried out to confirm the efficiency of the proposed three-tier security *** have been made with state-of-art techniques,including DES,RSA,and DUAL-RSA,keeping into account Accuracy,QILV,F-Measure,Sensitivity,MSE,PSNR,SSIM,and computation time,encryption time,and decryption *** proposed
Agriculture plays a vital role in providing food to a growing world population. However, plant diseases and pests result in 50% reductions in crop yields, which exacerbates poverty and threatens a sustainable food sys...
详细信息
Recently, deep neural networks have triumphed over a large variety of human activity recognition (HAR) applications on resource-constrained mobile devices. However, most existing works are static and ignore the fact t...
详细信息
The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection *** recent studies have...
详细信息
The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection *** recent studies have made progress,a common challenge is the low accuracy of existing detection *** models often struggle to reliably identify corrosion tendencies,which are crucial for minimizing industrial risks and optimizing resource *** proposed study introduces an innovative approach that significantly improves the accuracy of corrosion detection using a convolutional neural network(CNN),as well as two pretrained models,namely YOLOv8 and *** leveraging advanced technologies and methodologies,we have achieved high accuracies in identifying and managing the hazards associated with corrosion across various industrial *** advancement not only supports the overarching goals of enhancing safety and efficiency,but also sets a new benchmark for future research in the *** results demonstrate a significant improvement in the ability to detect and mitigate corrosion-related concerns,providing a more accurate and comprehensive solution for industries facing these *** CNN and EfficientNetB0 exhibited 100%accuracy,precision,recall,and F1-score,followed by YOLOv8 with respective metrics of 95%,100%,90%,and 94.74%.Our approach outperformed state-of-the-art with similar datasets and methodologies.
The event management mechanism matches messages that have been subscribed to and events that have been published. To identify the subscriptions that correspond to the occurrence inside the category, it must first run ...
详细信息
暂无评论