Given the severity of waste pollution as a major environmental concern, intelligent and sustainable waste management is becoming increasingly crucial in both developed and developing countries. The material compositio...
详细信息
Skin cancer presents in various forms, including squamous cell carcinoma (SCC), basal cell carcinoma (BCC), and melanoma. Established risk factors include ultraviolet (UV) radiation exposure from solar or artificial s...
详细信息
Skin cancer is one of the most prevalent types of cancer globally, with its incidence steadily rising over the past decades. Early and accurate detection of skin cancer plays a pivotal role in improving patient outcom...
详细信息
In the contemporary era,driverless vehicles are a reality due to the proliferation of distributed technologies,sensing technologies,and Machine to Machine(M2M)***,the emergence of deep learning techniques provides mor...
详细信息
In the contemporary era,driverless vehicles are a reality due to the proliferation of distributed technologies,sensing technologies,and Machine to Machine(M2M)***,the emergence of deep learning techniques provides more scope in controlling and making such vehicles energy *** existing methods,it is understood that there have been many approaches found to automate safe driving in autonomous and electric vehicles and also their energy ***,the models focus on different aspects *** is need for a comprehensive framework that exploits multiple deep learning models in order to have better control using Artificial Intelligence(AI)on autonomous driving and energy *** this end,we propose an AI-based framework for autonomous electric vehicles with multi-model learning and decision *** focuses on both safe driving in highway scenarios and energy *** deep learning based framework is realized with many models used for localization,path planning at high level,path planning at low level,reinforcement learning,transfer learning,power control,and speed *** reinforcement learning,state-action-feedback play important role in decision *** simulation implementation reveals that the efficiency of the AI-based approach towards safe driving of autonomous electric vehicle gives better performance than that of the normal electric vehicles.
Software defect prediction, an integral facet of software engineering, proactively identifies and resolves potential flaws before they escalate into disruptive issues during production. Insights gleaned from dedicated...
详细信息
The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These in...
详细信息
The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These infrastructures are very effective in providing a fast response to the respective queries of the requesting modules, but their distributed nature has introduced other problems such as security and privacy. To address these problems, various security-assisted communication mechanisms have been developed to safeguard every active module, i.e., devices and edges, from every possible vulnerability in the IoT. However, these methodologies have neglected one of the critical issues, which is the prediction of fraudulent devices, i.e., adversaries, preferably as early as possible in the IoT. In this paper, a hybrid communication mechanism is presented where the Hidden Markov Model (HMM) predicts the legitimacy of the requesting device (both source and destination), and the Advanced Encryption Standard (AES) safeguards the reliability of the transmitted data over a shared communication medium, preferably through a secret shared key, i.e., , and timestamp information. A device becomes trusted if it has passed both evaluation levels, i.e., HMM and message decryption, within a stipulated time interval. The proposed hybrid, along with existing state-of-the-art approaches, has been simulated in the realistic environment of the IoT to verify the security measures. These evaluations were carried out in the presence of intruders capable of launching various attacks simultaneously, such as man-in-the-middle, device impersonations, and masquerading attacks. Moreover, the proposed approach has been proven to be more effective than existing state-of-the-art approaches due to its exceptional performance in communication, processing, and storage overheads, i.e., 13%, 19%, and 16%, respectively. Finally, the proposed hybrid approach is pruned against well-known security attacks
Wireless networks such as MANETs present unique challenges due to their dynamic and decentralized nature. Efficient routing protocols are essential for achieving reliable and robust communication in such networks. In ...
详细信息
Hand gesture control technology is an emerging alternative to conventional input devices like keyboards and mice, enabling users to interact with computers through natural hand movements. Although, many researchers wo...
详细信息
A surveillance system detects emergency vehicles stuck in traffic. This system helps manage traffic because the number of vehicles on the road has been increasing daily for years, causing congestion. This project impl...
详细信息
暂无评论