The use of high-penetration solar photovoltaics (PV) to transmission networks is complicated by voltage rise. Infractions of voltage occur when voltage levels surpass the permitted limits. Several solutions have been ...
详细信息
Byzantine distributed quickest change detection (BDQCD) is a crucial problem in cyber-physical security. The challenge of this problem is that an AI plus IoT (AIoT) network needs to detect the change as quickly as pos...
详细信息
Under-resourced automatic speech recognition (ASR) has become an active field of research and has experienced significant progress during the past decade. However, the performance of under-resourced ASR trained by exi...
详细信息
In this work, a prototype system has been designed with a 0.18-μm CMOS technology to capture perspiration rate in daily life. To calculate an amount of perspiration, a temperature sensor is necessary concurrently wit...
详细信息
Lung disease, especially Tuberculosis (TBC), placed the highest death rate in Indonesia. Tuberculosis (TB) in Indonesia is ranked second after India. Therefore, it is important to reduce or early detection of the lung...
详细信息
In this paper, we propose a restoration method of time-varying graph signals, i.e., signals on a graph whose signal values change over time, using deep algorithm unrolling. Deep algorithm unrolling is a method that le...
详细信息
Many individuals now trade online utilizing trading software in the digital world. Binomo is one of Indonesia's most popular trading platforms. This is because some influencers made several promises to Binomo cust...
详细信息
In previous studies, we have proposed the attacker's touch detection method in fingerprint authentication using high-frequency intra-body propagation characteristics to detect attacks in that an attacker holds the...
详细信息
In this paper, we exploit caches on intermediate nodes for QoE enhancement of multi-view video and audio transmission over ICN/CCN by controlling the content request start timing of consumers. We assume the selected s...
This paper evaluates the QoE of video and audio transmission over a full-duplex wireless LAN with interference traffic through a computer simulation and a subjective experiment. We employ a simulation environment with...
详细信息
暂无评论