Software Defect Prediction (SDP) uses machine learning algorithms to detect faulty and defective modules inside software projects. Like any machine learning model, the model’s performance depends on the training data...
详细信息
This study proposes a robotic massage system combining visual and tactile inspection for personalized therapy. Equipped with RGB-D cameras, a robot arm, and a force sensor, the system identifies massage areas based on...
详细信息
In this poster, I first briefly introduce several system work in the Database Research Group at Southern University of science and technology, (i.e., DBGroup@SUSTech);I next present the key ideas of our on-going proje...
详细信息
People's lives have been evolving due to the advancement of technology, especially in the aspect of mobile internet which has promoted the usage of fitness apps. With this app, users can exercise at anytime and an...
详细信息
In IEC-61850-based digital substations, the protection IED’s performance is dependent on merging unit’s vendor implementation, communication networks, and measurement circuit’s health conditions. As the process bus...
详细信息
The exponential increase in digital data has increased the amount of available online information. This complicates the user’s decision-making. Most online merchants and service providers utilize recommendation syste...
详细信息
In today's interconnected world, social media platforms have enabled individuals to easily communicate and share their emotions with people worldwide. In the current context, some individuals exhibit a higher degr...
详细信息
Wheat is essential everywhere. Wheat leaf diseases hinder growth. Wheat leaf disease identification is crucial to wheat quality and agriculture. This work presents an integrated machine learning strategy to improve wh...
详细信息
Modern developments in the medical industry have been significantly accelerated by the promising advancements of Generative Adversarial Networks (GANs). This study introduces an intriguing exploration into the utiliza...
详细信息
In the field of Renewable energy, data processing is occurring in the photovoltaic plant using the IoT data logger. A data logger is a piece of technology that records and stores data over time, where SCADA systems ar...
详细信息
ISBN:
(纸本)9798350336009
In the field of Renewable energy, data processing is occurring in the photovoltaic plant using the IoT data logger. A data logger is a piece of technology that records and stores data over time, where SCADA systems are also indulged in data transfer and monitoring. Using these systems, we are transferring data from the data logger to cloud where a cloud-based platform is allowed users to manage and monitors the data loggers and as the result of analysis of various plants, the issues will be reported in the ticketing system and the further storage will be done in another cloud. This will result a cloud-cloud data flow where we are concentrating in ensuring the security of the data logger, Ethernet, WIFI, router connectivity, external web pages where data is viewed should be protected and the data backup, storage should be a secured area. RS485/RS422 bus provides the highest data transmission rate in data logger. Data encryption technique that involves Internet-cloud data transfers. This project mainly focus on introducing some new technologies in MaaS, where MaaS is a collection of tools and apps used to monitor a specific aspect of an application, server, system, or IT component. In the solar industry, this implies combining hardware, software, and services to monitor, evaluate, and troubleshoot solar plant faults throughout the solar array's lifetime, where we can monitor the amount of energy and control it securely. And this will help to introduce a secure wide range of global monitoring and reporting techniques in the renewable energy sector where data and data loggers are rising along with the risks. Cyber threats have a significant impact on smart grid performance due to the fast proliferation of real system in power electronic systems for connecting renewable energy sources with cyber frameworks. These electrical equipment in systems are linked by communication networks, which may be vulnerable to major cyber-attacks by malicious attackers. We have shown the d
暂无评论