In this paper we introduce the notion of neutrosophic fuzzy bitopological ideals. The concept of neutrosophic fuzzy pairwise local function is also introduced here by utilizing the neutrosophic quasi-coincident neighb...
详细信息
The paper aims to represent an autonomous car prototype using the Raspberry Pi as a processing chip. The pi-camera module provides necessary data from the real world to the car, which then passes the data on to the ra...
详细信息
The paper aims to represent an autonomous car prototype using the Raspberry Pi as a processing chip. The pi-camera module provides necessary data from the real world to the car, which then passes the data on to the raspberry-pi. The car can follow a given path safely and intelligently, thus avoiding the risk of human errors by responding to the real-time curve.
The Internet of Vehicles (IoV) is a network of vehicles that are connected through the Internet using communication protocols. However, this raises concerns about security and privacy. The vulnerability of object netw...
The Internet of Vehicles (IoV) is a network of vehicles that are connected through the Internet using communication protocols. However, this raises concerns about security and privacy. The vulnerability of object networks has been highlighted in recent reports on cybernetics, and attacks on these networks could pose significant dangers to data integrity. To avoid this, security measures such as resistance to attacks, data authenticity, access control, and privacy must be integrated. The limited capabilities of IoT objects in terms of processing power, memory, bandwidth, and energy have led to the creation and redesign of protocols and architectures that meet the specific needs of these networks. One such protocol is the Message Queue Telemetry Transport (MQTT), which uses a Publish/Subscribe methodology and small amounts of bandwidth. To address security concerns, the paper proposes using the lightweight cryptographic techniques ASCON and GIFT-COFB, which could be useful in securing communication and data exchange in IoV sensor networks.
With the growth of online shopping, organizations should update their portals and websites in response to changing conditions and competitors' actions. To attract and retain online customers, various tools such as...
详细信息
Automated guided vehicles (AGV) allow for the automation of operations in warehouse environments. From an application point of view, vehicles can use sensors to move and perform a variety of tasks, including moving ob...
详细信息
Vehicle to vehicle (V2V) communication has many applications in intelligent transportation system (ITS) like smart grid systems, fleet management and traffic light control. It aims to interconnect several components l...
Vehicle to vehicle (V2V) communication has many applications in intelligent transportation system (ITS) like smart grid systems, fleet management and traffic light control. It aims to interconnect several components like road infrastructures, wireless networks, sensors, and vehicles. Therefore, it can be utilized to reduce congestion, accidents and fuel consumption. This paper propose a speech encryption system based on a one-dimensional logistic map for vehicle to vehicle communication (V2V) communication in intelligent transportation systems (ITS) to improve road safety and efficiency, where encryption and security play a major role. This study employs a symmetric key cryptography technique for chaotic ciphering. In this approach, a random key table lookup criterion was paired with a one-dimensional chaotic map in order to encrypt speech samples with a high level of security and acceptable speed. XOR encryption and speech row shuffling are used in the proposed technique. Using the difference between the old and new row locations, a combination of variable rotation and inversion was performed to each shuffled row in order to increase the level of security. As a consequence of the testing, the proposed approach was shown to be both efficient and usable. Combining key table and logistic map illustrates the advantages of both high-level security and large random key space. The encrypted speech produced is suitable for practical usage especially in vehicle to vehicle and vehicle to base transmission.
Detecting fraudulent transactions presents two primary obstacles, the presence of imbalanced datasets and the sheer volume of feature categories. The scarcity of fraudulent instances within the dataset often results i...
详细信息
Abundant availability and easy culture process of algae make it a better resource than other vegetable crops for biodiesel production. The oil (with 21% FFA content) extracted from the unused, mixed culture of algae i...
详细信息
Automatic Emergency Braking (AEB) systems play a critical role in enhancing road safety by assisting drivers in avoiding or mitigating collisions. This paper proposes a comprehensive method to model AEB systems using ...
Automatic Emergency Braking (AEB) systems play a critical role in enhancing road safety by assisting drivers in avoiding or mitigating collisions. This paper proposes a comprehensive method to model AEB systems using Fuzzy Timed Petri Nets tailored for the 3-second rule. The 3-second rule dictates that a vehicle should maintain a safe distance of at least 3 seconds from the advanced vehicle to minimize the risk of forward collisions. It is important to note that this paper's scope is limited to applying the three-second rule under specific conditions. We focus on scenarios where the weather is clear and ideal for driving, the road conditions are standard without any anomalies, and the vehicles involved are in optimal working conditions without mechanical faults. This narrowed focus allows for more in-dept. analysis and understanding of the AEB system's performance under these parameters. By incorporating FTPN, which combines the benefits of Timed Petri Nets and fuzzy logic, we can effectively capture timing constraints and uncertainties associated with the AEB system. By integrating Artificial Intelligence (AI) technologies by combining the strengths of Petri Nets and fuzzy logic, FTPN allows us to accurately represent and infer real-time systems while effectively capturing the timing constraints and uncertainties inherent in reliable performance in critical scenarios for our system. Our model aimed at determining the decision of emergency Braking based on rules that consider the vehicle's speed, the distance to the vehicle in front, and the safety distance. An Expert System derives several rules from our database and presents them as Fuzzy Timed Production Rules (FTPR). The conversion from FTPR to FTPN is crucial in building this model since we cannot model this system without the correct formulation of the rules. The based model depicts a real-time system that responds to the surroundings and its speed to determine when it may start braking and to what extent it w
Cloud computing is the storage of data over the Internet rather than locally on a user's device, and it is one of the most extensively used applications of computers and related technologies in today's world. ...
详细信息
Cloud computing is the storage of data over the Internet rather than locally on a user's device, and it is one of the most extensively used applications of computers and related technologies in today's world. Since cloud computing became publicly available, its popularity has risen. End customers may be able to obtain a better application that is more convenient, less expensive, and both effective and efficient because of cloud computing. When storing and managing sensitive data, it is critical to select a storage and management solution that provides security and privacy safeguards. Patients have long been maintained on the cloud, but the data has always been protected by ciphertext encryption. One of the most challenging challenges in a cloud computing environment is the need to protect users' online activities as well as their personal information. The healthcare system was created with the intention of addressing the demands of medical practitioners by providing a solid foundation, simple means to obtain patient information, and efficient ways to use the system. This work describes, with implementation details, an innovative approach for establishing a reliable and effective e-health cloud model employing identity-based encryption. This approach is suggested in this article. The time, power, and energy requirements for encryption and decryption of the suggested strategy were estimated and compared to those of the currently used method. It has been demonstrated that the cryptographic approach presented can reduce the time required for data decoding by up to 50%. Because the decryption process is quicker, the cryptographic procedures may be conducted with less power.
暂无评论