Predictive maintenance techniques are designed to determine the state of equipment in action to help us know when we can intervene to perform maintenance on it. Predictive maintenance design applies artificial intelli...
详细信息
In this paper, the Laplacian network dynamics is considered, in which every node follows the classical nearestneighhbour rule. One of the nodes, referred as the control node, is allowed to receive the external control...
详细信息
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ...
详细信息
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.
With the advancements in low-earth orbit (LEO) constellations, modern aerial platforms (APs), sector antennas, and device technologies, it is now becoming feasible to provide aerial platform-based cellular network (AP...
详细信息
The multi-input multi-output (MIMO) millimeter wave (mmWave) is a promising technology for beyond 5G communication systems, which provides high data rates, ultra-low latency, massive connectivity, and high spectral ef...
详细信息
Pooling operations, such as average pooling, strided convolution, and max pooling, have become fundamental components of convolutional neural networks (CNNs) due to their ability to capture local features, expand rece...
详细信息
This paper presents an energy-optimized solution for on-device pest detection, preventing image streaming from the traps installed in the monitored orchard surface. We optimize the Viola-Jones object detector to run o...
详细信息
Good power quality and high-power efficiency are important aspects of power system management. Harmonic, as an unwanted frequency component in electrical signals, can interfere with power quality and reduce electrical...
详细信息
作者:
Kaliappan, P.Selvan, M.P.CPRI
Metering and Utility Automation Division Bangalore India NIT
Hybrid Electrical Systems Laboratory Department of Electrical & Electronics Engineering Tiruchirappalli India
Renewable Energy (RE) is a clean and green energy available worldwide. India is harvesting green energy technologies in an exponential way with solar irradiation and wind resources available. In the existing wind farm...
详细信息
We present here the main research topics and activities on security, safety, and robustness of machine learning models developed at the Pattern Recognition and Applications (PRA) Laboratory of the University of Caglia...
详细信息
暂无评论