Flexible temperature sensors have been extensively investigated due to their prospect of wide application in various flexible electronic ***,most of the current flexible temperature sensors only work well in a narrow ...
详细信息
Flexible temperature sensors have been extensively investigated due to their prospect of wide application in various flexible electronic ***,most of the current flexible temperature sensors only work well in a narrow temperature range,with their application at high or low temperatures still being a big *** work proposes a flexible thermocouple temperature sensor based on aerogel blanket substrate,the temperature-sensitive layer of which uses the screen-printing technology to prepare indium oxide and indium tin *** has good temperature sensitivity,with the test sensitivity reaching 226.7μV℃^(−1).Most importantly,it can work in a wide temperature range,from extremely low temperatures down to liquid nitrogen temperature to high temperatures up to 1200℃,which is difficult to be achieved by other existing flexible temperature *** temperature sensor has huge application potential in biomedicine,aerospace and other fields.
Changes in the Atmospheric Electric Field Signal(AEFS)are highly correlated with weather changes,especially with thunderstorm ***,little attention has been paid to the ambiguous weather information implicit in AEFS **...
详细信息
Changes in the Atmospheric Electric Field Signal(AEFS)are highly correlated with weather changes,especially with thunderstorm ***,little attention has been paid to the ambiguous weather information implicit in AEFS *** this paper,a Fuzzy C-Means(FCM)clustering method is used for the first time to develop an innovative approach to characterize the weather attributes carried by ***,a time series dataset is created in the time domain using AEFS *** AEFS-based weather is evaluated according to the time-series Membership Degree(MD)changes obtained by inputting this dataset into the ***,thunderstorm intensities are reflected by the change in distance from a thunderstorm cloud point charge to an AEF ***,a matching relationship is established between the normalized distance and the thunderstorm dominant MD in the space ***,the rationality and reliability of the proposed method are verified by combining radar charts and expert *** results confirm that this method accurately characterizes the weather attributes and changes in the AEFS,and a negative distance-MD correlation is obtained for the first *** detection of thunderstorm activity by AEF from the perspective of fuzzy set technology provides a meaningful guidance for interpretable thunderstorms.
Power system dynamics while appearing distinct, all exhibit features that change over time. Within this vast context, deviations from typical time-based patterns can range from being academically intriguing to potenti...
详细信息
The proliferation of 5G technologies has presented challenges such as signal attenuation and high energy consumption. This study proposes a novel approach to enhance wireless networks by integrating Intelligent Reflec...
详细信息
Ultra-wideband (UWB) technology has gained traction for applications demanding high bandwidth, precise target localisation, and low power consumption. This paper presents an FPGA-based UWB pulse generator tailored for...
详细信息
We consider word-of-mouth social learning involving m Kalman filter agents that operate sequentially. The first Kalman filter receives the raw observations, while each subsequent Kalman filter receives a noisy measure...
详细信息
Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)***,several security vulnerabilities and att...
详细信息
Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)***,several security vulnerabilities and attacks have plagued previous generations of communication systems;thus,physical layer security,especially against eavesdroppers,is vital,especially for upcoming 6G *** this regard,UAVs have appeared as a winning candidate to mitigate security *** this paper,we leverage UAVs to propose two *** first method utilizes a UAV as Decode-and-Forward(DF)relay,whereas the second method utilizes a UAV as a jammer to mitigate eavesdropping attacks for URLLC between transmitter and receiver ***,we present a low-complexity algorithm that outlines the two aforementioned methods of mitigating interception,*** secrecy rate,and we compare them with the benchmark null method in which there is a direct communication link between transmitter and receiver without the UAV DF ***,simulation results show the effectiveness of such methods by improving the secrecy rate and its dependency on UAV height,blocklength,decoding error probability and transmitter-receiver separation ***,we recommend the best method to enhance the secrecy rate in the presence of an eavesdropper based on our simulations.
This paper addresses the challenge of reducing the number of nodes in Look-Up Table (LUT) networks with two significant applications. First, Field-Programmable Gate Arrays (FPGAs) can be modelled as networks of LUTs, ...
详细信息
With the rise of the Internet of Vehicles(IoV)and the number of connected vehicles increasing on the roads,Cooperative Intelligent Transportation systems(C-ITSs)have become an important area of *** the number of Vehic...
详细信息
With the rise of the Internet of Vehicles(IoV)and the number of connected vehicles increasing on the roads,Cooperative Intelligent Transportation systems(C-ITSs)have become an important area of *** the number of Vehicle to Vehicle(V2V)and Vehicle to Interface(V2I)communication links increases,the amount of data received and processed in the network also *** addition,networking interfaces need to be made more secure for which existing cryptography-based security schemes may not be ***,there is a need to augment them with intelligent network intrusion detection *** machine learning-based intrusion detection and anomaly detection techniques for vehicular networks have been proposed in recent ***,given the expected large network size,there is a necessity for extensive data processing for use in such anomaly detection *** learning solutions are lucrative options as they remove the necessity for feature ***,with the amount of vehicular network traffic increasing at an unprecedented rate in the C-ITS scenario,the need for deep learning-based techniques is all the more *** work presents three deep learning-based misbehavior classification schemes for intrusion detection in IoV networks using Long Short Term Memory(LSTM)and Convolutional Neural Networks(CNNs).The proposed Deep Learning Classification Engines(DCLE)comprise of single or multi-step classification done by deep learning models that are deployed on the vehicular edge *** data received by the Road Side Units(RSUs)is pre-processed and forwarded to the edge server for classifications following the three classification schemes proposed in this *** proposed classifiers identify 18 different vehicular behavior types,the F1-scores ranging from 95.58%to 96.75%,much higher than the existing *** running the classifiers on testbeds emulating edge servers,the prediction performance and prediction time comparison of
Additive manufacturing (AM) is a 3D printing process widely used in industries such as automotive, healthcare, aerospace, and consumer goods. It creates different 3D objects by adding different layers over one another...
详细信息
暂无评论