1Introduction In the field of robotic-human interactions,soft robotics offers enhanced safety and adaptability.A major challenge in this area is the integration of soft actuators with pump systems,which often increase...
详细信息
1Introduction In the field of robotic-human interactions,soft robotics offers enhanced safety and adaptability.A major challenge in this area is the integration of soft actuators with pump systems,which often increases the system volume and *** study presents the development and testing of a robotic finger powered by electrohydrodynamic(EHD)*** leveraging the electric field-induced flow of dielectric fluids.
This survey aims to identify hazards associated with the Internet of Things (IoT), focusing on malware that can infiltrate various devices, applications, and systems within the Industrial Internet of Things (IIoT). Su...
详细信息
Nowadays, social networks have become part of our everyday routine to connect and communicate to diverse communities. The detection of abnormal vertices in these networks has become more vital in exposing network intr...
详细信息
Heart disease is rapidly overtaking other causes of death in India, and it is a major threat to both men and women. Among the top causes of mortality throughout the globe, heart disease ranks first. Therefore, it is c...
详细信息
As ocular computer-aided diagnostic(CAD)tools become more widely accessible,many researchers are developing deep learning(DL)methods to aid in ocular disease(OHD)*** eye diseases like cataracts(CATR),glaucoma(GLU),and...
详细信息
As ocular computer-aided diagnostic(CAD)tools become more widely accessible,many researchers are developing deep learning(DL)methods to aid in ocular disease(OHD)*** eye diseases like cataracts(CATR),glaucoma(GLU),and age-related macular degeneration(AMD)are the focus of this study,which uses DL to examine their *** imbalance and outliers are widespread in fundus images,which can make it difficult to apply manyDL algorithms to accomplish this analytical *** creation of efficient and reliable DL algorithms is seen to be the key to further enhancing detection *** the analysis of images of the color of the retinal fundus,this study offers a DL model that is combined with a one-of-a-kind concoction loss function(CLF)for the automated identification of *** study presents a combination of focal loss(FL)and correntropy-induced loss functions(CILF)in the proposed DL model to improve the recognition performance of classifiers for biomedical *** is done because of the good generalization and robustness of these two types of losses in addressing complex datasets with class imbalance and *** classification performance of the DL model with our proposed loss function is compared to that of the baseline models using accuracy(ACU),recall(REC),specificity(SPF),Kappa,and area under the receiver operating characteristic curve(AUC)as the evaluation *** testing shows that the method is reliable and efficient.
Statistical methods and models are the backbone of machine learning, which allows computers to autonomously discover and exploit data patterns. The ultimate objective is for computers to accurately forecast outcomes b...
详细信息
Public cloud computing provides a variety of services to consumersvia high-speed internet. The consumer can access these services anytimeand anywhere on a balanced service cost. Many traditional authenticationprotocol...
详细信息
Public cloud computing provides a variety of services to consumersvia high-speed internet. The consumer can access these services anytimeand anywhere on a balanced service cost. Many traditional authenticationprotocols are proposed to secure public cloud computing. However, therapid development of high-speed internet and organizations’ race to developquantum computers is a nightmare for existing authentication schemes. Thesetraditional authentication protocols are based on factorization or discretelogarithm problems. As a result, traditional authentication protocols arevulnerable in the quantum computing era. Therefore, in this article, we haveproposed an authentication protocol based on the lattice technique for publiccloud computing to resist quantum attacks and prevent all known traditionalsecurity attacks. The proposed lattice-based authentication protocolis provably secure under the Real-Or-Random (ROR) model. At the sametime, the result obtained during the experiments proved that our protocol islightweight compared to the existing lattice-based authentication protocols,as listed in the performance analysis section. The comparative analysis showsthat the protocol is suitable for practical implementation in a quantum-basedenvironment.
Deep learning, a cutting-edge approach of machine learning, surpasses classical machine learning when it comes to detecting particular structures in complicated, high-dimensional data in the area of computer vision. T...
详细信息
This paper presents a development of a novel path planning algorithm, called Generalized Laser simulator (GLS), for solving the mobilerobot path planning problem in a two-dimensional map with the presence ofconstraint...
详细信息
This paper presents a development of a novel path planning algorithm, called Generalized Laser simulator (GLS), for solving the mobilerobot path planning problem in a two-dimensional map with the presence ofconstraints. This approach gives the possibility to find the path for a wheelmobile robot considering some constraints during the robot movement inboth known and unknown environments. The feasible path is determinedbetween the start and goal positions by generating wave of points in alldirection towards the goal point with adhering to constraints. In simulation,the proposed method has been tested in several working environments withdifferent degrees of complexity. The results demonstrated that the proposedmethod is able to generate efficiently an optimal collision-free path. Moreover,the performance of the proposed method was compared with the A-star andlaser simulator (LS) algorithms in terms of path length, computational timeand path smoothness. The results revealed that the proposed method hasshortest path length, less computational time and the best smooth path. Asan average, GLS is faster than A∗ and LS by 7.8 and 5.5 times, respectivelyand presents a path shorter than A∗ and LS by 1.2 and 1.5 times. In orderto verify the performance of the developed method in dealing with constraints, an experimental study was carried out using a Wheeled Mobile Robot(WMR) platform in labs and roads. The experimental work investigates acomplete autonomous WMR path planning in the lab and road environmentsusing a live video streaming. Local maps were built using data from a live video streaming with real-time image processing to detect segments of theanalogous-road in lab or real-road environments. The study shows that theproposed method is able to generate shortest path and best smooth trajectoryfrom start to goal points in comparison with laser simulator.
Although satellite data is not a novel approach to mapping wetlands, its accuracy depends on data quality and categorization algorithms, making it a continuous challenge. The increasing accessibility of satellite data...
详细信息
暂无评论