The smart city comprises various interlinked elements which communicate data and offers urban life to *** Aerial Vehicles(UAV)or drones were commonly employed in different application areas like agriculture,logistics,...
详细信息
The smart city comprises various interlinked elements which communicate data and offers urban life to *** Aerial Vehicles(UAV)or drones were commonly employed in different application areas like agriculture,logistics,and *** improving the drone flying safety and quality of services,a significant solution is for designing the Internet of Drones(IoD)where the drones are utilized to gather data and people communicate to the drones of a specific flying region using the mobile devices is for constructing the Internet-of-Drones,where the drones were utilized for collecting the data,and communicate with *** addition,the SIRSS-CIoD technique derives a tuna swarm algorithm-based clustering(TSA-C)technique to choose cluster heads(CHs)and organize clusters in IoV ***,the SIRSS-CIoD technique involves the design of a biogeography-based optimization(BBO)technique to an optimum route selection(RS)*** design of clustering and routing techniques for IoD networks in smart cities shows the novelty of the study.A wide range of experimental analyses is carried out and the comparative study highlighted the improved performance of the SIRSS-CIoD technique over the other approaches.
There are some problems in the electric vehicle (EV) charging pile industry, such as the unreasonable location of charging station construction, low utilization rate of charging piles, and imprecise marketing strategi...
详细信息
ISBN:
(纸本)9781450397889
There are some problems in the electric vehicle (EV) charging pile industry, such as the unreasonable location of charging station construction, low utilization rate of charging piles, and imprecise marketing strategies, which may elicit a negative response from EV users, cause colossal waste of resources and hinder the development of EVs. Based on the relevant charging pile data to be analyzed, this paper combines big data-related technologies to propose a big data framework for analyzing the charging pile data to solve the common charging service problems from a systemic perspective. The purpose of the framework is to provide decision-making reference information for charging pile operators, charging pile application operators and charging service marketers to improve the charging pile business more effectively. The framework is demonstrated by functional structure and technical structure.
Cashless payment has been emphasized in many countries, especially since the outbreak of the COVID-19 pandemic. Various payment methods have emerged, among which electronic wallets (e-wallets) have become a popular on...
详细信息
Due to the rapid increase in the exchange of text information via internet networks,the security and authenticity of digital content have become a major research *** main challenges faced by researchers are how to hid...
详细信息
Due to the rapid increase in the exchange of text information via internet networks,the security and authenticity of digital content have become a major research *** main challenges faced by researchers are how to hide the information within the text to use it later for authentication and attacks tampering detection without effects on the meaning and size of the given digital *** this paper,an efficient text-based watermarking method has been proposed for detecting the illegal tampering attacks on theArabic text transmitted online via an Internet *** this purpose,the accuracy of tampering detection and watermark robustness has been improved of the proposed method as compared with the existing *** the proposed method,both embedding and extracting of the watermark are logically implemented,which causes no change in the digital *** is achieved by using the third level and alphanumeric strategy of the Markov model as a text analysis technique for analyzing the Arabic contents to obtain its features which are considered as the digital *** digital watermark will be used later to detecting any tampering of illegal attack on the received Arabic *** extensive set of experiments using four data sets of varying lengths proves the effectiveness of our approach in terms of detection accuracy,robustness,and effectiveness under multiple random locations of the common tampering attacks.
Particle Swarm Optimization (PSO) is a robust stochastic optimization algorithm for solving complex and constrained optimization problems. This paper aims to systematically investigate the influence of diverse random ...
详细信息
This article introduces a methodology to identify the fundamental studies carried out using artificial intelligence for syllabus design and planning. A taxonomy of the most relevant studies is presented based on the m...
详细信息
Requirements Elicitation is the process of identifying system needs by talking with stakeholders who have a direct or indirect effect on the requirements. Requirements may be derived from several sources and are one o...
Requirements Elicitation is the process of identifying system needs by talking with stakeholders who have a direct or indirect effect on the requirements. Requirements may be derived from several sources and are one of the most important phases of requirement engineering. We need to perform different elicitation techniques to find out the user's needs. Pre-requirements tracing is the process of determining the origins of a specific demand. Typically, certain needs arise that have no apparent source, but stakeholders will testify to their importance. Such criteria, however, are most likely dependent on tacit or tacit-like information entrenched in the issue domain. Tacit knowledge is one of the most common challenges for requirement analysts. This study contributes to constructing a systematic literature review for exploring multiple ways to model functional requirements using tacit knowledge. We have identified and analyzed 10 studies. In these research papers, different authors have discussed different methods to gather functional requirements from tacit knowledge.
The outbreak of the COVID-19 pandemic revealed the criticality of timely intervention in a situation exacerbated by a shortage in medical staff and equipment. Pain-level screening is the initial step toward identifyin...
详细信息
The outbreak of the COVID-19 pandemic revealed the criticality of timely intervention in a situation exacerbated by a shortage in medical staff and equipment. Pain-level screening is the initial step toward identifying the severity of patient conditions. Automatic recognition of state and feelings help in identifying patient symptoms to take immediate adequate action and providing a patient-centric medical plan tailored to a patient's state. In this paper, we propose a framework for pain-level detection for deployment in the United Arab Emirates and assess its performance using the most used approaches in the literature. Our results show that a deployment of a pain-level deep learning detection framework is promising in identifying the pain level accurately.
This article is devoted to the actual topic of studying scenarios for adapting a network infrastructure to a network of remote patient monitoring systems (PCMS). The paper presents an overview and analysis of scenario...
详细信息
The active development of the Internet of Things (IoT) in recent years has increased people’s need for control smart devices for home. At the same time, the complexity of these devices is growing. Therefore, Smart Ho...
The active development of the Internet of Things (IoT) in recent years has increased people’s need for control smart devices for home. At the same time, the complexity of these devices is growing. Therefore, Smart Home systems require a simple and convenient interface for control. However, methods for evaluating and comparing interfaces are not clear. In this paper, we described a method to comparing and evaluating different types of Smart Home interfaces. In addition, we evaluate results experimentally. For this comparison, we used a popular Smart Home control software on the market. The results showed that Smart Home graphical user interfaces are more convenient than a messenger or voice. Voice interface is suitable for controlling a Smart Home but is not informative enough in feedback. On the other hand, the familiar interface of the messenger turned out to be the least convenient. This study will help both researchers and practitioners evaluate and choose the right Smart Home interface.
暂无评论