This paper presents the design and implementation of the Machine Vision Surveillance System Artificial Intelligence (MaViSS-AI) for Covid-19 Norms using jetson nano. This system is designed to be cost-effective, accur...
详细信息
This paper presents a millimeter wave (mmWave) radar and Machine Vision fusion system to alert drivers of potential pedestrian collisions. The system is composed of two subsystems, the mmWave Pedestrian Localization s...
详细信息
While in traditional computing there are many cybersecurity flaws that have been solved, in IoT the computing model differs from regular computing, and can be changed based on the application. Due to this, some new fl...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
The increasing efficiency of complex Neural Network architecture and the continuous improvement of embedded edge computing has reached a point that allows the deployment of advanced computer vision tasks on some of th...
详细信息
This paper introduces a highly efficient energy management system for a microgrid that combines PV system, wind turbine, and battery. The study presents an effective energy management system specifically designed for ...
详细信息
This paper is focused on improving people's general inability to quality sleep. We designed a feedback system that can process brainwaves in the form of time-series EEG data and convert them into RGB color-coded b...
详细信息
Industrial Control Systems (ICS) provide a network environment for operator command and control of cyber-physical systems and devices. As such, these systems are common throughout power plants, pipelines, manufactorie...
详细信息
This paper describes a System-on-Chip implementation of a Modular delay audio effect system. The Zedboard Zynq development board was used to implement the design. The programmable logic on the Zynq processor was used ...
详细信息
DC microgrids are becoming more and more popular, however there are still difficulties involving ongoing instability that are mostly caused by imbalances in energy supply and demand, particularly in situations with pu...
详细信息
暂无评论