In recent years, several industries have increased their demand for processing precision, automatic detection, and visualization interfaces. Therefore, to keep pace with the fourth industrial revolution, machine tool ...
详细信息
In recent years, several industries have increased their demand for processing precision, automatic detection, and visualization interfaces. Therefore, to keep pace with the fourth industrial revolution, machine tool operators install a large number of sensors on machine tools to obtain more precise physical quantities during processing and use a variety of sensors to obtain measurements in various situations. However, these additional sensors on machine tools result in complicated wire layouts, which exhibit negative effects on processing. Such problems lead to the birth of wireless data transmission, which is expected to become the new standard in the future. At present, there is more and more interactive integration between relevant embedded system and the machine tool, which allows information communication between each other in the wireless domain. However, generally, the majority of machine tool operators focus on optimizing the sensing conditions during processing, but they disregard the importance of information security. In the current era of the Internet of Things (IoT), information security is regarded as a crucial factor. For the wireless communication between the IoT equipment for each machine in the machining field, the transmitted data are almost exposed within public space directly due to the loss in constraint and protection of physical wiring. Therefore, such a process can easily be intercepted by other devices that capture information on relevant status of the machine or command messages received by the controller, where intentional individual may possibly control the operating mechanism and progress of entire plant. This leads to theft of relevant secrets in manufacturing technology for the subject company, or intentional shutdown, machine damage, and vicious blackmailing attacks. Therefore, introducing the mechanism of safety protection during wireless signal transmission is an inevitable technology to maintain the company interests and also the
Digital content industry, encompassing areas such as digital games, computer animation, digital audio-visual applications, and digital art, plays a pivotal role in today's and future developmental trends. Maya 3D ...
详细信息
In the face of the deep learning model's vulnerability to domain shift, source-free domain adaptation (SFDA) methods have been proposed to adapt models to new, unseen target domains without requiring access to sou...
详细信息
In this paper, the influence of different Phase-Locked Loops (PLLs) on the fault response of a grid-following (GFL) Inverter-Based Resource (IBR) is evaluated. The analyzed IBR represents a wind power plant with rated...
详细信息
Video summarization aims to generate a compact summary of the original video for efficient video browsing. To provide video summaries which are consistent with the human perception and contain important content, super...
详细信息
作者:
Özakin, M. BurakChen, LiangAhmed, ShehabBagci, Hakan
Electrical and Computer Engineering Program Computer Electrical and Mathematical Science and Engineering Division Thuwal23955 Saudi Arabia
Ali I. Al-Naimi Petroleum Engineering Research Center Thuwal23955 Saudi Arabia
A conductive layer that is much thinner than the skin depth is often incorporated into electromagnetic solvers as a resistive boundary condition (RBC) to avoid fine meshes (and consequently small time steps for time-d...
详细信息
Corrosion poses a significant challenge in industries due to material degradation and high maintenance costs, making effective inhibitors essential. Recent studies suggest expired pharmaceuticals as alternative corros...
详细信息
The energy control of a Wireless Sensor Network (WSN) often leads to an unbalanced state between the battery storage system, energy extraction through photovoltaic systems energy, and energy utilization in the WSN. Th...
详细信息
In this study, we report the process variation effect (PVE) including the work function fluctuation (WKF) on the DC/AC characteristic fluctuation of stacked gate-all-around silicon complementary field-effect transisto...
详细信息
Population-based computational intelligence algorithms are natural candidates for parallelization and have been utilized to solve a variety of difficult and complex real-world problems. The gray wolf optimizer (GWO) i...
详细信息
暂无评论