The Third Generation Partnership Project (3GPP) introduced Cellular Vehicle-to-Everything (C-V2X) for vehicular communications. In the standard, C-V2X Mode 4 is defined for the distributed resource selection. Subseque...
详细信息
The advanced acne detection model showcased in this project utilizes deep learning methods to accurately classify skin conditions, including blackheads, dark areas, blemishes, and creases. It employs a YOLOv5 format a...
详细信息
Cyber-Physical systems(CPS)represent an integration of computational and physical elements,revolutionizing industries by enabling real-time monitoring,control,and optimization.A complementary technology,Digital Twin(D...
详细信息
Cyber-Physical systems(CPS)represent an integration of computational and physical elements,revolutionizing industries by enabling real-time monitoring,control,and optimization.A complementary technology,Digital Twin(DT),acts as a virtual replica of physical assets or processes,facilitating better decision making through simulations and predictive *** and DT underpin the evolution of Industry 4.0 by bridging the physical and digital *** survey explores their synergy,highlighting how DT enriches CPS with dynamic modeling,realtime data integration,and advanced simulation *** layered architecture of DTs within CPS is examined,showcasing the enabling technologies and tools vital for seamless *** study addresses key challenges in CPS modeling,such as concurrency and communication,and underscores the importance of DT in overcoming these *** in various sectors are analyzed,including smart manufacturing,healthcare,and urban planning,emphasizing the transformative potential of CPS-DT *** addition,the review identifies gaps in existing methodologies and proposes future research directions to develop comprehensive,scalable,and secure CPSDT *** synthesizing insights fromthe current literature and presenting a taxonomy of CPS and DT,this survey serves as a foundational reference for academics and *** findings stress the need for unified frameworks that align CPS and DT with emerging technologies,fostering innovation and efficiency in the digital transformation era.
Multi-focus image fusion (MFIF) enhances depth of field in photography by generating an all-in-focus image from multiple images captured at different focal lengths. While deep learning has shown promise in MFIF, most ...
详细信息
American Sign Language (ASL) recognition aims to recognize hand gestures, and it is a crucial solution to communicating between the deaf community and hearing people. However, existing sign language recognition algori...
详细信息
Fire accidents are the most prevalent disasters both indoors and outdoors. Early detection of such accidents helps prevent loss of property and lives. Approaches to detect fire are mostly based on environmental sensor...
详细信息
Exploring the transformative potential of Self-Sovereign Identity (SSI) in decentralized identity management, utilizing blockchain technology, this research analyzes the evolution from centralized to user-centric onli...
详细信息
Forest plays a vital role in environmental change and the protection of forests is the utmost important thing. The study attempts to suggest a solution for a smart forest (Internet of Forest Things). As nowadays, the ...
详细信息
Increase in the use of internet of things owned devices is one of the *** publicly available network many kinds of phishing attacks are able to enter into the mobile devices and corrupt the existing *** Phishing is th...
详细信息
Increase in the use of internet of things owned devices is one of the *** publicly available network many kinds of phishing attacks are able to enter into the mobile devices and corrupt the existing *** Phishing is the slow and resilient attack stacking techniques probe the *** proposed model is focused on detecting phishing attacks in internet of things enabled devices through a robust algorithm called Novel Watch and Trap Algorithm(NWAT).Though Predictive mapping,Predictive Validation and Predictive analysis mechanism is *** the test purpose Canadian Institute of cyber security(CIC)dataset is used for creating a robust prediction *** attack generates a resilience corruption works that slowly gathers the credential information from the *** proposed Predictive analysis model(PAM)enabled NWAT algorithm is used to predict the phishing probes in the form of suspicious process happening in the IoT *** prediction system considers the peer-to-peer communication window open for the established communication,the suspicious process and its pattern is identified by the new *** proposed model is validated by finding thepredictionaccuracy,Precision,recallsF1score,errorrate,Mathew’sCorre-lationCoefficient(MCC)andBalancedDetectionRate(BDR).Thepresented approach is comparatively analyzed with the state-of-the-art approach of existing system related to various types of Phishing probes.
A novel reconfigurable diplexer with independently controllable center frequency and insertion phase is proposed in this brief. It simply consists of six coupled resonators and two non-resonating-nodes (NRNs). These s...
详细信息
暂无评论