Under-resourced automatic speech recognition (ASR) has become an active field of research and has experienced significant progress during the past decade. However, the performance of under-resourced ASR trained by exi...
详细信息
The early identification of plant diseases is crucial for preventing the loss of crop production. Recently, the advancement of deep learning has significantly improved the identification of plant leaf diseases. Howeve...
Automatic speaker verification (ASV) plays a critical role in security-sensitive environments. Regrettably, the reliability of ASV has been undermined by the emergence of spoofing attacks, such as replay and synthetic...
详细信息
eLearning has been utilized as a mode of instruction among medical students amidst the COVID-19 pandemic. The present study aimed to investigate the factors influencing the acceptance of eLearning platforms in medical...
详细信息
This paper is concerned with the container pre-marshalling problem, which involves relocating containers in the storage area so that they can be efficiently loaded onto ships without reshuffles. In reality, however, s...
详细信息
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ...
详细信息
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.
This review presents a novel and comprehensive analysis of various sealants used in diverse coating applications, focusing on their role in corrosion prevention. Sealants are crucial in shielding the coating materials...
详细信息
This paper addresses the problem of input-to-state stability (ISS) and stabilization of linear ordinary differential equations (ODEs) coupled with a system of homogeneous linear hyperbolic partial differential equatio...
详细信息
Impellers are extensively employed across various industrial sectors and in different industrial systems, such as ducted-fan modules. The configuration of ducted-fan modules can be optimized to achieve high impeller p...
详细信息
Subcooled flow boiling plays a pivotal role in various industrial applications, including nuclear reactors and thermal managementsystems. However, the rapid and complex changes of condensing bubbles experience from t...
详细信息
暂无评论