Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services. [PDF]
Awasthi C, Awasthi SP, Mishra PK.
europepmc +1 more source
ABSTRACT In response to the problems of asymmetric deformation and failure caused by the close range and thick coal seam fully mechanized caving roadway, as well as the difficulty in ensuring the control effect of the roadway surrounding rock. Through numerical simulation and on‐site industrial experiments, combined with the geological conditions of a
Yupeng Shen+3 more
wiley +1 more source
Design and Implementation of ESP32-Based Edge Computing for Object Detection. [PDF]
Chang YH, Wu FC, Lin HW.
europepmc +1 more source
Mod Tanh‐Activated Physical Neural Network MPPT Control Algorithm for Varying Irradiance Conditions
The proposed MPPT controller (CRT‐POA‐PID) is implemented to enhance power efficiency in the PV system. The beta‐distributed point estimation technique is used for mismatch factor correction, improving performance. Simulations show a 98.42% efficiency improvement, a 4.54 dB reduction in total harmonic distortion, and faster convergence compared to ANN ...
Khuong Nguyen‐Vinh+2 more
wiley +1 more source
Health State Assessment Method for Complex Systems Based on Correlation Decoupled Belief Rule Base
In engineering practice, complex systems are subject to noise, and correlations can exist between attributes. This correlation can have a through effect on the validity of equipment health state evaluation. This paper proposes a belief rule base model that considers the correlation of attributes, which effectively enhances the accuracy and robustness ...
Sulong Li+3 more
wiley +1 more source
Robust Access Control for Secure IoT Outsourcing with Leakage Resilience. [PDF]
Riad K.
europepmc +1 more source
The analysis showed that the roof rock beam fractured above the side of the 5 m small coal pillar due to the influence of an anticline structure, leading to the proposal of an asymmetric control mechanism. Grouting pillars and individual supports were used for support, and the technology was successfully applied in the field, meeting the production ...
Linjun Peng+6 more
wiley +1 more source
Secure cloud computing: leveraging GNN and leader K-means for intrusion detection optimization. [PDF]
Dugyala R+7 more
europepmc +1 more source
Cybersecurity Solutions for Industrial Internet of Things-Edge Computing Integration: Challenges, Threats, and Future Directions. [PDF]
Zhukabayeva T+4 more
europepmc +1 more source