Results 51 to 60 of about 2,061,141 (182)
Automatic modulation classification models based on deep learning models are at risk of being interfered by adversarial attacks. In an adversarial attack, the attacker causes the classification model to misclassify the received signal by adding carefully
Fanghao Xu +5 more
doaj +1 more source
New hardware platforms for healthcare consultations [PDF]
Innovative hardware platforms such as Mobile Clinical Assistants and tabletop computers are emerging that have the potential to significantly impact the interaction between clinician and patient.
Randell, R., Wilson, S.
core
Combining PCA and DCT for Improved Passive Seismic Data Compression
The seismic surveys conducted by the oil and gas sector result in very large datasets, often exceeding terabytes of data, leading to high costs and technical challenges regarding storage and transmission of such large quantities of data.
Matheus Wagner +3 more
doaj +1 more source
A Process Algebra With Qualitative Calculus for Modeling Spatio-Temporal Behaviour
Distributive real-time autonomous systems like cyber-physical systems (CPS) and biology systems have become a hot topic nowadays. The high-level design of these systems shares a common characteristic that the behavior of agents is always space-related: i.
Yuanrui Zhang, Yixiang Chen, Hengyang Wu
doaj +1 more source
Design and development of a novel multirotor configuration with counter-rotating coaxial propellers
In this study, a novel multirotor configuration has been developed, which utilizes a coaxial counter-rotating propeller with a large diameter at the center and four propellers with smaller diameters on four arms in an X configuration.
Mohammad Malakouti Khah +2 more
doaj +1 more source
Confusion and Diffusion Techniques for Image Encryption Process Based on Chaos System
Face recognition uses biometric technologies to identify humans based on their facial characteristics. This method is commonly used to restrict information access control. The benefits of face recognition systems encompass their ease of use and security.
Magfirawaty Magfirawaty +3 more
doaj +1 more source
Increasing sensor reliability through confidence attribution
The reliability of wireless sensor networks (WSN) is getting increasing importance as this kind of networks are becoming the communication base for many cyber-physical systems (CPS).
Roberto M. Scheffel +1 more
doaj +1 more source
Representation and matching of knowledge to design digital systems [PDF]
A knowledge-based expert system is described that provides an approach to solve a problem requiring an expert with considerable domain expertise and facts about available digital hardware building blocks.
Jones, J. U., Shiva, S. G.
core +1 more source
In this paper, we explore the benefits of using a magnetostrictive component in a variable reluctance energy harvester. The intrinsic magnetic field bias and the possibility to utilize magnetic force to achieve pre-stress leads to a synergetic ...
Johan Bjurström +2 more
doaj +1 more source
Linking Physical Fidelity to Downstream Performance in Physics-Informed Fault Diagnosis
A critical question in Scientific Machine Learning is whether improving a Physics-Informed Neural Network’s (PINN) physical fidelity translates into downstream task performance.
Enzo Nicolas Spotorno +2 more
doaj +1 more source

