Search
Search Results
-
Social Network Analysis-Based Approach to Investigate the Network of Risk and Crisis Communication of Government Agencies During Early Stages of COVID-19 in Sri Lanka
Effective communication and coordination between government agencies and the general public are important to manage disaster risks and mitigate the... -
Hardware Testbed Design and Performance Evaluation for ISAC Enabled CAVs
To overcome the bottleneck of unreliable environment sensing caused by unpredictable weather and obstacle blockage, the cooperation among connected... -
A Cloud-Edge Server-Based Cypher Scheme for Secure Data Sharing in IoT Environment
As the technologies are growing, new challenges are emerging. The Internet is also one of these. IoT and cloud computing are considered a highly... -
An Interleaving Approach to Control Mobile Device and Elements via Screen Buffer and Audio Streaming
Nowadays mobile devices are powered with huge features (voice enabled, OnDevice AI, health, IoT) which requires device access and validation methods... -
Positron Emission Tomography (PET) Imaging Based on Sub-millimeter Pixelated CdZnTe Detectors
This chapter examines positron emission tomography (PET) imaging applications using sub-millimeter pixelated cadmium zinc telluride (CdZnTe)... -
Interoperability and Portability in Big Data Analysis Based Cloud-Fog-Edge-Dew Computing
A great deal of interoperability and portability exist in cloud computing, which affects the seamless integration and mobility of systems and... -
Visual Simulation and Demonstration of Building Quality Improvement in Existing Residential Areas Driven by Integrated Information System
Visual simulation and demonstration supported by digital simulation technology become an important way to promote and demonstrate scientific... -
Picture fuzzy Additive Ratio Assessment Method (ARAS) and VIseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) method for multi-attribute decision problem and their application
The purpose of this paper is to study the multi-attribute decision-making problem under the fuzzy picture environment. First, a method to compare the...
-
Control of VSI in Microgrid Using Improved Particle Swarm Optimization
A real-time fine-tuning approach is used in this study to offer an optimum power control strategy for microgrid operation. The main theme of the... -
Modelling, Analysis, and Control of OmniMorph: an Omnidirectional Morphing Multi-rotor UAV
This paper introduces for the first time the design, modelling, and control of a novel morphing multi-rotor Unmanned Aerial Vehicle (UAV) that we...
-
Multi-objective Fuzzy Reliability Redundancy Allocation for \(x_{j}\) -out-of- \(m_{j}\) System Using Fuzzy Rank-Based Multi-objective PSO
The main goal of this paper is to solve a fuzzy multi-objective reliability redundancy allocation problem (MORRAP) for... -
Evaluating Performances of VPN Tunneling Protocols Based on Application Service Requirements
A Virtual Private Network (VPN) creates a private communication path over the public network to ensure the security of the transmitted data. A... -
Information sharing in decentralised supply chains with partial collaboration
We explore the value of information sharing for smoothing the dynamics of supply chains when some echelons do not collaborate. To this end, we study...
-
Attribute-based encryption of LSSS access structure with expressive dynamic attributes based on consortium blockchain
Attribute-based encryption (ABE) allows users to encrypt and decrypt data based on attributes. It realizes fine-grained access control and can...
-
BCSR: toward arbitrarily oriented text image super-resolution via adaptive Bezier curve network
Although existing super-resolution networks based on deep learning have obtained good results, it is still challenging to achieve an ideal visual...
-
Time-based information sharing approach for employed foragers of artificial bee colony algorithm
Collective foraging and information sharing behaviors of honey bees have lead to emerge different swarm intelligence-based optimization techniques....
-
3D Warehousing: Enabling Intelligent Warehousing Visualization Based on Three.js
In the industry 4.0 era, the 3D visualization and real-time automatic monitoring of intelligent warehousing supported are becoming increasingly... -
Exploiting device-to-device (D2D) transmission strategy for throughput enhancement in WLANs
The IEEE 802.11 MAC protocols have been implemented in many wireless ad hoc and infrastructure networks. Most of the IEEE 802.11-based networks adopt...
-
Quasi-Decentralized Cyber-Physical Fabrication Systems—A Practical Overview
Building an effective cyber-physical system is difficult due to the overall complexity of technologies on their own, challenges with the interaction... -
Design and Development of Digital Intelligent Fracturing Platform
There are many problems in data monitoring of fracturing construction site, such as many data types, large amount of data, single admission mode,...