|
|
|
Mohammed Imran Basheer Ahmed, Rim Zaghdoud, Mohammed Salih Ahmed, Razan Sendi, Sarah Alsharif, Jomana Alabdulkarim, Bashayr Adnan Albin Saad, Reema Alsabt, Atta Rahman and Gomathi Krishnasamy
To constructively ameliorate and enhance traffic safety measures in Saudi Arabia, a prolific number of AI (Artificial Intelligence) traffic surveillance technologies have emerged, including Saher, throughout the past years. However, rapidly detecting a v...
ver más
|
|
|
|
|
|
|
Thoralf Reis, Alexander Kreibich, Sebastian Bruchhaus, Thomas Krause, Florian Freund, Marco X. Bornschlegl and Matthias L. Hemmje
The increasing availability of vast quantities of data from various sources significantly impacts the insurance industry, although this industry has always been data driven. It accelerates manual processes and enables new products or business models. On ...
ver más
|
|
|
|
|
|
|
Ye Chi, Haikun Liu, Ganwei Peng, Xiaofei Liao and Hai Jin
Non-volatile memories (NVMs) have aroused vast interest in hybrid memory systems due to their promising features of byte-addressability, high storage density, low cost per byte, and near-zero standby energy consumption. However, since NVMs have limited w...
ver más
|
|
|
|
|
|
|
Xiao Du, Jiajie Chen, Haibo Zhang and Jiqiang Wang
The aero-engine system is complex, and the working environment is harsh. As the fundamental component of the aero-engine control system, the sensor must monitor its health status. Traditional sensor fault detection algorithms often have many parameters, ...
ver más
|
|
|
|
|
|
|
Athanasios C. Spanos, Sotiris P. Gayialis, Evripidis P. Kechagias and Georgios A. Papadopoulos
In this research, we present a hybrid algorithmic framework and its integration into the precise production scheduling system of a Greek metal forming factory. The system was created as a decision support tool to assist production planners in arranging w...
ver más
|
|
|
|
|
|
|
Robert Bold, Haider Al-Khateeb and Nikolaos Ersotelos
Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a Servi...
ver más
|
|
|
|
|
|
|
Jiaqi Li, Jiali You and Haojiang Deng
Information-centric networking (ICN) is an emerging network architecture that has the potential to address low-transmission latency and high-reliability requirements in the fifth generation and beyond communication networks (5G/B5G). In the ICN architect...
ver más
|
|
|
|
|
|
|
Seojin Jang, Wei Liu and Yongbeom Cho
Owing to their high accuracy, deep convolutional neural networks (CNNs) are extensively used. However, they are characterized by high complexity. Real-time performance and acceleration are required in current CNN systems. A graphics processing unit (GPU)...
ver más
|
|
|
|
|
|
|
Andrea Spinelli, Hossein Balaghi Enalou, Bahareh Zaghari, Timoleon Kipouros and Panagiotis Laskaridis
The energy management strategy of a hybrid-electric aircraft is coupled with the design of the propulsion system itself. A new design space exploration methodology based on Set-Based Design is introduced to analyse the effects of different strategies on ...
ver más
|
|
|
|
|
|
|
Amine Saddik, Rachid Latif and Abdelhafid El Ouardi
Today?s on-chip systems technology has grounded impressive advances in computing power and energy consumption. The choice of the right architecture depends on the application. In our case, we were studying vegetation monitoring algorithms in precision ag...
ver más
|
|
|
|