|
|
|
Wencong Xu, Hongyi Lu, Lei Zhao and Borui He
In recent years, with the rapid development of computer technology and artificial intelligence design technology, multiple possible design solutions can be quickly generated by transforming the experience and knowledge of structural design into computer ...
ver más
|
|
|
|
|
|
|
Yogeswaranathan Kalyani, Liam Vorster, Rebecca Whetton and Rem Collier
In the last decade, digital twin (DT) technology has received considerable attention across various domains, such as manufacturing, smart healthcare, and smart cities. The digital twin represents a digital representation of a physical entity, object, sys...
ver más
|
|
|
|
|
|
|
Weihong Ma, Xiangyu Qi, Yi Sun, Ronghua Gao, Luyu Ding, Rong Wang, Cheng Peng, Jun Zhang, Jianwei Wu, Zhankang Xu, Mingyu Li, Hongyan Zhao, Shudong Huang and Qifeng Li
Acquiring phenotypic data from livestock constitutes a crucial yet cumbersome phase in the breeding process. Traditionally, obtaining livestock phenotypic data primarily involves manual, on-body measurement methods. This approach not only requires extens...
ver más
|
|
|
|
|
|
|
Wensi Li, Yu Zhang, Ruizhi Li, Lijun Zhang, Xingwang Zhang, Hongyin Li, Peng Nie and Shengdong Zhang
Currently, over 100 nuclear power units globally have been in operation for more than 40 years. Hindered by the limitations of computer technology at the time, these nuclear facilities lack detailed electronic drawings. Activities such as equipment repla...
ver más
|
|
|
|
|
|
|
Mohamed Dhiaeddine Messaoudi, Bob-Antoine J. Menelas and Hamid Mcheick
This research introduces an innovative smart cane architecture designed to empower visually impaired individuals. Integrating advanced sensors and social media connectivity, the smart cane enhances accessibility and encourages physical activity. Three me...
ver más
|
|
|
|
|
|
|
Chen Zhang, Celimuge Wu, Min Lin, Yangfei Lin and William Liu
In the advanced 5G and beyond networks, multi-access edge computing (MEC) is increasingly recognized as a promising technology, offering the dual advantages of reducing energy utilization in cloud data centers while catering to the demands for reliabilit...
ver más
|
|
|
|
|
|
|
Rafael Moreno-Vozmediano, Rubén S. Montero, Eduardo Huedo and Ignacio M. Llorente
The adoption of edge infrastructure in 5G environments stands out as a transformative technology aimed at meeting the increasing demands of latency-sensitive and data-intensive applications. This research paper presents a comprehensive study on the intel...
ver más
|
|
|
|
|
|
|
Burhan Ul Islam Khan, Khang Wen Goh, Mohammad Shuaib Mir, Nur Fatin Liyana Mohd Rosely, Aabid Ahmad Mir and Mesith Chaimanee
As the Internet of Things (IoT) continues to revolutionize value-added services, its conventional architecture exhibits persistent scalability and security vulnerabilities, jeopardizing the trustworthiness of IoT-based services. These architectural limit...
ver más
|
|
|
|
|
|
|
Xingchen Wang and Peng Li
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat...
ver más
|
|
|
|
|
|
|
Saad Said Alqahtany and Toqeer Ali Syed
In the domain of computer forensics, ensuring the integrity of operations like preservation, acquisition, analysis, and documentation is critical. Discrepancies in these processes can compromise evidence and lead to potential miscarriages of justice. To ...
ver más
|
|
|
|