-
1241
Planning and preparing for public health threats at airports
Published 2018-03-01“…In testing too many facets of emergency response, the public health response could be deprioritised. o The practical implementation of communication protocols in a real-time exercise of this scope proved challenging. …”
Get full text
Article -
1242
Multi-Agent Reinforcement Learning Based on Representational Communication for Large-Scale Traffic Signal Control
Published 2023-01-01“…Deep MARL has been used to enable inter-agent communication by learning communication protocols in a differentiable manner. However, many deep MARL communication frameworks proposed for TSC allow agents to communicate with all other agents at all times, which can add to the existing noise in the system and degrade overall performance. …”
Get full text
Article -
1243
Development and Assessment of Internet of Things-Driven Smart Home Security and Automation with Voice Commands
Published 2024-02-01“…This study aims to develop and assess IoT-based home security systems utilizing passive infrared (PIR) sensors to improve user interface, security, and automation controls using voice commands and buttons across different communication protocols. The proposed system incorporates controls for lighting and intrusion monitoring, as well as assessing both the functionality of voice commands and the precision of intruder detection via the PIR sensors. …”
Get full text
Article -
1244
A Secure Dual-Layer Fault Protection Strategy for Distribution Network with DERs: Enhancing Security in the Face of Communication Challenges
Published 2024-02-01“…This layer primarily relies on communication protocols for effective coordination. A Second-Order Generalized Integrator (SOGI) expedites the derivation of the estimated variables, ensuring fast detection with minimal computational overhead. …”
Get full text
Article -
1245
Lightweight Payload Encryption-Based Authentication Scheme for Advanced Metering Infrastructure Sensor Networks
Published 2022-01-01“…However, many sensors in distributed systems, resource constraint smart sensors, and adaptability of IoT communication protocols in sensors necessitate designing an efficient and lightweight security authentication scheme. …”
Get full text
Article -
1246
Anomaly-based intrusion detection system for IoT application
Published 2023-05-01“…In contrast, the use of transmission and communication protocols has raised serious security concerns for IoT devices, and traditional methods such as signature and rule-based methods are inefficient for securing these devices. …”
Get full text
Article -
1247
The role of deep learning in the innovation of smart classroom teaching mode under the background of internet of things and fuzzy control
Published 2023-08-01“…Electronic components are rapidly updated in the context of expanding application requirements, and communication protocols used in combination with various electronic devices are also emerging. …”
Get full text
Article -
1248
Carbon Dioxide Monitoring inside an Australian Brewery Using an Internet-of-Things Sensor Network
Published 2022-12-01“…Low-power sensors and communication protocols are recommended for this task.…”
Get full text
Article -
1249
Minimizing redundant communication in vehicle networks for city mapping
Published 2018Get full text
Thesis -
1250
-
1251
-
1252
-
1253
Design and implementation of globally asynchronous locally synchronous systems
Published 2010“…This report focuses on the pausible-clock globally-asynchronous locally-synchronous (GALS) scheme, which employs the asynchronous communication protocols to decouple the timing issues for the separate locally synchronous (LS) modules, by stopping the local clock (or the LS modules) during each data transfer. …”
Get full text
Final Year Project (FYP) -
1254
Research and development of a reference model for intrusion handling systems in wireless LANs
Published 2011“…Hence, a novel reference model is proposed for a scalable distributed IHS that defines system architecture, specifying the need for identification and response systems with associated sets of methods and inter-IHS communications protocol. A model of IHS description for ad hoc networks with a present intruder has been developed and a need for Unified Intrusion Handling Report Format, Inter IHS Message and Inter IHS Communication Subsystem for inter IHS communications has been identified. …”
Get full text
Thesis -
1255
Quantum phase of Bose-Einstein condensates
Published 2001“…</p> <p>Finally, we propose a scheme for concentrating the entanglement between con- densates, which is an important step in quantum communication protocols. This, along with the ability to manipulate phase and entanglement, suggests that the future for condensates holds not only academic interest but great potential for practical applications.…”
Thesis -
1256
AI and Blockchain-Assisted Secure Data-Exchange Framework for Smart Home Systems
Published 2023-09-01“…If not properly secured and updated, these legacy communication protocols and interfaces can expose potential vulnerabilities that attackers may exploit to gain unauthorized access, disrupt operations, or compromise sensitive data. …”
Get full text
Article -
1257
Simulation-Based Approach for Studying the Balancing of Local Smart Grids with Electric Vehicle Batteries
Published 2015-07-01“…The evaluation results indicate that the simulation-based approach is able to facilitate the evaluation of smart grid– and EV-related communication protocols, control algorithms for charging, and functionalities of local distribution grids as part of a complex, critical cyber-physical system. …”
Get full text
Article -
1258
Transportation of Service Enhancement Based on Virtualization Cloud Desktop
Published 2023-03-01“…This paper spies on application and transport layer communication protocols to meet DaaS communication requirements. …”
Get full text
Article -
1259
A balanced fuzzy Cultural Algorithm with a modified Levy flight search for real parameter optimization
Published 2020“…The new algorithm namely, b-fCA+mLF, utilizes a balanced search mode using a customized belief space with a quality function to harmonize how the knowledge sources work in parallel. The communication protocols between the population space and the belief space are established through the modified fuzzy acceptance and influence functions. …”
Get full text
Journal Article -
1260
Toward Wireless Smart Grid Communications: An Evaluation of Protocol Latencies in an Open-Source 5G Testbed
Published 2024-01-01“…Smart grid networks, and Operational Technology (OT) networks in general, utilize a variety of communication protocols for low-latency control, data monitoring, and reporting at every level. …”
Get full text
Article