Power Engineering and Intelligent Systems : Proceedings of PEIS 2023, Volume 2 / / edited by Vivek Shrivastava, Jagdish Chand Bansal, Bijaya Ketan Panigrahi |
Autore | Shrivastava Vivek |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (469 pages) |
Disciplina | 621.31 |
Altri autori (Persone) |
BansalJagdish Chand
PanigrahiBijaya Ketan |
Collana | Lecture Notes in Electrical Engineering |
Soggetto topico |
Electric power production
Electric power distribution Artificial intelligence Electrical Power Engineering Energy Grids and Networks Artificial Intelligence |
ISBN | 981-9973-83-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. A Comprehensive Survey on Security of Single Source Cloud to Distributed Enviroments Edge and Fog Computing -- 2. Load Frequency Control Of A Two Area Power System Using Different Optimization Techniques -- 3. A Comparative Analysis on Various Modified Deep Convolution Neural Networks on Maize Plant Leaf Disease Classification -- 4. State of Charge estimation of Li-Ion Batteries using Random Forest Regression Model with modified Parameters for Multiple Cycles -- 5. Ensemble Learning for Churn Analysis: A Comprehensive Evaluation of Methods -- 6. Performance analysis of Solar PV system for the remote region of State West Bengal, India. |
Record Nr. | UNINA-9910805579103321 |
Shrivastava Vivek | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Power Engineering and Intelligent Systems : Proceedings of PEIS 2023, Volume 1 / / edited by Vivek Shrivastava, Jagdish Chand Bansal, B. K. Panigrahi |
Autore | Shrivastava Vivek |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (402 pages) |
Disciplina | 621.31 |
Altri autori (Persone) |
BansalJagdish Chand
PanigrahiB. K |
Collana | Lecture Notes in Electrical Engineering |
Soggetto topico |
Electric power production
Electric power distribution Artificial intelligence Electrical Power Engineering Energy Grids and Networks Artificial Intelligence |
ISBN | 981-9972-16-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- About the Editors -- Control Strategies for Blood Pressure Regulation in the Diabetic Patients Post Surgery -- 1 Introduction -- 2 Internal Model Control -- 2.1 Factorization -- 2.2 Design of IMC Control -- 2.3 Adding Filter -- 2.4 Low Pass Filter -- 3 Design of the IMC Based PID Control -- 4 Simulation Results -- 5 Conclusion -- References -- Detecting Obfuscated Malware Using Graph Neural Networks -- 1 Introduction -- 2 Related Works -- 2.1 Malware Obfuscation Techniques -- 2.2 Malware Detection Techniques -- 3 Methods -- 3.1 Types of GNNs -- 3.2 Applications of GNNs -- 4 Results -- 4.1 Dataset -- 4.2 Results -- 5 Conclusions -- References -- Semi-Vector Controlled PM Synchronous Motor Drive -- 1 Introduction -- 2 Modeling of PM Synchronous Motor -- 3 Review of Vector Control Scheme -- 4 Semi-Vector Control Scheme -- 5 Implementation -- 6 Result and Discussion -- 7 Conclusion -- References -- A Comprehensive Review of Sensor-Based Smart Packaging Technology -- 1 Introduction -- 2 Active Packaging -- 3 Oxygen Scavengers -- 4 CO2 Absorbers and Emitters -- 5 Antimicrobial Packing -- 6 Moisture or Humidity Prevention -- 7 Discharge of Antioxidants -- 8 Recyclers of Ethylene -- 9 Other Forms of Activated Packaging -- 9.1 Intelligent Packaging -- 9.2 Sensors -- 10 Indicators -- 10.1 Freshness Indicators -- 10.2 Time Temperature Indicators -- 10.3 Integrity Indicators -- 11 Conclusion -- References -- Comparative Analysis of RSA-RK and ECC-RK for Aadhaar Card -- 1 Introduction -- 2 Literature Survey -- 3 Elliptic Curve Cryptography Algorithm -- 3.1 Runge-Kutta Methods -- 4 Proposed RKECC Algorithm -- 4.1 RKECC -- 5 Experimental Results -- 5.1 Time for Encryption -- 5.2 Time for Decryption -- 5.3 Time for Execution -- 5.4 Encryption Throughput -- 5.5 Decryption Throughput -- 5.6 Execution Throughput.
5.7 Avalanche Effect -- 5.8 Power Consumption -- 6 Conclusion -- References -- Fundamental Security Risk Modeling in Smart Grid in the Modern Era of Artificial Intelligence -- 1 Introduction of Artificial Intelligence in Smart Grid -- 2 Need of Smart Grid -- 3 Comparison Between Traditional Grid and Smart Grid -- 4 AI-Based Power Generation and Distribution Through Smart Grid -- 5 Role of AI in the Management of Smart Grid -- 6 Algorithms Used in Smart Grid -- 6.1 Neural Networks -- 6.2 Fuzzy Logic -- 6.3 Reinforcement Learning -- 6.4 Support Vector Machines (SVMs) -- 6.5 Decision Trees -- 6.6 Particle Swarm Optimization -- 7 Conclusion -- References -- Adaptive Multi-resolution Simulations of Cascaded Converters -- 1 Introduction -- 2 High-Fidelity Modeling of PECs -- 2.1 Cascaded Converters -- 3 AMRS Framework for Cascaded Converters -- 4 Simulations -- 5 Conclusion -- References -- Efficient Solar Cell Using COMSOL Multiphysics -- 1 Introduction -- 1.1 Construction of the Solar Cell -- 1.2 Working of Solar Cell -- 1.3 Solar Cell Panels -- 1.4 Solar Power System Components -- 1.5 Depletion Region Formation -- 2 Literature Review -- 3 Methodology -- 3.1 Geometry -- 3.2 Interpolation Spectrums -- 3.3 Variables -- 3.4 Materials -- 3.5 Meshing -- 3.6 Study -- 3.7 Results -- 4 Results and Analysis -- 5 Conclusion and Future Work -- References -- Post Quantum Secure Blockchain Architecture for Data Dissemination -- 1 Introduction -- 2 Blockchain Characteristics -- 2.1 Functional Characteristics -- 2.2 Security Issues -- 3 Proposed Post Quantum Secure Blockchain Architecture -- 3.1 Parameters Selection/Setup Phase -- 3.2 Public/Private Key Generation(upper B 0 comma upper T Subscript upper B 0 Baseline comma upper B 1 comma upper B 2 comma upper B 3 comma ellipsis comma upper B Subscript n BaselineB0,TB0, B1,B2,B3,…,Bn) -- 3.3 Address Generation. 3.4 Transaction Block Generation -- 3.5 Consensus Participation with Aggregate Signature -- 3.6 Verification of Block -- 3.7 Consensus with Aggregate Signature Verification -- 4 Performance -- 5 Conclusion -- References -- An Open-Source Learning Management System -- 1 Introduction -- 1.1 Different Types of Learning -- 1.2 LMS -- 2 Related Work -- 3 Software Used -- 3.1 WordPress -- 4 Implementation -- 4.1 Selection of Domain -- 4.2 Selection of Domain -- 4.3 Creation of Page -- 4.4 Creation of Course -- 4.5 Payment Method -- 4.6 Data Storage -- 5 Applications -- 6 Future Scope -- 7 Conclusion -- References -- Design and Implementation of Seven-Level Reduced Switch Count Multilevel Inverter for Electric Vehicle Applications -- 1 Introduction -- 2 Cascaded H-bridge Multilevel Inverter -- 3 Cascaded H-bridge Multilevel Inverter -- 4 PWM for Harmonics Reduction -- 5 Results and Discussions -- 6 Conclusion -- References -- Ultrasound Image Classification and Follicle Segmentation for the Diagnosis of Polycystic Ovary Syndrome -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Image Acquisition and Pre-Processing -- 3.2 Deep Learning Technique -- 3.3 Performance Analysis -- 4 Results and Discussions -- 4.1 Classification -- 4.2 Segmentation -- 5 Conclusions and Future Perspectives -- References -- Twitter Data Analysis Using BERT and Graph-Based Convolution Neural Network -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 4 Results and Discussion -- 5 Conclusion -- References -- A Topology for Reactive Power Compensation in Grid System Using a Low-Cost Thyristor Switched Capacitor Scheme -- 1 Introduction -- 2 Background -- 3 Thyristor Switched Capacitor -- 4 Simulink Model of Test System -- 5 Results and Discussion -- 6 Conclusion -- References. An Automated Two-Stage Brain Tumour Diagnosis System Using SVM and Geodesic Distance-Based Colour Segmentation -- 1 Introduction -- 2 Related Works -- 3 Materials and Metrics -- 3.1 Materials -- 3.2 Metrics -- 4 Proposed Methodology -- 5 Results and Discussion -- 6 Conclusion -- References -- Assessment of Online Teaching Using Statistical and Unsupervised Learning Methods -- 1 Introduction -- 2 Methodology -- 2.1 Population and Sample -- 2.2 Tests and Methods -- 3 Analysis -- 4 Discussion -- 5 Conclusion -- References -- An Image-Based Automated Model for Plant Disease Detection Using Wavelet -- 1 Introduction -- 2 Suggested Model -- 2.1 Image Acquisition -- 2.2 Image Pre-processing -- 2.3 Image Segmentation -- 2.4 Feature Extraction -- 2.5 Classification -- 3 Experimental Setup -- 4 Experimental Findings -- 5 Conclusion and Future Scope -- References -- Computer Vision Assisted Bird-Eye Chilli Classification Framework Using YOLO V5 Object Detection Model -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Architecture of the Proposed System -- 4 Experimental Setup -- 5 Conclusion -- References -- An Effective Grid Connected Multi Level Inverter Based Hybrid Wind and Solar Energy -- 1 Introduction -- 2 System Description -- 2.1 PV Array Modelling -- 2.2 Wind Energy Source -- 3 Grid Connected Hybrid Cascaded MLI -- 4 Control Method and Switching Strategy -- 5 Results and Discussions -- 6 Comparison Between Proposed System and Existing System -- 7 Conclusion -- References -- A Comprehensive Analysis of Autism Spectrum Disorder Using Machine Learning Algorithms: Survey -- 1 Introduction -- 2 Related Works -- 3 Investigation of ASD -- 4 Discussion -- 5 Challenges and Solutions -- 6 Conclusion and Future Work -- References -- Energy-Efficient Cluster Head Election and Data Aggregation Ensemble Machine Learning Algorithm -- 1 Introduction. 2 Literature Review -- 3 Proposed Work -- 3.1 Cluster Formation Using Machine Learning -- 3.2 Data Aggregation Using Machine Learning -- 3.3 Methods and Tools -- 4 Result Analysis -- 5 Conclusion -- References -- Multi-sensor Data Fusion for Early Fire Estimation Using ML Techniques -- 1 Introduction -- 2 The Approach -- 2.1 Scaling and Data Preprocessing -- 2.2 Algorithms for Machine Learning -- 3 Experiments -- 3.1 Logistic Regression -- 3.2 K-Nearest Neighbor -- 3.3 SVM -- 3.4 SVM RBF -- 3.5 Naive Bayes -- 3.6 Decision Tree -- 3.7 Random Forest -- 3.8 Graphs -- 4 Observation and Result -- 5 Sum Up and Future Outlook -- References -- Design and Analysis of Solar Cell Coplanar Antenna for Wireless Applications -- 1 Introduction -- 2 Design Modelling -- 3 Results and Analysis -- 4 Conclusion -- References -- Open Permissioned Blockchain Solution for Private Equity Funding Using a Global, Cross-Cloud Network Blockchain Platform -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Methodology -- 5 Results -- 6 Conclusion -- References -- The Challenge of Recognizing Artificial Intelligence as Legal Inventor: Implications and Analysis of Patent Laws -- 1 Introduction -- 1.1 Social Significance -- 1.2 Research Methodology -- 2 Overview of Artificial Intelligence -- 3 Patent Laws and Legal Inventorship -- 4 Case Law and International Perspectives -- 5 Implications of Recognizing AI as a Legal Inventor -- 6 Potential Solutions for Recognizing AI as a Legal Inventor -- 7 Results and Discussion -- 8 Way Forward -- 9 Conclusion -- References -- Comparative Analysis of Imbalanced Malware Byteplot Image Classification Using Transfer Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Architecture -- 4 Proposed Methodology -- 4.1 Data Blending -- 4.2 Image Preprocessing -- 4.3 Domain Adaptation -- 4.4 Evaluation Metrics -- 5 Results and Discussion. 5.1 Comparison Across Models. |
Record Nr. | UNINA-9910770246403321 |
Shrivastava Vivek | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Power Engineering and Intelligent Systems : Proceedings of PEIS 2024, Volume 2 |
Autore | Shrivastava Vivek |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (531 pages) |
Altri autori (Persone) |
BansalJagdish Chand
PanigrahiB. K |
Collana | Lecture Notes in Electrical Engineering Series |
ISBN |
9789819767144
9819767148 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Organization -- Preface -- Contents -- About the Editors -- Study of the Optimal Sizing of Battery Energy Storage Systems for Microgrid Applications -- 1 Introduction -- 2 Literature Review -- 3 Application (Role) of ESS on the Generation Side -- 4 Applications (Role) of ESS for the End User -- 5 Results and Discussion -- 6 Conclusion and Future Directions -- References -- Integrated State of Charge and State of Health Method for Operating Range Prediction in Electric Vehicles -- 1 Introduction -- 1.1 SOC Estimation -- 1.2 SOH Estimation -- 1.3 Integrated SOC and SOH Estimation -- 2 Proposed Simulink Model -- 2.1 Battery Model -- 2.2 Thermal Model -- 2.3 State of Charge (SOC) Model -- 2.4 SOH Model -- 2.5 Range Prediction -- 3 Results and Discussion -- 3.1 SOC Prediction -- 3.2 SOH Prediction -- 3.3 Range Prediction -- 4 Conclusion -- References -- Crime Prediction Using Ensemble Machine Learning Approach -- 1 Introduction -- 2 Related Work -- 3 Theoretical Background -- 4 Goals and Objectives -- 5 Methodology -- 5.1 Dataset Description -- 5.2 Data Preprocessing -- 5.3 EDA -- 5.4 Ensemble Learning -- 6 System Architecture -- 7 Results and Discussion -- 8 Conclusions -- 9 Future Scope -- References -- Gated Recurrent Unit with Attention Mechanism for IC50 Prediction Model Using Amyotrophic Lateral Sclerosis Related Proteins -- 1 Introduction -- 2 Databases and Dataset Preparation -- 3 Model Building -- 4 Results and Discussion -- 5 Conclusion -- References -- Exploring Echo State Network for Detection of Gait Freezing in Parkinson's Patients Optimized Through Modified Metaheuristics -- 1 Introduction -- 2 Related Works -- 2.1 Echo State Networks -- 3 Method -- 3.1 Original COA -- 3.2 Modified COA -- 4 Experimental Setup -- 5 Simulation Outcomes -- 6 Conclusion -- References.
Computer Vision-Based Self-inflicted Violence Detection in High-Rise Environments Using Deep Learning -- 1 Introduction -- 2 Literature Review -- 2.1 Self-inflicted Violence Prevention Strategies [5] -- 2.2 Self-inflicted Violence Detection Systems [6] -- 2.3 Computer Vision Techniques -- 2.4 Deep Learning Algorithms -- 2.5 Research Gaps -- 2.6 Relevant Case Studies -- 3 Methodology -- 3.1 Data Used -- 3.2 Flow of Frame Feeds -- 3.3 Video Processing Techniques -- 3.4 Alert and Intervention Mechanisms -- 3.5 DeepSORT Algorithm [22] -- 3.6 Record Updating -- 3.7 Display of Message -- 3.8 Curse of NMS -- 3.9 Updating Non-decreasing Probability and Color on the Frame -- 4 Results and Discussion -- 5 Conclusion -- References -- Sliding Mode Control Strategies for Maglev Systems Based on Kalman Filtering -- 1 Introduction -- 1.1 Sliding Mode Control Strategies -- 1.2 Kalman Filters -- 1.3 Contribution and Structure of the Paper -- 2 Mathematical Model -- 3 Controller Design -- 3.1 Sliding Mode Control -- 3.2 Backstepping Sliding Mode Control -- 4 Kalman Filter Design -- 5 Simulation Results -- 6 Conclusion -- References -- A Deep Learning Framework on Embedded ADAS Platform for Lane and Road Detection -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Camera -- 3.2 Architecture of ResNet-18 -- 3.3 Embedded ADAS Platform -- 4 Implementation Details -- 4.1 Dataset -- 4.2 Implementation on HIL -- 4.3 Road and Scenerio Generation -- 4.4 Algorithm for Lane Detection -- 5 Results -- 5.1 Detection of Lane -- 6 Conclusion and Future Scope -- 6.1 Conclusion -- 6.2 Future Scope -- References -- Innovative Convolutional Neural Network Approach to Enhance Real-Time Face Recognition Accuracy -- 1 Introduction -- 2 Exploring System Limitations -- 2.1 Tackling Uncontrolled Environments -- 2.2 Demanding Computational Resources -- 2.3 Pursuit of Precision. 3 Related Work -- 3.1 Enrolling New Offenders -- 3.2 Refining Image Preprocessing -- 3.3 Unearthing Distinctive Features -- 3.4 The Matching -- 4 Methodology -- 5 Results -- 6 Conclusion -- References -- Tomato Plant Leaf Disease Prediction and Suggestion Using Deep Learning -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Dataset -- 4 Result Analysis and Evaluation Metrics -- 5 Conclusion and Future Work -- References -- A Hybrid Approach for Deep Fake Detection Using Deep Learning Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 Dataset -- 4 Methodology -- 5 Result and Analysis -- 6 Conclusion and Future Work -- References -- Decoding Retinoblastoma: Unraveling Genetic Variants Through Bioinformatics and Next-Generation Sequencing Data Analysis -- 1 Introduction -- 1.1 Overview of Research -- 2 Research Objectives -- 3 Materials and Methodology -- 3.1 Materials -- 4 Results -- 5 Discussion -- 6 Conclusion and Future Work -- References -- Optimizing PV Inverter Performance with Particle Swarm Optimization and Sugeno Fuzzy Logic for Reduced THD in Mismatched Conditions -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Particle Swarm Optimization (PSO) Methodology -- 3.2 Sugeno Fuzzy Logic Integration -- 3.3 Rationale Behind Combining PSO with Sugeno Fuzzy Logic -- 4 Modeling and Simulation -- 5 Results -- 5.1 Evaluation of Total Harmonic Distortion -- 5.2 Comparative Results -- 6 Conclusion -- References -- Solar on Water: Examining the Feasibility of Floating PV at Bhakra Nangal Dam -- 1 Introduction -- 2 Floating PV System Plants -- 3 Research Methodology -- 3.1 Data Collection -- 3.2 Data Analysis -- 3.3 Mathematical Equations -- 3.4 Flowchart of Procedure -- 4 Result and Discussion -- 4.1 Design Work -- 4.2 Design Models -- 4.3 Model Analysis -- 5 Conclusion -- References. Deep Learning for Digital Olfaction: Graph-Based Self-Supervised Learning -- 1 Introduction -- 1.1 Digital Olfaction -- 1.2 Gas Chromatography -- 1.3 Molecule Structure and Odor Relationship -- 2 Related Work -- 2.1 Dragon and Mordred Features -- 2.2 Molecular Fingerprints -- 2.3 ODRP: A Deep Learning Framework for Odor Descriptor Rating Prediction Using Electronic Nose -- 2.4 GNN Based Model -- 3 Proposed Work -- 3.1 Self-supervised Learning -- 3.2 Graph Self-supervised Learning -- 3.3 Contrastive Graph Self-supervised Learning -- 4 Result -- 5 Conclusion -- References -- Leveraging Regression Techniques to Predict Crime Rates in India: A State-Wise Analysis -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 4 Data Analysis -- 5 Conclusion and Limitations -- References -- Autoencoder-Huffman Ensemble Model for Image Compression -- 1 Introduction -- 1.1 Compression -- 2 Literature Survey -- 2.1 Traditional Compression Methods -- 2.2 Deep Learning -- 2.3 Auto Encoder -- 2.4 Types of Auto Encoder -- 2.5 Evaluation Metrics -- 3 Methodology -- 4 Results and Discussions -- 4.1 MNIST -- 4.2 CIFAR-10 -- 4.3 Fashion MNIST -- 5 Conclusion and Future Work -- References -- Spatial-Spectral Analysis of Hyperspectral Imagery with Multilevel Thresholding and Multi-OTSU Segmentation -- 1 Introduction -- 2 Background Study -- 3 Dataset Description -- 4 Methodology -- 4.1 Multilevel Thresholding-Based Segmentation -- 4.2 Multi-Otsu Segmentation -- 4.3 Accuracy Metrics -- 5 Results -- 6 Conclusion -- References -- Advanced Deep Learning Architectures for Remote Sensing-Based Segmentation -- 1 Introduction -- 2 Datasets -- 3 Methodology -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Wideband Isolation and Gain Enhancement of Sub-6 GHz MIMO Antenna Using an Asymmetric Epsilon Negative Metasurface Reflector -- 1 Introduction. 2 Design of Slotted Rhombus MIMO Antenna -- 3 Design of Epsilon Negative (ENG) Unit Cell -- 3.1 Design and Placement of Plus-Shaped ENG Reflector Layer onto MIMO Antenna -- 4 Results and Discussion -- 4.1 S-Parameter Response -- 4.2 Radiation Pattern -- 4.3 Mimo Performance Metrics. -- 5 Conclusion -- References -- Design and Testing of U-type Electromagnetic Actuator for Magnetic Bearing -- 1 Introduction -- 2 Actuator and Rotor Specification and Design -- 2.1 Rotor -- 3 The Actuator and Rotor Design and Testing -- 3.1 DC Test Without Object for Measuring Resistance -- 3.2 Inductance Measurement Using AC Test with Object -- 3.3 Measuring Attractive Force Using the Load Cell Test -- 4 Conclusion -- References -- Various Compensation Topologies Used in Wireless Power Charger for EV: Classification, Component Design, and Comparison -- 1 Introduction -- 2 Wireless Power Transfer -- 3 Need of Compensation Topologies -- 4 Classification of Compensation Topologies -- 4.1 No. of One Resonant Element on Both Sides -- 5 Comparison of Compensation Topologies or Networks -- 6 Conclusion -- References -- Analysis of Modified Shunt Active Power Filter Based on One Cycle Control -- 1 Introduction -- 2 Power Stages and Analytical Analysis of Shunt APF -- 2.1 Inverter for Proposed SAPF -- 2.2 Mathematical Analysis of SAPF -- 3 Simulation Results and Analysis -- 4 Conclusion -- References -- MACBT Algorithm: A Two-Factor Security Design -- 1 Introduction -- 2 Review of Recent Technology Used to Improve the Security of WSN -- 3 Proposed Methodology -- 4 Result Analysis -- 5 Conclusion -- References -- YOLOv5-Enhanced Ornithopter UAV Simulator for Multi-object Detection -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Motivation -- 1.3 Our Work Contributions -- 1.4 Outline of the Paper -- 2 Literature Survey -- 3 Proposed Methodology. 3.1 Design and Development of Ornithopter UAV. |
Record Nr. | UNINA-9910917197403321 |
Shrivastava Vivek | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|