Securing internet of things using machine and deep learning methods: a survey

A Ghaffari, N Jelodari, S pouralish, N derakhshanfard… - Cluster …, 2024 - Springer
Abstract The Internet of Things (IoT) is a vast network of devices with sensors or actuators
connected through wired or wireless networks. It has a transformative effect on integrating …

A Human–Machine Interaction Mechanism: Additive Manufacturing for Industry 5.0—Design and Management

S Rani, D Jining, K Shoukat, MU Shoukat, SA Nawaz - Sustainability, 2024 - mdpi.com
Industry 5.0 is an emerging value-driven manufacturing model in which human–machine
interface-oriented intelligent manufacturing is one of the core concepts. Based on the …

A customised ConvNeXt-SCC network: Integrating improved principal component analysis with ConvNeXt to enhance tire crown defect detection

Y Zhou, J Zhang, P Ni, Q Cao, J Hu - Nondestructive Testing and …, 2024 - Taylor & Francis
Defects such as bubbles and rubber shortages occasionally occur during vehicle tire
production. Tiny defects in the crown gradually expand under load, ultimately causing tire …

Prediction of the minimum miscibility pressure for CO2 flooding based on a physical information neural network algorithm

B Qin, X Cai, P Ni, Y Zhang, M Zhang… - Measurement Science …, 2024 - iopscience.iop.org
The minimum miscibility pressure (MMP) is a crucial parameter in assessing the miscibility of
CO 2 displacement and evaluating the effectiveness of oil displacement. Traditional …

Model predictive manipulation of compliant objects with multi-objective optimizer and adversarial network for occlusion compensation

J Qi, P Zhou, G Ran, H Gao, P Wang, D Li, Y Gao… - ISA transactions, 2024 - Elsevier
Background: The manipulation of compliant objects by robotic systems remains a
challenging task, largely due to their variable shapes and the complex, high-dimensional …

An efficient algorithm for data transmission certainty in IIoT sensing network: A priority-based approach

KG Nalbant, S Almutairi, AH Alshehri, H Kemal… - PloS one, 2024 - journals.plos.org
This paper proposes a novel cache replacement technique based on the notion of
combining periodic popularity prediction with size caching. The popularity, size, and time …

A two-way trust routing scheme to improve security in fog computing environment

J Wang, Z Luo, C Wang - Cluster Computing, 2024 - Springer
Compliance with security requirements in the fog computing environment is known as an
important phenomenon in maintaining the quality of service due to the dynamic topology …

Bimanual deformable bag manipulation using a structure-of-interest based latent dynamics model

P Zhou, P Zheng, J Qi, C Li, C Yang… - arXiv preprint arXiv …, 2024 - arxiv.org
The manipulation of deformable objects by robotic systems presents a significant challenge
due to their complex and infinite-dimensional configuration spaces. This paper introduces a …

Dual-arm shaping of soft objects in 3D based on visual servoing and online FEM simulations

C Saghour, D Navarro-Alarcón… - … Journal of Robotics …, 2024 - journals.sagepub.com
In this work, we propose a vision-based and finite element method (FEM)-based controller to
automate the 3D shaping of soft objects with dual-arm robots. Our controller relies on a data …

Analysis and Prediction of Risky Driving Behaviors Using Fuzzy Analytical Hierarchy Process and Machine Learning Techniques

W Alam, H Wang, A Pervez, M Safdar, A Jamal… - Sustainability, 2024 - mdpi.com
Driver behavior plays a pivotal role in ensuring road safety as it is a significant factor in
preventing traffic crashes. Although extensive research has been conducted on this topic in …