Z Xiao, H Li, H Jiang, Y Li, M Alazab… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Urban region heat refers to the extent of which people congregate in various regions when they travel to and stay in a specified place. Predicting urban region heat facilitates broad …
W Chen, X Wu, Z Xiao - Sustainability, 2023 - mdpi.com
The realization of the “double carbon” goals and the development of green transportation require a focused approach to reducing carbon emissions from private cars. Starting from …
Abstract Supply Chain Management Systems (SCM) is the critical infrastructure that can be treated as a significant factor since it forms advancement in intelligent devices. The cyber …
X Wang, P Wang, B Wang, Y Zhang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Traffic prediction facilitates various applications in the fields of smart vehicles and vehicular communications, and the key of successfully and accurately forecasting urban traffic state is …
J Han, K Shu, Z Wang - PeerJ Computer Science, 2023 - peerj.com
Annual increases in global energy consumption are an unavoidable consequence of a growing global economy and population. Among different sectors, the construction industry …
Symmetry is essential in the design of complex systems like the Metaverse Transportation Sys-tem (MTS) and helps ensure that all components work together effectively. In the …
The objective of this work is to carry out a thorough investigation on the optimization of the vehicle suspension system based on vibration and noise management. First, a transfer path …
Y Gu, N Jiang, Y Chen, X Gong - … Conference on Edge Computing and IoT, 2022 - Springer
Abstract Recently, the Internet of Things (IoT) technology has made tremendous progress, and it is beginning to enter many areas of social life, such as autonomous driving, medical …
K Wang, Y Chen, W Xu - … Conference on Edge Computing and IoT, 2022 - Springer
As deep learning-based computer vision is widely used in IoT devices, it is especially critical to ensure its security. Among the attacks against deep neural networks, adversarial attacks …