Zobrazeno 1 - 10
of 470
pro vyhledávání: '"Mohammad Mehedi Hassan"'
Publikováno v:
Alexandria Engineering Journal, Vol 105, Iss , Pp 724-735 (2024)
In the Vehicle-to-Grid (V2G) scenario, a multitude of coordinated electric vehicles (EVs) equipped with high-capacity batteries actively participate in power grid dispatching as energy carriers, aiming to achieve a tripartite objective encompassing p
Externí odkaz:
https://doaj.org/article/021b79e180634b849dd1136b32b4361d
Publikováno v:
Alexandria Engineering Journal, Vol 108, Iss , Pp 436-444 (2024)
In recent years, the proliferation of IoT technologies and the widespread adoption of wireless sensors across various critical infrastructures such as power plants, service monitoring systems, space and earth exploration missions, and water treatment
Externí odkaz:
https://doaj.org/article/e210902e3c384e91a1fcd8c59dbacd0b
Autor:
Neeraj Joshi, Ishan Budhiraja, Abhay Bansal, Sahil Garg, Bong Jun Choi, Mohammad Mehedi Hassan
Publikováno v:
Alexandria Engineering Journal, Vol 107, Iss , Pp 103-116 (2024)
Devices that are employed in applications related to the Internet of Things (IoT) are constrained by limited energy resources. Consequently, ensuring a continuous supply of energy while also maintaining uninterrupted connectivity within IoT units (Io
Externí odkaz:
https://doaj.org/article/6e2471329d1149d4824168d6c963ccee
Publikováno v:
AI, Vol 5, Iss 2, Pp 602-617 (2024)
In football or soccer, a referee controls the game based on the set rules. The decisions made by the referee are final and can’t be appealed. Some of the decisions, especially after a handball event, whether to award a penalty kick or a yellow/red
Externí odkaz:
https://doaj.org/article/03cd38882d744b599c3a1fed782668d8
Autor:
Asma Ul Hussna, Md Golam Rabiul Alam, Risul Islam, Bader Fahad Alkhamees, Mohammad Mehedi Hassan, Md Zia Uddin
Publikováno v:
Heliyon, Vol 10, Iss 18, Pp e37760- (2024)
The alarming growth of misinformation on social media has become a global concern as it influences public opinions and compromises social, political, and public health development. The proliferation of deceptive information has resulted in widespread
Externí odkaz:
https://doaj.org/article/aa91121df8954a3e9242d0cef29e0059
Autor:
Senthil Kumar Jagatheesaperumal, Zhaohui Yang, Md. Rafiul Hassan, Mohammad Mehedi Hassan, Giancarlo Fortino
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-9 (2024)
Abstract The rapid advancement of modern communication technologies necessitates the development of generalized multi-access frameworks and the continuous implementation of rate splitting, augmented with semantic awareness. This trend, coupled with t
Externí odkaz:
https://doaj.org/article/4f585dad95bb4dca904b7b92383a5d78
Autor:
Dharminder Chaudhary, P. Santhi, M. S. P. Durgarao, A. Padmavathi, Mohammad Mehedi Hassan, Bader Fahad Alkhamees
Publikováno v:
IEEE Access, Vol 12, Pp 105219-105233 (2024)
Truck platooning uses networking technology and automated driving support systems to join multiple trucks in a group. When these vehicles interact for particular journey stages, such as on highways, they autonomously maintain a predefined, tight spac
Externí odkaz:
https://doaj.org/article/0446f23e959d429f96d0232ddcc00cc2
Autor:
Riyo Hayat Khan, Dibyo Fabian Dofadar, Md Golam Rabiul Alam, Mohammad Siraj, Md Rafiul Hassan, Mohammad Mehedi Hassan
Publikováno v:
IEEE Access, Vol 12, Pp 96462-96480 (2024)
In the realm of digital commerce, online shopping has witnessed unprecedented growth globally, becoming a cornerstone of modern consumer behavior. This research introduces an advanced customer segmentation model, named LRFS, which builds upon the tra
Externí odkaz:
https://doaj.org/article/f157243216024d70b0e52795334f0c3a
Autor:
Dharminder Chaudhary, Pradeep Kumar Dadsena, A. Padmavathi, Mohammad Mehedi Hassan, Bader Fahad Alkhamees, Uddeshaya Kumar
Publikováno v:
IEEE Access, Vol 12, Pp 74572-74585 (2024)
Once the shared secret key is established, three parties can use it for secure communication using symmetric-key encryption AES (128, 192, 256) algorithms or other cryptographic primitives. Although there are few third-party post-quantum authenticati
Externí odkaz:
https://doaj.org/article/ac4131b932ac4066a698e7934249452b
Autor:
Safiqul Islam, Mahadi Ahammed, Nura Alam Siddique, Palash Roy, Md. Abdur Razzaque, Mohammad Mehedi Hassan, Kashif Saleem
Publikováno v:
IEEE Access, Vol 12, Pp 72746-72765 (2024)
The $5^{th}$ Generation (5G) Mobile Edge Computing (MEC) addresses the problem of high end-to-end delay experienced by traditional cloud computing users by ensuring fast accessible and reliable computing resources. However, the deployment of service
Externí odkaz:
https://doaj.org/article/aef1da23ae864d729fd859d61188de3d