Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Shruti Mandaokar"'
Publikováno v:
Data, Vol 7, Iss 8, p 112 (2022)
The detection of gas leakages is a crucial aspect to be considered in the chemical industries, coal mines, home applications, etc. Early detection and identification of the type of gas is required to avoid damage to human lives and the environment. T
Externí odkaz:
https://doaj.org/article/306814348310404ba9c72935b137d916
Publikováno v:
Soft Computing. 27:4139-4155
Autor:
Parag Narkhede, Rahee Walambe, Shruti Mandaokar, Pulkit Chandel, Ketan Kotecha, George Ghinea
Publikováno v:
Applied System Innovation, Vol 4, Iss 1, p 3 (2021)
With the rapid industrialization and technological advancements, innovative engineering technologies which are cost effective, faster and easier to implement are essential. One such area of concern is the rising number of accidents happening due to g
Externí odkaz:
https://doaj.org/article/f0f6d82854364ea8b7a34528382aefe7
Autor:
Ketan Kotecha, Shruti Mandaokar, Pulkit Chandel, Rahee Walambe, George Ghinea, Parag Narkhede
Publikováno v:
Applied System Innovation; Volume 4; Issue 1; Pages: 3
Applied System Innovation, Vol 4, Iss 3, p 3 (2021)
Applied System Innovation, Vol 4, Iss 3, p 3 (2021)
With the rapid industrialization and technological advancements, innovative engineering technologies which are cost effective, faster and easier to implement are essential. One such area of concern is the rising number of accidents happening due to g
Employing multimodal co-learning to evaluate the robustness of sensor fusion for industry 5.0 tasks.
Autor:
Rahate, Anil, Mandaokar, Shruti, Chandel, Pulkit, Walambe, Rahee, Ramanna, Sheela, Kotecha, Ketan
Publikováno v:
Soft Computing - A Fusion of Foundations, Methodologies & Applications; Apr2023, Vol. 27 Issue 7, p4139-4155, 17p
Publikováno v:
Data (2306-5729); Aug2022, Vol. 7 Issue 8, p112, 8p
The book addresses the challenges in designing blockchain-based secured solutions for Industry 4.0 applications using artificial intelligence. It further provides a comparative analysis of various advanced security approaches such as edge computing,