IEEE Transactions on Consumer Electronics最新文献

筛选
英文 中文
Digital Twins and Blockchain Fusion for Security in Metaverse-Driven Consumer Supply Chains 数字孪生和区块链融合促进元宇宙驱动的消费供应链安全
IF 4.3 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2024-10-09 DOI: 10.1109/TCE.2024.3477297
Pushpita Chatterjee;Debashis Das;Danda B. Rawat;Uttam Ghosh;Sourav Banerjee;Mohammed S. Al-Numay
{"title":"Digital Twins and Blockchain Fusion for Security in Metaverse-Driven Consumer Supply Chains","authors":"Pushpita Chatterjee;Debashis Das;Danda B. Rawat;Uttam Ghosh;Sourav Banerjee;Mohammed S. Al-Numay","doi":"10.1109/TCE.2024.3477297","DOIUrl":"https://doi.org/10.1109/TCE.2024.3477297","url":null,"abstract":"In the rapidly growing consumer electronics industry, continuous innovation drives increasing demand for smart devices and advanced gadgets. However, this sector faces changing demands and complex supply chains due to the management of rapid technological advancements and consumer expectations. Seamless communication between suppliers and consumers is essential to optimize production processes, minimize waste, and enhance overall customer satisfaction. In response to these demands, this paper presents a solution that combines Digital Twins (DT) and blockchain to improve security and efficiency in metaverse-inspired consumer-oriented supply chains. Herein, DT is used to represent products in virtual spaces and blockchain secures sensitive information using encryption and access controls. Our objective is to create a transparent, secure, and user-friendly system where consumers and suppliers can interact in real-time to verify product details and access important information of featured tasks like warranties and payment settlement. Smart contracts automates these tasks to make processes faster and more reliable. Through experiments, we tested how well the system maintains product integrity, authenticates transactions, and supports consumer-oriented supply chain (CSC) operations. Comparative analysis shows that our approach improves security, performance, and scalability over existing methods. Furthermore, the proposed system not only enhances security, trust, and transparency in CSC but also sets a higher standard for consumer demands and satisfaction. The findings point to the potential solution for future innovations in metaverse-driven CSC management systems.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"70 3","pages":"5688-5697"},"PeriodicalIF":4.3,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142825839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-Efficient Brushless DC Motor Ceiling Fans for AC and DC Applications for Consumer Market 面向消费者市场的交流和直流应用的节能无刷直流电机吊扇
IF 4.3 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2024-10-09 DOI: 10.1109/TCE.2024.3476472
Amit Kumar;Bhim Singh
{"title":"Energy-Efficient Brushless DC Motor Ceiling Fans for AC and DC Applications for Consumer Market","authors":"Amit Kumar;Bhim Singh","doi":"10.1109/TCE.2024.3476472","DOIUrl":"https://doi.org/10.1109/TCE.2024.3476472","url":null,"abstract":"Brushless direct current motor ceiling fans (BLDCM-CFs) are becoming popular day by day due to their high performance and also compatibility with a 48V DC-grid. However, these CFs are still in developing phase and costly. Conventionally available 48V DC and 230V, 50Hz AC-DC fans are consuming power-input around 30W to 35W. This increases per year energy-cost, and their cost return time, which distracts users. Moreover, AC-DC BLDCM-CF (230V, 50Hz) uses front-end converter to drive, which has power-quality issue (PQI). Furthermore, conventional AC-DC and solar CFs use copper wire in their winding, which increases their cost. To manage these issues with merits of a future DC-home grid, this paper presents a low input-power CF operating with a 48V battery and AC grid. Battery is to be charged from solar or AC-grid. A high power factor converter (HPFC) is used at front-end of solar-CF to manage power-quality issues in AC-grid operated CF. A 48V solar-CF is rewound using aluminium-winding with an appropriate wire-gauge to reduce cost. Test-results and energy-cost comparisons under distinct operating-speeds are made between presented a 48V laboratory wound solar-CF, AC-grid operated CF, and conventionally available BLDCM-CF. The solar-CF, and AC-grid operated CF consume input power of 27.99W and 29.97W with a nearly unity power-factor (0.99963).","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"70 4","pages":"6609-6617"},"PeriodicalIF":4.3,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142918513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Enhancement Based on Histogram-Guided Multiple Transformation Function Estimation 基于直方图引导的多重变换函数估计的图像增强
IF 4.3 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2024-10-08 DOI: 10.1109/TCE.2024.3476033
Jaemin Park;An Gia Vien;Thuy Thi Pham;Hanul Kim;Chul Lee
{"title":"Image Enhancement Based on Histogram-Guided Multiple Transformation Function Estimation","authors":"Jaemin Park;An Gia Vien;Thuy Thi Pham;Hanul Kim;Chul Lee","doi":"10.1109/TCE.2024.3476033","DOIUrl":"https://doi.org/10.1109/TCE.2024.3476033","url":null,"abstract":"Although recent deep learning-based algorithms have achieved significant performance improvements in various image enhancement tasks, most approaches have been developed using image-to-image translation, which is challenging to interpret and analyze the enhancement processes. Several attempts have been made to use the image-to-transformation function approach for better interpretability; however, they often fail to generate complex color mappings, degrading image quality. In this work, we develop a novel transformation function-based algorithm that estimates multiple transformation functions with different properties by exploiting both the spatial and statistical characteristics of the input image to describe complex color mapping. First, we extract the image features that capture spatial information, considering their channel correlations. Next, we estimate multiple transformation functions utilizing a cross-attention block to capture the relevance between spatial and statistical information in the input image and its histogram, respectively. We then estimate the weight maps indicating the pixel-wise contribution of each transformation function by exploiting the spatial correlation between the input and transformed images obtained by each transformation function. Finally, we obtain an enhanced image by taking the weighted sum of the transformed images and the corresponding weight maps. Experimental results demonstrate that the proposed algorithm outperforms state-of-the-art algorithms on various image enhancement tasks.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"70 4","pages":"6664-6678"},"PeriodicalIF":4.3,"publicationDate":"2024-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142918192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICT: Invisible Computable Trigger Backdoor Attacks in Transfer Learning ICT:迁移学习中不可见的可计算触发后门攻击
IF 4.3 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2024-10-08 DOI: 10.1109/TCE.2024.3476313
Xiang Chen;Bo Liu;Shaofeng Zhao;Ming Liu;Hui Xu;Zhanbo Li;Zhigao Zheng
{"title":"ICT: Invisible Computable Trigger Backdoor Attacks in Transfer Learning","authors":"Xiang Chen;Bo Liu;Shaofeng Zhao;Ming Liu;Hui Xu;Zhanbo Li;Zhigao Zheng","doi":"10.1109/TCE.2024.3476313","DOIUrl":"https://doi.org/10.1109/TCE.2024.3476313","url":null,"abstract":"Transfer learning is a commonly used technique in machine learning to reduce the cost of training models. However, it is susceptible to backdoor attacks that cause models to misclassify data with specific triggers while behaving normally on clean data. Existing methods for backdoor attacks in transfer learning either do not consider attack stealthiness or require compromising attack effectiveness for trigger concealment. To overcome this challenge, we introduce the concept of Invisible and Computable Trigger (ICT), which involves two critical steps. First, we propose a new computable trigger obtained by training on input data to greatly increase the attack effect during inference. Second, we embed the trigger into an imperceptible perturbation, allowing poisoned data to appear indistinguishable from clean data. Our experimental results demonstrate that our approach outperforms state-of-the-art methods in both attack effect and stealthiness.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"70 4","pages":"6747-6758"},"PeriodicalIF":4.3,"publicationDate":"2024-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142918113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Congestion Management With Chance-Constrained MPC in Networked Microgrids Under Consumers-Related Uncertainties 消费者相关不确定性下网络微电网机会约束的动态拥塞管理
IF 4.3 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2024-10-08 DOI: 10.1109/TCE.2024.3476200
Pouria Omrani;Hossein Yektamoghadam;Amirhossein Nikoofard;Mohammad Reza Salehizadeh;J. Jay Liu
{"title":"Dynamic Congestion Management With Chance-Constrained MPC in Networked Microgrids Under Consumers-Related Uncertainties","authors":"Pouria Omrani;Hossein Yektamoghadam;Amirhossein Nikoofard;Mohammad Reza Salehizadeh;J. Jay Liu","doi":"10.1109/TCE.2024.3476200","DOIUrl":"https://doi.org/10.1109/TCE.2024.3476200","url":null,"abstract":"Congestion management involves controlling and optimizing energy flow to ensure efficient and reliable operation in energy systems. The objective of this paper is to effectively manage congestion in networked microgrids by balancing energy supply and demand, thereby preventing overloads and ensuring a stable and resilient energy system. One approach to achieve this is through Model Predictive Control (MPC), which can regulate power flow while considering realistic constraints and system dynamics. The results of applying linear MPC for congestion management in networked microgrids are promising when all parameters are deterministic. However, introducing uncertainty into the model poses challenges that linear MPC cannot address. This paper introduces a Chance-Constrained Model Predictive Control (CC-MPC) method to tackle this problem through mathematical reformulation and stochastic optimization. The decision to use CC-MPC over robust MPC or tube MPC was based on the unknown uncertainty of the problem, making stochastic MPC a more suitable option. The results from provided numerical examples demonstrate that the proposed method not only accurately predicts demand response but also effectively manages congestion in both small-scale and large-scale networked microgrids, even while accounting for the effects of uncertainty.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"70 4","pages":"6738-6746"},"PeriodicalIF":4.3,"publicationDate":"2024-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142918440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Similarity Matching, Classification, and Recognition Mechanism for Transaction Analysis in Blockchain Environment b区块链环境下事务分析的相似性匹配、分类与识别机制
IF 4.3 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2024-10-08 DOI: 10.1109/TCE.2024.3473691
Yao Lu;Haiwen Wang
{"title":"Similarity Matching, Classification, and Recognition Mechanism for Transaction Analysis in Blockchain Environment","authors":"Yao Lu;Haiwen Wang","doi":"10.1109/TCE.2024.3473691","DOIUrl":"https://doi.org/10.1109/TCE.2024.3473691","url":null,"abstract":"The electronic era is providing many opportunities to the consumers by exploiting advanced technologies such as Blockchain, AI driven solutions, Internet of Everything (IoE), optical technologies and 6G networks. Blockchain users need to analyze and examine the diverse transactions recorded on the ledger. In Blockchain technology, transparency and decentralization are the key features for the users and transaction analysis plays integral role in ensuring the privacy of data, security of user credentials, and efficiency of the Blockchain network. By analyzing the features of data, patterns of data, and behaviors of transactions, the Blockchain users can determine the flow of digital assets and also examine the pulse of the Blockchain ecosystem. The smart contacts in blockchain are also seeking for the transaction analysis as it is very important for implementation of the smart contracts to follow transparency attributes and transaction conditions along with patterns in transactions. This research is using two-fold methodology. In first module, a double-layer model (DLM) is designed. The DLM is constructed through the target detection layer and target segmentation layer. The experimental outcome shows that the proposed algorithm has high classification accuracy of 94%. In second module, a Cosine similarity is used to find distance in the data-points and then the XGBoost classifier classifies the transaction data more easily by attainting the classification accuracy of 98% with lower time complexity.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"70 4","pages":"7018-7027"},"PeriodicalIF":4.3,"publicationDate":"2024-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A BCI System for Imagined Speech Classification Based on Optimization Theory 基于优化理论的想象语音分类BCI系统
IF 4.3 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2024-10-07 DOI: 10.1109/TCE.2024.3475821
Xiao-Ben Zheng;Bingo Wing-Kuen Ling
{"title":"A BCI System for Imagined Speech Classification Based on Optimization Theory","authors":"Xiao-Ben Zheng;Bingo Wing-Kuen Ling","doi":"10.1109/TCE.2024.3475821","DOIUrl":"https://doi.org/10.1109/TCE.2024.3475821","url":null,"abstract":"Electroencephalograms (EEGs) are used for establishing a connection between the human brain and the outside environment, so they are widely used in the brain computer interface (BCI). Nowadays, the imagined speech (IS) is a highly promising paradigm of the BCI. It can be used for controlling the external devices directly. However, the features for performing the IS are unknown. Hence, the numerous features are extracted. As a result, the dimension of the feature vectors is extremely large. To reduce the required computation, the clustering is required to be performed in the low dimensional space. Under this circumstance, the transform matrix affects both the dimensional reduction part and the clustering part. In fact, finding the transform matrix and the clustering centers under this scenario is challenging. To tackle this difficulty, this paper provides a modified joint principal component analysis (PCA) and k means algorithm for performing the IS. Here, the interclass separation among the feature vectors is also taken into an account of the problem formulation. In particular, the problem is formulated as a nonconvex constrained optimization problem. The total two norm reconstruction error of the feature vectors as well as the total two norm differences between the feature vectors and the clustering centers in the low dimensional space and the total two norm differences among the clustering centers are minimized subject to the orthogonality of the transform matrix. The numerical computer simulations are conducted based on the multi-class IS classification database. The obtained results show that our proposed method outperforms the various states of the art methods in terms of the clustering accuracy and the average required execution time. Overall, using the BCI system for performing the imagined speech classification plays an important role in the consumer electronics area.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"70 4","pages":"6679-6690"},"PeriodicalIF":4.3,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142918258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two Robust Perceptual Image Hashing Schemes Based on Discrete Wavelet Transform 基于离散小波变换的两种鲁棒感知图像哈希算法
IF 4.3 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2024-10-07 DOI: 10.1109/TCE.2024.3474744
Chunqiang Hu;Feihong Yang;Xiaoshuang Xing;Hang Liu;Tao Xiang;Hui Xia
{"title":"Two Robust Perceptual Image Hashing Schemes Based on Discrete Wavelet Transform","authors":"Chunqiang Hu;Feihong Yang;Xiaoshuang Xing;Hang Liu;Tao Xiang;Hui Xia","doi":"10.1109/TCE.2024.3474744","DOIUrl":"https://doi.org/10.1109/TCE.2024.3474744","url":null,"abstract":"Robustness, discrimination and security are essential characteristics of perceptual image hashing in cloud computing. In this paper, we propose two image hashing schemes based on block discrete wavelet transform (BDWT) to achieve these three characteristics. The basic scheme combines block discrete wavelet transform, singular value decomposition and statistics feature to extract the features of each overlapping image block. And chaotic cryptography is applied to encrypt these features. Furthermore, image correction is added to the basic scheme to realize a more comprehensive image hashing IC-BDWT, which can resist rotation attack. Meanwhile, we conduct experiments on 400 images from four public databases to analyze the proposed schemes. The receiver operating characteristic (ROC) curve of the experimental results demonstrates that the proposed hashing algorithms exhibit superior robustness and discrimination compared to the latest hashing algorithms under common content-preserving attacks. And the IC-BDWT hashing is far better than other algorithms in resisting rotation attack. Experimental results show that our schemes are secure and sensitive to secret keys.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"70 4","pages":"6533-6546"},"PeriodicalIF":4.3,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142918512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Fusion Pruning-Processed Lightweight CNN for Local Object Recognition on Resource-Constrained Devices 一种基于融合剪枝处理的轻量级CNN在资源受限设备上的局部目标识别
IF 4.3 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2024-10-07 DOI: 10.1109/TCE.2024.3475517
Can Xie;Xiaobing Zhai;Haiyang Chi;Wenxiang Li;Xiaolin Li;Yuyang Sha;Kefeng Li
{"title":"A Novel Fusion Pruning-Processed Lightweight CNN for Local Object Recognition on Resource-Constrained Devices","authors":"Can Xie;Xiaobing Zhai;Haiyang Chi;Wenxiang Li;Xiaolin Li;Yuyang Sha;Kefeng Li","doi":"10.1109/TCE.2024.3475517","DOIUrl":"https://doi.org/10.1109/TCE.2024.3475517","url":null,"abstract":"In recent years, smartphones and smart educational products have become important catalysts for the development of consumer electronics. However, deploying large convolutional neural networks (CNNs) models on resource-constrained devices like smartphones is impractical due to the lack of high-performance central processing units (CPUs), graphics processing units (GPUs), and large-capacity memory. To address these challenges, we propose a new Fusion Pruning (FP) method aimed at compressing and accelerating large CNN models by leveraging L2 norm and equivalent transformation of the receptive field. To validate the feasibility of the proposed method in language education, we have developed an application deployed on smartphones. This application enables offline object recognition without the need for additional hardware platforms like Jetson Xavier NX. Additionally, we have also explored the performance of the FP method in the field of household robotics, obtaining satisfactory results. Experimental results demonstrate that the proposed method can accomplish tasks on resource-constrained devices.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"70 4","pages":"6713-6724"},"PeriodicalIF":4.3,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142918460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
6GTelMED: Resources Recommendation Framework on 6G-Enabled Distributed Telemedicine Using Edge-AI 6GTelMED:基于边缘人工智能的6g分布式远程医疗资源推荐框架
IF 4.3 2区 计算机科学
IEEE Transactions on Consumer Electronics Pub Date : 2024-10-07 DOI: 10.1109/TCE.2024.3473291
Syed Thouheed Ahmed;Kiran Kumari Patil;Sreedhar Kumar S.;Rajesh Kumar Dhanaraj;Surbhi Bhatia Khan;Saeed Alzahrani;Shalli Rani
{"title":"6GTelMED: Resources Recommendation Framework on 6G-Enabled Distributed Telemedicine Using Edge-AI","authors":"Syed Thouheed Ahmed;Kiran Kumari Patil;Sreedhar Kumar S.;Rajesh Kumar Dhanaraj;Surbhi Bhatia Khan;Saeed Alzahrani;Shalli Rani","doi":"10.1109/TCE.2024.3473291","DOIUrl":"https://doi.org/10.1109/TCE.2024.3473291","url":null,"abstract":"Telemedicine infrastructure is enhanced in recent times and applications developed have adopted base-line networking standards according to 4G/5G and LTE. The major challenge in exiting infrastructural setups is higher-latency and exposed privacy of resources and sensitive information. In this manuscript, we have proposed a 6G enabled resource recommendation framework for telemedicine. The framework is developed on the Edge-AI computational principles to cater the needs and demands of medical devices associated in telemedicine. The approach is to customize the network via Distributed Telemedicine Network (DTN) protocol for edge-devices such IoT/IoMT and medical consumers’ calibration on an existing TelMED protocol of dynamic resource allocation. The DTN aims to generate a resource recommendation stack for incoming user demand via 6G spectrum. The edge-AI framework supports resources allocation with minimal latency and delay and improved privacy of data under the operations. The framework further interfaces the Industry 5.0 applications and consumer demands for effective resources allocation, scheduling and monitoring.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"70 3","pages":"5524-5532"},"PeriodicalIF":4.3,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142844292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信