Deep learning and Artificial intelligence (AI) have been trending these days due to the capability and state-of-the-art results that they provide. They have replaced some highly skilled professionals with neural network-powered AI, also known as deep learning algorithms. Deep learning majorly works on neural networks. This chapter discusses about the working of a neuron, which is a unit component of neural network. There are numerous techniques that can be incorporated while designing a neural network, such as activation functions, training, etc. to improve its features, which will be explained in detail. It has some challenges such as overfitting, which are difficult to neglect but can be overcome using proper techniques and steps that have been discussed. The chapter will help the academician, researchers, and practitioners to further investigate the associated area of deep learning and its applications in the autonomous vehicle industry.
Wireless power transfer (WPT) is a power transfer technique widely used in many industrial applications, medical applications, and electric vehicles (EVs). This paper deals with the dynamic modeling of the resonant inverter employed in the WPT systems for EVs. To this end, the Generalized State-Space Averaging and the Laplace Phasor Transform techniques have been the flagship methods employed so far. In this paper, the modeling of the resonant inverter is accomplished by using the novel Modulated Variable Laplace Transform (MVLT) method. Firstly, the MVLT technique is discussed in detail, and then it is applied to model a study-case resonant inverter. Finally, a study-case resonant inverter is developed and utilized to validate the theoretical results with MATLAB/Simulink.
The Cloud of Things (CoT) is the multi-domain, emerging, and dynamic technology in today's era. Cloud of Things can perform security services and virtualization with different sensor devices for a powerful and scalable high-performance computing. The author emphasizes the evaluation of various applications used in Cloud of Things. The chapter has been this chapter is divided into two parts which cover the significance of the Cloud and Internet of Things. The chapter focuses on introduction of the Cloud, IoT, and CoT and shows the security and challenges occurring in CoT. It also covers the security issues in IoT with different applications. The chapter will help the academician, researchers, and industry professional to further investigate the associated area of Cloud IoT, and it also helps them find solutions from different perspectives.
Two different arrangements for Wireless Battery Charging Systems (WBCSs) with a series-parallel resonant topology have been analyzed in this paper. The first arrangement charges the battery by controlling the receiver-side rectifier current and voltage without a chopper, while the second arrangement charges it with a chopper while keeping the chopper input voltage constant. The comparison of these two arrangements is made based on their performance on various figures of merit, such as the sizing factor of both the supply voltage source and receiver coil, overall system efficiency, power-transfer ratio, receiver efficiency, and cost estimation. Later, the simulated study is verified by the experimental setup designed to charge the electric vehicle.
Mobile devices have upgraded from normal java-based phones whose basic functionality was calling, messaging, and storing contact information to a more adaptive operating system like Symbian, iOS, and Android, which have smart features like e-mail, audio player, camera, etc. Gradually, everyone started relying more and more on these mobile devices. This led to an increase in the number of cell phone hackers. Common ways that a hacker gets access to your phone is via phishing, shoulder surfing, piggybacking, etc. There are countermeasures to this like bookmarking your most visited sites, using VPN, using encryption algorithms. Data theft and identity theft are a new concern for today's user; this chapter is to educate the end user of different ways in which their privacy can be invaded via a mobile phone. This chapter will help the researchers to know the mindset of a cell phone hacker and what are the potential damages that can be caused by them and strategies to prevent them.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.