As Saudi Arabia moves forward with its Vision 2030 initiative to improve the quality of life and services for its people, visual pollution continues to have a negative impact on the environment. However, assessing and...
详细信息
With the advent of the era of big data and 5G communications' massive data, high-speed cryptographic algorithms are in demand. This paper proposes a new fast implementation of the Advanced Encryption Standard (AES...
详细信息
The integration of 6G networks and satellite communications is set to revolutionize global connectivity, offering seamless coverage across terrestrial and non-terrestrial environments. Artificial Intelligence (AI) is ...
详细信息
An IoT-based self-sustained public toilet maintenance system aims to improve hygiene, efficiency, and resource management. It integrates smart sensors, microcontrollers, and cloud connectivity to monitor parameters su...
详细信息
The registration of data assets is a crucial measure for promoting the development of the data element market, contributing to the effective allocation of data resources. However, evaluation efforts face challenges du...
详细信息
Formability is the ability of a given metal work piece to undergo plastic deformation without being damaged. The formability of a material is determined by its fracture strain, which is a general parameter that indica...
详细信息
Subtractive manufacturing systems, specifically, computer numerical control machines, have revolutionized the manufacturing industry. computer numerical control machining is the preferred method for producing finished...
详细信息
Subtractive manufacturing systems, specifically, computer numerical control machines, have revolutionized the manufacturing industry. computer numerical control machining is the preferred method for producing finished parts due to its efficiency, speed and suitability for high-volume production. Securing computer numerical control machines is a priority. Compromises or disruptions of these machines can result in significant downtime, loss of productivity and financial loss. This study examines the vulnerabilities and risks associated with computer numerical control machines, in particular, systems utilizing the LBP16 protocol for controller-machine communications. The study reveals that an adversary can execute cyber-physical attacks such as sabotage and denial of service. The potential security threats emphasize the importance of implementing robust security measures to mitigate the cyber risks to computer numerical control machines.
The advantages using the architectural concept of the Network 2030 technology focus group using the recommendations ITU-T, FG NET-2030 (FG NET-2030) for building highly efficient multiservice wireless packet-switched ...
详细信息
ISBN:
(纸本)9783031734168;9783031734175
The advantages using the architectural concept of the Network 2030 technology focus group using the recommendations ITU-T, FG NET-2030 (FG NET-2030) for building highly efficient multiservice wireless packet-switched cellular networks when providing a wide range multimedia services are analyzed. A review of the results of the Network 2030 study, carried out by the ITU-T FG NET-2030 focus group to study the capabilities and principles of building fixed communication networks for the period up to 2030 and beyond, is reviewed and analyzed. The efficiency indicators wireless cellular networks based on digital technologies have been studied and performance quality criteria have been selected to ensure acceptable quality of service QoS (QoS, Quality of Service) and Quality of Experience (QoE, Quality of Experience) of useful and service traffic. Based on the research, a new approach has been developed to create a method for calculating performance indicators of multi-service wireless cellular networks using end-to-end digital technologies. A general block diagram model of a digital wireless communication system under the influence of various noise sources is proposed to study the reliability of the transmission and reception discrete messages. Based on the proposed calculation method, complex indicators communication quality such as throughput were studied, taking into account the self-similarity property of heterogeneous traffic, the probabilistic-time characteristics of networks, and the energy consumption hardware and software of mobile wireless networks. As a result of the study, analytical expressions were obtained for estimating the parameters of the output modulated communication channel, predicting efficiency in the time and frequency domains, signal-to-noise ratio per bit, as well as energy consumption indicators in mobile wireless communication networks.
The proceedings contain 40 papers. The topics discussed include: GILV: an integrated GNSS/IMU positioning method enhanced by lane line and template matching VO;design of signal acquisition and waveform generation base...
ISBN:
(纸本)9781510689404
The proceedings contain 40 papers. The topics discussed include: GILV: an integrated GNSS/IMU positioning method enhanced by lane line and template matching VO;design of signal acquisition and waveform generation based on CX8242K;pilot gaze intent classification using BiLSTM and gated transformer model;design and application of a high-protection micro outdoor cabinet for edge servers based on diagnostic system algorithms;research progress on algorithms for micromouse maze navigation;research and discussion on CNN and GNN for soil erosion prevention andcontrol;the study of optimizing the RITnet model for pupil recognition using an adaptive threshold method;and hazard identification of college chemical laboratory based on image recognition.
Fully homomorphic encryption (FHE) is a useful cryptographic primitive. It makes a third-party manipulate data in the ciphertext space and therefore is a key technology for privacy-preserving outsourcing services. The...
详细信息
暂无评论