The rapid development of the Internet has brought convenience to the industrial control system, but also brought serious security problems of network attacks. DoS attack is the most common network traffic attack. The ...
详细信息
This paper presents a novel approach to the K-Means clustering algorithm using continuous variable (CV) quantum computing, specifically leveraging Gaussian states on quantum photonic hardware. We implement the algorit...
详细信息
To address the challenge of inaccuracies in human assessment of movement accuracy, the author suggests incorporating artificial intelligence technology into sports training. Leveraging the advancements in computer vis...
详细信息
With the continuous development of UAV technology, UAV has been widely used in many fields, and obtaining accurate position information and using a flight control system with good performance is an important condition...
详细信息
Using Blockchain in conjunction with industry leaders in digital marketing and technology might reimagine how customers interact with businesses. If businesses move quickly to take advantage of this potentially transf...
详细信息
Cloud computing security refers to data protection, while data integrity refers to the reliability of the data. Integrity and security of data are not the same things. Therefore, both of them are very important in the...
详细信息
Cyber-physical systems (CPSs) gift a unique set of protection demanding situations because they rely on a huge and various set of digital additives. To protect CPSs from cyber-attacks, fault-tolerance techniques, incl...
详细信息
Nowadays fire detection and recognition are one of the major securities and security region for saving human life. Concern to this we are going to propose a new model for early detection and recognition of the fire fo...
详细信息
Naval defense systems employ underwater mines as a critical measure to bolster maritime security. While these mines play a pivotal role in safeguarding vital waters, their deployment introduces a dual challenge: ensur...
详细信息
With the rapid development of blockchain, blockchain-based outsourcing computing has been widely used. Outsourcing computing allows users with limited resources to outsource complex computing to those with powerful re...
详细信息
暂无评论