We propose a modification to the transpiler of a quantum computer to safeguard against side-channel attacks aimed at learning information about a quantum circuit. We demonstrate that if it is feasible to shield a spec...
详细信息
Vectorial optics with fine inhomogeneous polarization control are highly *** have been captivated a promising candidate,but their static post-fabrication geometry largely limits the dynamic *** crystal(LC)is usually e...
详细信息
Vectorial optics with fine inhomogeneous polarization control are highly *** have been captivated a promising candidate,but their static post-fabrication geometry largely limits the dynamic *** crystal(LC)is usually employed as an additional index-changing layer together with ***,most of the reported LCs only impart a varying but uniform phase on top of that from the metasurface,which we term“scalar”LC ***,we pixelate a single-layer LC to display versatile and tunable vectorial holography,in which the polarization and amplitude could be arbitrarily and independently controlled at varying spatial ***,the subtle and vectorial LC-holography highlights the broadband and electrically-switchable *** vectorial LC holography reveals significant opportunities for advanced cryptography,super-resolution imaging,and many other applications.
Internet of Medical Things (IoMT) has revolutionized the way medical infrastructure has been managed in the past. Multiple platforms in IoMT have disparate communication standards, data format requirements, and access...
详细信息
The introduction of Edge computing has pushed the horizon to the edge of the network and the user’s proximity. The openness of data on the edge raised many issues about the security of data. Although edge computing i...
The introduction of Edge computing has pushed the horizon to the edge of the network and the user’s proximity. The openness of data on the edge raised many issues about the security of data. Although edge computing is an extension of the cloud, besides this, its solutions to handle security threats are different from cloud computing because of its architectural dissimilarities. There is a need for a comprehensive mechanism to ensure the choice of secure service. For this purpose, the combination of trust would be a better approach to deal with the service selection tasks in edge computing. In this paper, a trust-aware cloudlet federation model has been proposed which ultimately helps in the safe service selection of an edge node. Before using a service ‘A’ of any edge node, the trust value of the edge node for service ‘A’ should be calculated, called Service Trust Value (STV). Then the edge nodes with a higher STV for service ‘A’ are filtered. Lastly, the model will select the edge node with a satisfactory value of trust for service ‘A’. This proposed model will be beneficial in secure service selection.
Ensuring safety in smart buildings is crucial due to the increasing prevalence of smoke and fire hazards in modern environments. This paper introduces a novel privacy-preserving FL approach based on a CNN1D for smoke ...
详细信息
This paper investigates the technology for selecting communication scheme based on the amount of traffic in LTE-M (Marine) and 5G communication environments. Recently, it has been possible to use LTE-M and 5G communic...
详细信息
ISBN:
(纸本)9788995004395
This paper investigates the technology for selecting communication scheme based on the amount of traffic in LTE-M (Marine) and 5G communication environments. Recently, it has been possible to use LTE-M and 5G communications for preventing collisions between ships and obstacles in coastal areas, moving from a focus on terrestrial users. This paper proposes a scheme for efficiently handling both small-scale and large-volume traffic generated from terminals on ships. LTE-M can accommodate more terminals by utilizing the wide coverage of coastal areas, but it can be vulnerable to high-volume video processing for real-time obstacle detection. 5G provides a high data transmission rate and low latency, making it suitable for large data exchanges between ships or real-time services, but its short coverage makes it unsuitable for accommodating a wide area. Therefore, this paper proposes a scheme for dynamically selecting LTE-M or 5G communication schemes according to the amount of data generated by terminals on ships, to transmit data. In this paper, we propose an algorithm to decide which communication scheme, LTE-M or 5G, should be chosen based on the amount and type of traffic. The algorithm dynamically selects the optimal communication scheme considering real-time traffic information and network status. By implementing a simulation environment for coastal areas using the technique proposed in this paper, we compare the scheme where terminals installed on ships selectively use LTE-M and 5G communication schemes with the scheme where two communication schemes are chosen randomly for transmission. The simulation results confirm that the proposed technique can process more data compared to the existing schemes. Copyright 2023 KICS.
Face Masks have become part of our day-to-day activities. But these create a problem with the existing face recognition techniques. Existing face recognition techniques vary from simple ML techniques such as SVM, PCA,...
详细信息
Chain-of-Thought (CoT) prompting has enhanced the performance of Large Language Models (LLMs) across various reasoning tasks. However, CoT still falls short in dealing with complex math word problems, as it usually su...
详细信息
With the swift advancement of automotive technology, the need for efficient allocation of resources in V2V (vehicle-to-vehicle) communications has grown significantly. However, the dynamic nature of channels in vehicu...
详细信息
Obesity is a condition where there is excess fat in the body, and it is one of the world's most extreme and dangerous dietary diseases. Genetic factors, lack of physical activity, unhealthy eating patterns, or a c...
详细信息
暂无评论