Image steganography is the practice of concealing secret information within a digital image in such a way that the alteration is undetectable to the human eye. It ensures secure communication by embedding data into th...
详细信息
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel...
详细信息
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation.
Chatbots use artificial intelligence (AI) and natural language processing (NLP) algorithms to construct a clever system. By copying human connections in the most helpful way possi-ble, chatbots emulate individuals and...
详细信息
Network virtualization (NV) plays a crucial role in modern network management. One of the fundamental challenges in NV is allocating physical network (PN) resources to the demands of the virtual network requests (VNRs...
详细信息
The soilless method of growing plants, known as hydroponics, has gained attention for its ability to increase crop yields while conserving resources. This paper presents a novel approach integrating Internet of Things...
详细信息
Presently,video surveillance is commonly employed to ensure security in public places such as traffic signals,malls,railway stations,etc.A major chal-lenge in video surveillance is the identification of anomalies that...
详细信息
Presently,video surveillance is commonly employed to ensure security in public places such as traffic signals,malls,railway stations,etc.A major chal-lenge in video surveillance is the identification of anomalies that exist in it such as crimes,thefts,and so ***,the anomaly detection in pedestrian walkways has gained significant attention among the computer vision communities to enhance pedestrian *** recent advances of Deep Learning(DL)models have received considerable attention in different processes such as object detec-tion,image classification,*** this aspect,this article designs a new Panoptic Feature Pyramid Network based Anomaly Detection and Tracking(PFPN-ADT)model for pedestrian *** proposed model majorly aims to the recognition and classification of different anomalies present in the pedestrian walkway like vehicles,skaters,*** proposed model involves panoptic seg-mentation model,called Panoptic Feature Pyramid Network(PFPN)is employed for the object recognition *** object classification,Compact Bat Algo-rithm(CBA)with Stacked Auto Encoder(SAE)is applied for the classification of recognized *** ensuring the enhanced results better anomaly detection performance of the PFPN-ADT technique,a comparison study is made using Uni-versity of California San Diego(UCSD)Anomaly data and other benchmark data-sets(such as Cityscapes,ADE20K,COCO),and the outcomes are compared with the Mask Recurrent Convolutional Neural Network(RCNN)and Faster Convolu-tional Neural Network(CNN)*** simulation outcome demonstrated the enhanced performance of the PFPN-ADT technique over the other methods.
In the optimization of intelligent network architecture, limited resources at each node, including edge computing devices, have posed challenges for deploying large models in performance-demanding scenarios. Knowledge...
详细信息
This paper examines into the transformative impact of technological innovations in the medical field, highlighting how advancements have revolutionized patient care, diagnostics, and overall healthcare management. The...
详细信息
A fruit valued for its great flavor, scent, and nutritional content;the mango (Mangifera indica L.) is one of the most significant tropical fruits in the world economically. However, several illnesses that compromise ...
详细信息
Crops form a key part of the food cycle. But, within this vast and complex agriculture domain, the crops have their predators. Crop diseases may cause revenue losses to farmers and jeopardize food security. These detr...
详细信息
暂无评论