Wireless Sensor Network (WSN) infrastructure has to be balanced for maintaining the Quality of Service (QoS) in the network. However, load balancing technology is complex for meeting the requirements of high flexibili...
详细信息
Voice is the king of communication in wireless cellular network (WCN). Again, WCNs provide two types of calls, i.e., new call (NC) and handoff call (HC). Generally, HCs have higher priority than NCs because call dropp...
详细信息
With the advancement of medical care and technology, human life expectancy is increasing, many advanced countries have aging societies, and the elderly have increasing needs for society to address;these have become so...
详细信息
In the Internet of Things (IoT), optimizing machine performance through data analysis and improved connectivity is pivotal. Addressing the growing need for environmentally friendly IoT solutions, we focus on "gre...
详细信息
Currently, numerous smart products are based on glass substrates. However, defects that occur during the production of glass substrates affect the quality and safety of the final products. Accordingly, we develop...
详细信息
Traditional Internet protocol networks cannot provide the service of selecting a secure path to transmit various types of data with specific security ***,to solve the“secure path transmission”problem,this paper firs...
详细信息
Traditional Internet protocol networks cannot provide the service of selecting a secure path to transmit various types of data with specific security ***,to solve the“secure path transmission”problem,this paper first proposes a search-transmit model for secure network path transmission,i.e.,to find a multi-attribute optimized path that meets the specific security requirements in the search phase,and then transmit the packets along the optimized path in the transmission ***,we propose a solution to the search-transmit *** idea of the solution is to use the particle swarm optimization algorithm to search for a secure path that meets the multi-attribute requirements and then set the source route on the router to control the packet ***,a prototype system based on network function virtualization is developed to evaluate the feasibility and performance of the proposed *** results show that the proposed solution outperforms existing algorithms in terms of performance.
Small-state stream ciphers (SSCs) idea is based on using key bits not only in the initialization but also continuously in the keystream generation phase. A time-memory-data tradeoff (TMDTO) distinguishing attack was s...
详细信息
Small-state stream ciphers (SSCs) idea is based on using key bits not only in the initialization but also continuously in the keystream generation phase. A time-memory-data tradeoff (TMDTO) distinguishing attack was successfully applied against all SSCs in 2017 by Hamann et al. They suggested using not only key bits but also initial value (IV) bits continuously in the keystream generation phase to strengthen SSCs against TMDTO attacks. Then, Hamann and Krause proposed a construction based on using only IV bits continuously in the packet mode. They suggested an instantiation of an SSC and claimed that it is resistant to TMDTO attacks. We point out that accessing IV bits imposes an overhead on cryptosystems that might be unacceptable in some applications. More importantly, we show that the proposed SSC remains vulnerable to TMDTO attacks 1. To resolve this security threat, the current paper proposes constructions based on storing key or IV bits that are the first to provide full security against TMDTO attacks. Five constructions are proposed for different applications by considering efficiency. Designers can obtain each construction’s minimum volatile state length according to the desirable keystream, key and IV lengths.
Detecting oriented targets in remote sensing images amidst complex and heterogeneous backgrounds remains a formidable challenge in the field of object *** frameworks for oriented detection modules are constrained by i...
详细信息
Detecting oriented targets in remote sensing images amidst complex and heterogeneous backgrounds remains a formidable challenge in the field of object *** frameworks for oriented detection modules are constrained by intrinsic limitations,including excessive computational and memory overheads,discrepancies between predefined anchors and ground truth bounding boxes,intricate training processes,and feature alignment *** overcome these challenges,we present ASL-OOD(Angle-based SIOU Loss for Oriented Object Detection),a novel,efficient,and robust one-stage framework tailored for oriented object *** ASL-OOD framework comprises three core components:the Transformer-based Backbone(TB),the Transformer-based Neck(TN),and the Angle-SIOU(Scylla Intersection over Union)based Decoupled Head(ASDH).By leveraging the Swin Transformer,the TB and TN modules offer several key advantages,such as the capacity to model long-range dependencies,preserve high-resolution feature representations,seamlessly integrate multi-scale features,and enhance parameter *** improvements empower the model to accurately detect objects across varying *** ASDH module further enhances detection performance by incorporating angle-aware optimization based on SIOU,ensuring precise angular consistency and bounding box *** approach effectively harmonizes shape loss and distance loss during the optimization process,thereby significantly boosting detection *** evaluations and ablation studies on standard benchmark datasets such as DOTA with an mAP(mean Average Precision)of 80.16 percent,HRSC2016 with an mAP of 91.07 percent,MAR20 with an mAP of 85.45 percent,and UAVDT with an mAP of 39.7 percent demonstrate the clear superiority of ASL-OOD over state-of-the-art oriented object detection *** findings underscore the model’s efficacy as an advanced solution for challenging remote sensing object detection tasks.
Aiming to address significant issues like severe halo effects and excessive noise present in images processed by the traditional dark channel prior-based dehazing algorithm using fixed values, a proposed enhancement m...
详细信息
The construction industry is increasingly using analytics tools to enhance decision-making and streamline project ***,human resource analytics(HRA)adoption has been slow due to concerns about cost and *** studies inve...
详细信息
The construction industry is increasingly using analytics tools to enhance decision-making and streamline project ***,human resource analytics(HRA)adoption has been slow due to concerns about cost and *** studies investigating HRA adoption rely on conceptual models and are in their early *** address this gap,this study takes an empirical approach by examining the antecedents and impacts of HRA adoption on project performance in the Jordanian construction industry.A deductive conceptual framework based on technology-organisation-environment(TOE)and resource-based view(RBV)theories is developed,and 198 individuals are *** structural equation modelling(PLS-SEM),the study identifies eight factors that significantly impact HRA adoption and shows that adoption leads to significant project performance *** study provides valuable insights into HRA adoption in the construction industry,with implications for human resource management,project performance,and the industry as a whole.
暂无评论