In today's modern world, efficient programming is a necessity. To speed up code generation nowadays, programming code is generated using different graphical tools. Although efficient, this technology is scarcely u...
详细信息
Inductive wireless power transfer (WPT) system uses alternating magnetic field to transmit power from the transmitter to the receiver. To confine the magnetic field, WPT coils are realized with high permeability subst...
详细信息
This paper investigates the resource sharing problem in a multi-unmanned aerial vehicle (UAV) wireless network by utilizing the multi-agent reinforcement learning (MARL) method. Specifically, the considered multi-UAV ...
详细信息
Sleep quality prediction in Internet of Things (IoT) involves leveraging a system of interrelated devices to gather as well as analyse related data. Smart devices like wearable devices or smart mattresses endlessly mo...
详细信息
Skin tones come in a diverse range of shades and are often necessary for various computer vision tasks. While skin detection is a well-studied focus, skin tone classification is not. Most works also use the Fitzpatric...
详细信息
Creating pixel-level ground-truth (GT) masks is quite costly for deep learning-based image segmentation. Specialists in areas such as anomaly detection and medical diagnostics face difficulties in producing many GT ma...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security desig...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security ***,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of *** decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing *** this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their ***,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security ***,we discuss the challenges posed by BGP security problems and outline prospects for future research.
Digital image quality is essential for a variety of applications in visual information processing, including medical diagnostics, defence, and many other applications. However, there are several challenges that must b...
详细信息
Random packed beds are often employed in chemical reactors as a means to increase the contact surface between reactants or a catalyst. The present work proposes a helical flow deflector placed within the bed and numer...
详细信息
This paper deals with the simulation calculation of transmission (S21) and reflection (S22) parameters in a material parametrically based on clay (brick). The electromagnetic parameters of the clay that are the subjec...
详细信息
暂无评论