Unmanned aerial vehicle (UAV)-assisted mobile communication has been studied in recent years. UAVs can be used as aerial base stations (BSs) to improve the performance of terrestrial mobile network. In this article, m...
详细信息
Face recognition under occlusion presents a persistent challenge in computer vision, primarily due to difficulties in capturing and effectively integrating visible and obscured facial features. This paper introduces a...
详细信息
This paper models both analytically and using finite element analysis (FEA), a prevalent mechanical fault in wound rotor induction motors (WRIMs). Variations in air gap length axially and circumferentially result in i...
详细信息
A Power Management Unit aimed for applications requiring low consumption and area efficiency is introduced in this work. Its main goal is to deliver the desired voltage and current outputs to be used from the other ci...
详细信息
This study aims to analyse, control, and observe the Quarter Car Suspension System Model using Simulink. We begin by simplifying the system to a 1-D multiple spring-damper configuration and constructing its state-spac...
详细信息
Potato crops are vital to global food security, but they are susceptible to several diseases that hinder growth and yield. Traditional methods of detecting these diseases rely on labor-intensive lab tests and human ob...
详细信息
Digital twin technology, leveraging sensor data to replicate physical systems, offers a potent means to validate equipment dynamics and control strategies. This paper presents an advanced Hardware-in-the-Loop setup co...
详细信息
Isolated power converters capable of delivering high-voltage and high-frequency pulses are critical for a range of applications spanning industrial, biomedical, and environmental fields. These applications include but...
详细信息
A novel phase locked loop (PLL) control scheme is introduced for a voltage source converter (VSC) that is connected to the main grid through an LR filter;also, new suitable inner-loop current controllers are implement...
详细信息
The exponential advancement in telecommunication embeds the Internet in every aspect of *** of networks all over the world impose monumental risks on the Internet.A Flooding Attack(FA)is one of the major intimidating ...
详细信息
The exponential advancement in telecommunication embeds the Internet in every aspect of *** of networks all over the world impose monumental risks on the Internet.A Flooding Attack(FA)is one of the major intimidating risks on the Internet where legitimate users are prevented from accessing network *** of the protective measures incorporated in the communication infrastructure,FA still persists due to the lack of global *** of the existing mitigation is set up either at the traffic starting point or at the traffic ending *** mitigation at one or the other end may not be a complete *** insist on better protection againstflooding attacks,this work proposes a cooperative multilevel defense *** proposed cooperative multilevel defense mechanism consists of two-level of *** thefirst level,it is proposed to design a Threshold-based rate-limiting with a Spoofing Resistant Tag(TSRT),as a source end countermeasure for High-Rate Flooding Attacks(HRFA)and spoofing *** the second level,the accent is to discriminate normal traffic after Distributed Denial of Service(DDoS)traffic and drop the DDoS traffic at the destination *** Congruence-based Selective Pushback(FCSP),as a destination-initiated countermeasure for the Low Rate Flooding Attack(LRFA).The source and the destination cooperate to identify and block the attack.A key advantage of this cooperative mechanism is that it can distinguish and channel down the attack traffic nearer to the starting point of the *** presentation of the agreeable cooperative multilevel safeguard mechanism is approved through broad recreation in *** investigation and the exploratory outcomes show that the proposed plan can effectively identify and shield from the attack.
暂无评论