Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel...
详细信息
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation.
Network virtualization (NV) plays a crucial role in modern network management. One of the fundamental challenges in NV is allocating physical network (PN) resources to the demands of the virtual network requests (VNRs...
详细信息
Image steganography is the practice of concealing secret information within a digital image in such a way that the alteration is undetectable to the human eye. It ensures secure communication by embedding data into th...
详细信息
Presently,video surveillance is commonly employed to ensure security in public places such as traffic signals,malls,railway stations,etc.A major chal-lenge in video surveillance is the identification of anomalies that...
详细信息
Presently,video surveillance is commonly employed to ensure security in public places such as traffic signals,malls,railway stations,etc.A major chal-lenge in video surveillance is the identification of anomalies that exist in it such as crimes,thefts,and so ***,the anomaly detection in pedestrian walkways has gained significant attention among the computer vision communities to enhance pedestrian *** recent advances of Deep Learning(DL)models have received considerable attention in different processes such as object detec-tion,image classification,*** this aspect,this article designs a new Panoptic Feature Pyramid Network based Anomaly Detection and Tracking(PFPN-ADT)model for pedestrian *** proposed model majorly aims to the recognition and classification of different anomalies present in the pedestrian walkway like vehicles,skaters,*** proposed model involves panoptic seg-mentation model,called Panoptic Feature Pyramid Network(PFPN)is employed for the object recognition *** object classification,Compact Bat Algo-rithm(CBA)with Stacked Auto Encoder(SAE)is applied for the classification of recognized *** ensuring the enhanced results better anomaly detection performance of the PFPN-ADT technique,a comparison study is made using Uni-versity of California San Diego(UCSD)Anomaly data and other benchmark data-sets(such as Cityscapes,ADE20K,COCO),and the outcomes are compared with the Mask Recurrent Convolutional Neural Network(RCNN)and Faster Convolu-tional Neural Network(CNN)*** simulation outcome demonstrated the enhanced performance of the PFPN-ADT technique over the other methods.
The complexity and diversity of polymer topologies,or chain architectures,present substantial challenges in predicting and engineering polymer *** machine learning is increasingly used in polymer science,applications ...
详细信息
The complexity and diversity of polymer topologies,or chain architectures,present substantial challenges in predicting and engineering polymer *** machine learning is increasingly used in polymer science,applications to address architecturally complex polymers are ***,we use a generative machine learning model based on variational autoencoders and data generated from molecular dynamics simulations to design polymer topologies that exhibit target properties.
A fruit valued for its great flavor, scent, and nutritional content;the mango (Mangifera indica L.) is one of the most significant tropical fruits in the world economically. However, several illnesses that compromise ...
详细信息
More than 150 cellular networks worldwide have rolled out LTE-M (LTE-Machine Type Communication) and/or NB-IoT (Narrow Band Internet of Things) technologies to support massive IoT services such as smart metering and e...
详细信息
Recently, there has been interest in classifying emotions using audio inputs and machine learning methods. Because a single statement might be delivered in a variety of emotional circumstances, textual data alone is i...
详细信息
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t...
详细信息
The 3D Underwater Sensor Network(USNs)has become the most optimistic medium for tracking and monitoring underwater *** and collision are two most critical factors in USNs for both sparse and dense *** to harsh ocean e...
详细信息
The 3D Underwater Sensor Network(USNs)has become the most optimistic medium for tracking and monitoring underwater *** and collision are two most critical factors in USNs for both sparse and dense *** to harsh ocean environment,it is a challenge to design a reliable energy efficient with collision free *** in link qualities may cause collision and frequent communication lead to energy loss;that effects the network *** overcome these challenges a novel protocol Forwarder Selection Energy Efficient Routing(FSE2R)is *** proposal’s key idea is based on computation of node distance from the sink,Residual Energy(RE)of each node and Signal to Interference Noise Ratio(SINR).The node distance from sink and RE is computed for reliable forwarder node selection and SINR is used for analysis of *** novel proposal compares with existing protocols like H2AB,DEEP,and E2LR to achieve Quality of Service(QoS)in terms of through-put,packet delivery ratio and energy *** comparative analysis shows that FSE2R gives on an average 30%less energy consumption,24.62%better PDR and 48.31%less end-to-end delay compared to other protocols.
暂无评论