Model performance has been significantly enhanced by channel attention. The average pooling procedure creates skewness, lowering the performance of the network architecture. In the channel attention approach, average ...
详细信息
Hyperspectral imaging has transformed remote sensing by offering detailed spectral data for monitoring environmental changes, like urban development and terrestrial cover variations. However, existing change detection...
详细信息
In digital identification technologies, fingerprint-based biometric systems are extensively utilized for authentication. Fingerprint authentication systems usually store the original minutiae points as user templates ...
详细信息
The pandemic of COVID-19 has affected worldwide population. Diagnosing this highly contagious disease at an initial stage is essential for controlling its spread. In this paper, we propose a novel lightweight hybrid c...
详细信息
Improving the quality and resolution of low- resolution digital images is an important task with far-reaching implications for a variety of applications, including medical imaging, surveillance, and content retrieval....
详细信息
Decentralized Anonymous Payment Systems (DAP), often known as cryptocurrencies, stand out as some of the most innovative and successful applications on the blockchain. These systems have garnered significant attention...
详细信息
The Internet of Things (IoT) has revolutionized our lives, but it has also introduced significant security and privacy challenges. The vast amount of data collected by these devices, often containing sensitive informa...
详细信息
In an infrastructure cloud environment, task scheduling should focus on optimizing execution time and saving energy. The data center consumes a large amount of energy during the execution of the task. Energy-saving te...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
The heart is indispensable for body. Diagnosis of heart disease must be complete and accurate. Heart disease is a dangerous disease. This disease is caused by many problems such as excessive stress, diabetes, high blo...
详细信息
暂无评论