The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE service...
详细信息
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the *** IoE-based cloud computing services are located at remote locations without the control of the data *** data owners mostly depend on the untrusted Cloud Service Provider(CSP)and do not know the implemented security *** lack of knowledge about security capabilities and control over data raises several security *** Acid(DNA)computing is a biological concept that can improve the security of IoE big *** IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol(StS KAP)and Feistel cipher *** paper proposed a DNA-based cryptographic scheme and access control model(DNACDS)to solve IoE big data security and access *** experimental results illustrated that DNACDS performs better than other DNA-based security *** theoretical security analysis of the DNACDS shows better resistance capabilities.
Probabilistic error cancellation (PEC) is a promising error mitigation technique that reduces the error rate without auxiliary quantum bits. However, PEC has two problems that need to be resolved: 1) there is no good ...
详细信息
MXene is a promising energy storage material for miniaturized microbatteries and microsupercapacitors(MSCs).Despite its superior electrochemical performance,only a few studies have reported MXene-based ultrahigh-rate(...
详细信息
MXene is a promising energy storage material for miniaturized microbatteries and microsupercapacitors(MSCs).Despite its superior electrochemical performance,only a few studies have reported MXene-based ultrahigh-rate(>1000 mV s^(−1))on-paper MSCs,mainly due to the reduced electrical conductance of MXene films deposited on ***,ultrahigh-rate metal-free on-paper MSCs based on heterogeneous MXene/poly(3,4-ethylenedioxythiophene)-poly(styrenesulfonate)(PEDOT:PSS)-stack electrodes are fabricated through the combination of direct ink writing and femtosecond laser *** a footprint area of only 20 mm^(2),the on-paper MSCs exhibit excellent high-rate capacitive behavior with an areal capacitance of 5.7 mF cm^(−2)and long cycle life(>95%capacitance retention after 10,000 cycles)at a high scan rate of 1000 mV s^(−1),outperforming most of the present on-paper ***,the heterogeneous MXene/PEDOT:PSS electrodes can interconnect individual MSCs into metal-free on-paper MSC arrays,which can also be simultaneously charged/discharged at 1000 mV s^(−1),showing scalable capacitive *** heterogeneous MXene/PEDOT:PSS stacks are a promising electrode structure for on-paper MSCs to serve as ultrafast miniaturized energy storage components for emerging paper electronics.
A new online scheduling algorithm is proposed for photovoltaic(PV)systems with battery-assisted energy storage systems(BESS).The stochastic nature of renewable energy sources necessitates the employment of BESS to bal...
详细信息
A new online scheduling algorithm is proposed for photovoltaic(PV)systems with battery-assisted energy storage systems(BESS).The stochastic nature of renewable energy sources necessitates the employment of BESS to balance energy supplies and demands under uncertain weather *** proposed online scheduling algorithm aims at minimizing the overall energy cost by performing actions such as load shifting and peak shaving through carefully scheduled BESS charging/discharging *** scheduling algorithm is developed by using deep deterministic policy gradient(DDPG),a deep reinforcement learning(DRL)algorithm that can deal with continuous state and action *** of the main contributions of this work is a new DDPG reward function,which is designed based on the unique behaviors of energy *** new reward function can guide the scheduler to learn the appropriate behaviors of load shifting and peak shaving through a balanced process of exploration and *** new scheduling algorithm is tested through case studies using real world data,and the results indicate that it outperforms existing algorithms such as Deep *** online algorithm can efficiently learn the behaviors of optimum non-casual off-line algorithms.
Due to the probability characteristics of quantum mechanism, the combination of quantum mechanism and intelligent algorithm has received wide attention. Quantum dynamics theory uses the Schr?dinger equation as a quant...
详细信息
Due to the probability characteristics of quantum mechanism, the combination of quantum mechanism and intelligent algorithm has received wide attention. Quantum dynamics theory uses the Schr?dinger equation as a quantum dynamics equation. Through three approximation of the objective function, quantum dynamics framework(QDF) is obtained which describes basic iterative operations of optimization algorithms. Based on QDF, this paper proposes a potential barrier estimation(PBE) method which originates from quantum mechanism. With the proposed method, the particle can accept inferior solutions during the sampling process according to a probability which is subject to the quantum tunneling effect, to improve the global search capacity of optimization *** effectiveness of the proposed method in the ability of escaping local minima was thoroughly investigated through double well function(DWF), and experiments on two benchmark functions sets show that this method significantly improves the optimization performance of high dimensional complex functions. The PBE method is quantized and easily transplanted to other algorithms to achieve high performance in the future.
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems(IDS).Data labeling difficulties,incorrect conclusions,and vulnerability to malicious data injec...
详细信息
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems(IDS).Data labeling difficulties,incorrect conclusions,and vulnerability to malicious data injections are only a few drawbacks of using machine learning algorithms for *** overcome these obstacles,researchers have created several network IDS models,such as the Hidden Naive Bayes Multiclass Classifier and supervised/unsupervised machine learning *** study provides an updated learning strategy for artificial neural network(ANN)to address data categorization problems caused by unbalanced *** to traditional approaches,the augmented ANN’s 92%accuracy is a significant improvement owing to the network’s increased resilience to disturbances and computational complexity,brought about by the addition of a random weight and standard *** the ever-evolving nature of cybersecurity threats,this study introduces a revolutionary intrusion detection method.
Integrated sensing and communication (ISAC) is a promising solution to mitigate the increasing congestion of the wireless spectrum. In this paper, we investigate the short packet communication regime within an ISAC sy...
详细信息
With an increase in the population of older adults in developed nations globally, research on radar-based human activity recognition for reliable and accurate fall event detection has accelerated exponentially. Radars...
详细信息
With an increase in the population of older adults in developed nations globally, research on radar-based human activity recognition for reliable and accurate fall event detection has accelerated exponentially. Radars are safe, contactless, and privacy-preserving sensors that facilitate ‘aging in place.’ A plethora of research papers have been published in this field in the last five years. The primary goal of all research works is to recognize the human activities from the backscattered radar returns. Despite being a well-researched field, technology-transfer from lab to market is implausible due to several underlying issues that are yet to be addressed. These issues will serve as potential barriers when implementing the developed technologies in real-life. This article aims to reveal some of these issues that are important for successful technology-transfer of radar-based human activity recognition systems, and potential solutions to mitigate these issues are proposed.
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel...
详细信息
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation.
Deep Neural Networks(DNNs)are integral to various aspects of modern life,enhancing work ***-less,their susceptibility to diverse attack methods,including backdoor attacks,raises security *** aim to investigate backdoo...
详细信息
Deep Neural Networks(DNNs)are integral to various aspects of modern life,enhancing work ***-less,their susceptibility to diverse attack methods,including backdoor attacks,raises security *** aim to investigate backdoor attack methods for image categorization tasks,to promote the development of DNN towards higher *** on backdoor attacks currently faces significant challenges due to the distinct and abnormal data patterns of malicious samples,and the meticulous data screening by developers,hindering practical attack *** overcome these challenges,this study proposes a Gaussian Noise-Targeted Universal Adversarial Perturbation(GN-TUAP)*** approach restricts the direction of perturbations and normalizes abnormal pixel values,ensuring that perturbations progress as much as possible in a direction perpendicular to the decision hyperplane in linear *** limits anomalies within the perturbations improves their visual stealthiness,and makes them more challenging for defense methods to *** verify the effectiveness,stealthiness,and robustness of GN-TUAP,we proposed a comprehensive threat *** on this model,extensive experiments were conducted using the CIFAR-10,CIFAR-100,GTSRB,and MNIST datasets,comparing our method with existing state-of-the-art attack *** also tested our perturbation triggers using various defense methods and further experimented on the robustness of the triggers against noise filtering *** experimental outcomes demonstrate that backdoor attacks leveraging perturbations generated via our algorithm exhibit cross-model attack effectiveness and superior ***,they possess robust anti-detection capabilities and maintain commendable performance when subjected to noise-filtering methods.
暂无评论