Management and information systems are considered two major disciplines that have to be combined to benefit from knowledge for rational decision-making which means strict procedures utilizing objective knowledge and l...
详细信息
This study presents an Epsilon Mu near-zero(EMNZ)nanostructured metamaterial absorber(NMMA)for visible regime *** resonator and dielectric layers are made of tungsten(W)and quartz(fused),where the working band is expa...
详细信息
This study presents an Epsilon Mu near-zero(EMNZ)nanostructured metamaterial absorber(NMMA)for visible regime *** resonator and dielectric layers are made of tungsten(W)and quartz(fused),where the working band is expanded by changing the resonator layer’s *** to perfect impedance matching with plasmonic resonance characteristics,the proposed NMMA structure is achieved an excellent absorption of 99.99%at 571 THz,99.50%at 488.26 THz,and 99.32%at 598 THz *** absorption mechanism is demonstrated by the theory of impedance,electric field,and power loss density distributions,*** geometric parameters are explored and analyzed to show the structure’s performance,and a near-field pattern is used to explain the absorption mechanism at the resonance frequency *** numerical analysis method describes that the proposed structure exhibited more than 80%absorbability between 550 and 900 *** computer Simulation Technology(CST Microwave Studio 2019)software is used to design the proposed ***,CSTHFSS interference is validated by the simulation data with the help of the finite element method(FEM).The proposed NMMA structure is also exhibits glucose concentration sensing capability as *** the proposed broadband absorber may have a potential application in THz sensing,imaging(MRI,thermal,color),solar energy harvesting,light modulators,and optoelectronic devices.
AZ91D magnesium alloy chips were coated with SiC powder using a binder, and injection molding was attempted using SiC powder coated magnesium chips as raw material. The metallurgical structure of the injection molded ...
详细信息
Various machine learning techniques have been proposed to improve the effectiveness of Intrusion Detection systems (IDS), where IDS is one of the important parts of the network that functions to maintain network secur...
详细信息
In this paper, we present Russian language datasets in the digital humanities domain for the evaluation of word embedding techniques or similar language modeling and feature learning algorithms. The datasets are split...
详细信息
Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)***,several security vulnerabilities and att...
详细信息
Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)***,several security vulnerabilities and attacks have plagued previous generations of communication systems;thus,physical layer security,especially against eavesdroppers,is vital,especially for upcoming 6G *** this regard,UAVs have appeared as a winning candidate to mitigate security *** this paper,we leverage UAVs to propose two *** first method utilizes a UAV as Decode-and-Forward(DF)relay,whereas the second method utilizes a UAV as a jammer to mitigate eavesdropping attacks for URLLC between transmitter and receiver ***,we present a low-complexity algorithm that outlines the two aforementioned methods of mitigating interception,*** secrecy rate,and we compare them with the benchmark null method in which there is a direct communication link between transmitter and receiver without the UAV DF ***,simulation results show the effectiveness of such methods by improving the secrecy rate and its dependency on UAV height,blocklength,decoding error probability and transmitter-receiver separation ***,we recommend the best method to enhance the secrecy rate in the presence of an eavesdropper based on our simulations.
Automatic Speaker Identification (ASI) is so crucial for security. Current ASI systems perform well in quiet and clean surroundings. However, in noisy situations, the robustness of an ASI system against additive noise...
详细信息
Automatic Speaker Identification (ASI) is so crucial for security. Current ASI systems perform well in quiet and clean surroundings. However, in noisy situations, the robustness of an ASI system against additive noise and interference is a crucial factor. An investigation of the impact of interference on ASI system performance is presented in this paper, which introduces algorithms for achieving high ASI system performance. The objective is to resist the interference of various forms. This paper presents two models for the ASI task in the presence of interference. The first one depends on Normalized Pitch Frequency (NPF) and Mel-Frequency Cepstral Coefficients (MFCCs) as extracted features and Multi-Layer Perceptron (MLP) as a classifier. In this model, we investigate the utilization of a Discrete Transform (DT), such as Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and Discrete Sine Transform (DST), to increase the robustness of extracted features against different types of degradation through exploiting the sub-band decomposition characteristics of DWT and the energy compaction property of DCT and DST. This is achieved by extracting features directly from contaminated speech signals in addition to features extracted from discrete transformed signals to create hybrid feature vectors. The enhancement techniques, such as Spectral Subtraction (SS), Winer Filter, and adaptive Wiener filter, are used in a preprocessing stage to eliminate the effect of the interference on the ASI system. In the second model, we investigate the utilization of Deep Learning (DL) based on a Convolutional Neural Network (CNN) with speech signal spectrograms and their Radon transforms to increase the robustness of the ASI system against interference effects. One of this paper goals is to introduce a comparison between the two models and build a more robust ASI system against severe interference. The experimental results indicate that the two proposed models lead to satisfa
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate wi...
详细信息
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate with each *** one party refuses to do so,the channel is unstable.A stable channel is thus *** nodes may show uncooperative behavior,they may have a negative impact on the stability of such *** order to address this issue,this work proposes a dynamic evolutionary game model based on node *** model considers various defense strategies'cost and attack success ratio under *** can dynamically adjust their strategies according to the behavior of attackers to achieve their effective *** equilibrium stability of the proposed model can be *** proposed model can be applied to general channel *** is compared with two state-of-the-art blockchain channels:Lightning network and Spirit *** experimental results show that the proposed model can be used to improve a channel's stability and keep it in a good cooperative stable *** its use enables a blockchain to enjoy higher transaction success ratio and lower transaction transmission delay than the use of its two peers.
In the field of computer vision and pattern recognition,knowledge based on images of human activity has gained popularity as a research *** recognition is the process of determining human behavior based on an *** impl...
详细信息
In the field of computer vision and pattern recognition,knowledge based on images of human activity has gained popularity as a research *** recognition is the process of determining human behavior based on an *** implemented an Extended Kalman filter to create an activity recognition system *** proposed method applies an HSI color transformation in its initial stages to improve the clarity of the frame of the *** minimize noise,we use Gaussian *** of silhouette using the statistical *** use Binary Robust Invariant Scalable Keypoints(BRISK)and SIFT for feature *** next step is to perform feature discrimination using Gray *** that,the features are input into the Extended Kalman filter and classified into relevant human activities according to their definitive *** experimental procedure uses the SUB-Interaction and HMDB51 datasets to a 0.88%and 0.86%recognition rate.
This article presents the development of a tethered fixed-wing tail-sitter VTOL (Vertical Take-Off and Landing) Unmanned Aerial Vehicle system. The design focuses on improving energy efficiency by utilizing the wings ...
详细信息
暂无评论