Several methods for fire detection from camera streams have been proposed in recent years. While traditional techniques often emphasize recall, they frequently neglect critical factors such as minimizing false positiv...
详细信息
In order to overcome the challenges caused by flash memories and also to protect against errors related to reading information stored in DNA molecules in the shotgun sequencing method, the rank modulation method has b...
详细信息
Large-scale geological storages of hydrogen (H2) and carbon dioxide (CO2) in saline aquifers present feasible options for a sustainable energy future. We compared the plume migration of CO2 and H2 in aquifers using th...
详细信息
Spectrum sensing data falsification (SSDF) attack, i.e., Byzantine attack, is one of the critical threats of the cooperative spectrum sensing where the Byzantine attackers (BAs) forward incorrect local sensing results...
详细信息
Spectrum sensing data falsification (SSDF) attack, i.e., Byzantine attack, is one of the critical threats of the cooperative spectrum sensing where the Byzantine attackers (BAs) forward incorrect local sensing results to mislead the fusion center on channel availability decisions. By using traditional voting rule, the cooperative spectrum sensing performance deteriorates significantly due to incorrect local sensing results. Then, reliability weight strategy becomes the popular solution to avoid incorrect sensing results from BAs and unreliable cognitive radio users (CRUs). However, it is very difficult to detect the attackers since they also occasionally provide correct sensing results to the fusion center for concealing the attack objective. Based on existing techniques, the BAs and CRUs may be assigned with low reliability weights or distinguished from the data fusion account. However, it is very difficult to detect the attackers since they also occasionally provide correct sensing results to the fusion center for concealing the attack objective. Then, existing techniques still suffer from BAs and negative impact of unreliable CRUs. In this paper, we propose the adaptive cooperative quality weight algorithm for mitigating the Byzantine attack issue by distinguishing the BAs and CRUs from the data fusion account while selecting only useful CRUs since the number of members in the account is also the important factor for cooperative spectrum sensing. In our proposed algorithm, we adopt a stable preference ordering towards ideal solution (SPOTIS) for determining the reliability of SUs which shows low computational complexity as compared to other reliability weight-based techniques. To achieve high sensing performance, our global decision threshold is adapted according to the reliability of reliable users. From the simulation results, our proposed algorithm significantly improves global detection probability and total error probability compared to the traditional votin
We use machine learning to approximate the space of steady states in the shuttle model for the Wnt Signaling Pathway. In this ongoing work, we combine these methods with computational algebra to investigate a question...
The widespread deployment of Internet of Things (IoT) devices in homes, industries, and public spaces presents significant cybersecurity challenges, particularly due to their limited computational capabilities and oft...
详细信息
A simple, recently observed generalization of the classical Singleton bound to list-decoding asserts that rate R codes are not list-decodable using list-size L beyond an error fraction L/L+1 (1-R) (the Singleton bound...
详细信息
This article presents a mathematical model addressing a scenario involving a hybrid nanofluid flow between two infinite parallel *** plate remains stationary,while the other moves downward at a squeezing *** space bet...
详细信息
This article presents a mathematical model addressing a scenario involving a hybrid nanofluid flow between two infinite parallel *** plate remains stationary,while the other moves downward at a squeezing *** space between these plates contains a Darcy-Forchheimer porous medium.A mixture of water-based fluid with gold(Au)and silicon dioxide(Si O2)nanoparticles is *** contrast to the conventional Fourier's heat flux equation,this study employs the Cattaneo-Christov heat flux equation.A uniform magnetic field is applied perpendicular to the flow direction,invoking magnetohydrodynamic(MHD)***,the model accounts for Joule heating,which is the heat generated when an electric current passes through the *** problem is solved via NDSolve in *** and statistical analyses are conducted to provide insights into the behavior of the nanomaterials between the parallel plates with respect to the flow,energy transport,and skin *** findings of this study have potential applications in enhancing cooling systems and optimizing thermal management *** is observed that the squeezing motion generates additional pressure gradients within the fluid,which enhances the flow rate but reduces the frictional ***,the fluid is pushed more vigorously between the plates,increasing the flow *** the fluid experiences higher flow rates due to the increased squeezing effect,it spends less time in the region between the *** thermal relaxation,however,abruptly changes the temperature,leading to a decrease in the temperature fluctuations.
Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of software engineering theo...
Foundation models(FMs) [1] have revolutionized software development and become the core components of large software systems. This paradigm shift, however, demands fundamental re-imagining of software engineering theories and methodologies [2]. Instead of replacing existing software modules implemented by symbolic logic, incorporating FMs' capabilities to build software systems requires entirely new modules that leverage the unique capabilities of ***, while FMs excel at handling uncertainty, recognizing patterns, and processing unstructured data, we need new engineering theories that support the paradigm shift from explicitly programming and maintaining user-defined symbolic logic to creating rich, expressive requirements that FMs can accurately perceive and implement.
暂无评论