Inefficient task scheduling schemes compromise network performance and increase latency for delay intolerant tasks. Cybertwin based 6G services support data logging of operational queries for appropriate resource allo...
详细信息
The management of healthcare data has significantly benefited from the use of cloud-assisted MediVault for healthcare systems, which can offer patients efficient and convenient digital storage services for storin...
详细信息
This work analyzes the computing performance of distributed control systems in IEC 61499 on two hardware devices, Dell XPS workstation and Raspi 4B. Based on the test IEC 61499 application, three different system conf...
详细信息
The classification of cardiac-abnormality patterns with ECG data plays a crucial role in the diagnosis as well as treatment and prognosis of diseases related to the human heart. With the advent of deep learning techni...
详细信息
This study presents a lightweight deep learning model developed for DPU-accelerated systems. It aims to provide real-time autonomous driving on resource-constrained systems such as the Ultra96v2. A customized kids ele...
详细信息
Several approaches can detect early heart problems. Electrocardiograms (ECGs) are better and more affordable for early heart disease prediction. ECG data can better predict heart diseases and abnormalities. Standard m...
详细信息
The Dual Active Bridge (DAB) is a reliable and efficient converter capable of providing bi-directional power transfer and galvanic isolation. An ac-ac DAB can control both active and reactive power flow. The present w...
详细信息
Background: Pneumonia is one of the leading causes of death and disability due to respiratory infections. The key to successful treatment of pneumonia is in its early diagnosis and correct classification. PneumoniaNet...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Securi...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Security (PLS). Ensuring data confidentiality and integrity during wireless communications poses a primary challenge in IoT environments. Additionally, within the constrained frequency bands available, Cognitive Radio Networks (CRNs) has emerged as an urgent necessity to optimize spectrum utilization. This technology enables intelligent management of radio frequencies, enhancing network efficiency and adaptability to dynamic environmental changes. In this research, we focus on examining the PLS for the primary channel within the underlying CRNs. Our proposed model involves a primary source-destination pair and a secondary transmitter-receiver pair sharing the same frequency band simultaneously. In the presence of a common eavesdropper, the primary concern lies in securing the primary link communication. The secondary user (SU) acts as cooperative jamming, strategically allocating a portion of its transmission power to transmit artificial interference, thus confusing the eavesdropper and protecting the primary user's (PU) communication. The transmit power of the SU is regulated by the maximum interference power tolerated by the primary network's receiver. To evaluate the effectiveness of our proposed protocol, we develop closed-form mathematical expressions for intercept probability ((Formula presented.)) and outage probability (OP) along the primary communication link. Additionally, we derive mathematical expressions for OP along the secondary communications network. Furthermore, we investigate the impact of transmit power allocation on intercept and outage probabilities across various links. Through both simulation and theoretical analysis, our protocol aims to enhance protection and outage efficiency for the primary link while ensuring appropriate secondary
The success of Internet of Things (IoT) services will be determined by how the security of the IoT devices and the networks to which they are connected can be guaranteed. Integrating biometric recognition technology i...
详细信息
暂无评论