Information security has emerged as a requirement and a hot topic in the modern digital world. The world today is surrounded by tonnes of gigabytes of data generated from digital platforms continually streaming throug...
详细信息
A newly designed small, almost square shaped Ultra Wideband antenna is presented in this paper. Free space simulations provided promising results with a wider bandwidth and high efficiency up to 97.68% within the UWB ...
详细信息
Carbon Dioxide and Greenhouse Gases are the main cause of the change in the climate. It is recognized worldwide that need to reduce the emissions of greenhouse gases to avoid their worst impact on the change of the cl...
详细信息
Voting is a vital pillar of democracy, upholding the principles of representation and public expression. Over time, the quest for secure and efficient systems has driven the transition from paper ballots to Electronic...
详细信息
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation ***,the exchange of beacons and messages over public c...
详细信息
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation ***,the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy *** address these challenges,several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed ***,most of these schemes are limited by a long execution time and massive communication costs,which make them inefficient for on-board units(OBUs).Additionally,some of them are still susceptible to many *** such,this study presents a novel protocol based on the fusion of elliptic curve cryptography(ECC)and bilinear pairing(BP)*** formal security analysis is accomplished using the Burrows–Abadi–Needham(BAN)logic,demonstrating that our scheme is verifiably *** proposed scheme’s informal security assessment also shows that it provides salient security features,such as non-repudiation,anonymity,and ***,the scheme is shown to be resilient against attacks,such as packet replays,forgeries,message falsifications,and *** the performance perspective,this protocol yields a 37.88%reduction in communication overheads and a 44.44%improvement in the supported security ***,the proposed scheme can be deployed in VANETs to provide robust security at low overheads.
The judicial system's success relies on minimizing crime and disciplining those involved in crimes. The crime rate has increased, making it a laborious and time-consuming task for law enforcement. The paper propos...
详细信息
The rapid proliferation of interconnected devices leveraging a diverse array of sensors for internet connectivity, communally known as the Internet of Things (IoT), holds immense potential to reshape both the natural ...
详细信息
Deploying Machine Learning (ML) models in real-world settings over resource-constrained edge devices has always been a challenging task. While TinyML tackles this issue to an extent, by mostly using pre-trained Deep L...
详细信息
In multi-agent reinforcement learning (MARL), effective exploration is critical, especially in sparse reward environments. Although introducing global intrinsic rewards can foster exploration in such settings, it ofte...
详细信息
In multi-agent reinforcement learning (MARL), effective exploration is critical, especially in sparse reward environments. Although introducing global intrinsic rewards can foster exploration in such settings, it often complicates credit assignment among agents. To address this difficulty, we propose Individual Contributions as intrinsic Exploration Scaffolds (ICES), a novel approach to motivate exploration by assessing each agent's contribution from a global view. In particular, ICES constructs exploration scaffolds with Bayesian surprise, leveraging global transition information during centralized training. These scaffolds, used only in training, help to guide individual agents towards actions that significantly impact the global latent state transitions. Additionally, ICES separates exploration policies from exploitation policies, enabling the former to utilize privileged global information during training. Extensive experiments on cooperative benchmark tasks with sparse rewards, including Google Research Football (GRF) and StarCraft Multi-agent Challenge (SMAC), demonstrate that ICES exhibits superior exploration capabilities compared with baselines. The code is publicly available at https://***/LXXXXR/ICES. Copyright 2024 by the author(s)
With the modernization of the transportation system, EVs penetration has been promoted significantly and holds great potential by maintaining energy sustainability for the greener environment. Nevertheless, owing to t...
详细信息
暂无评论