Video-conferencing systems (VCS) became a defacto tool for online and hybrid teaching during COVID-19 and the gradual return to physical classrooms. As part of the EdViCon Erasmus+ project, towards defining the scenar...
详细信息
To solve conservation laws,efficient schemes such as essentially nonoscillatory(ENO)and weighted ENO(WENO)have been introduced to control the Gibbs *** on radial basis functions(RBFs)with the classical WENO-JS weights...
详细信息
To solve conservation laws,efficient schemes such as essentially nonoscillatory(ENO)and weighted ENO(WENO)have been introduced to control the Gibbs *** on radial basis functions(RBFs)with the classical WENO-JS weights,a new type of WENO schemes has been proposed to solve conservation laws[*** et al.,***.,70(2017),pp.551–575].The purpose of this paper is to introduce a new formulation of conservative finite difference RBFWENO schemes to solve conservation *** the usual method for reconstructing the flux functions,the flux function is generated directly with the conservative *** with Guo and Jung(2017),the main advantage of this framework is that arbitrary monotone fluxes can be employed,while in Guo and Jung(2017)only smooth flux splitting can be used to reconstruct flux *** 1D and 2D benchmark problems are prepared to demonstrate the good performance of the new scheme.
This paper presents the development of a secure data platform designed to enhance operational efficiency and to facilitate cross-company collaboration within the manufacturing supply chain. The platform is designed to...
详细信息
Privacy and transparency in vote counting are the most prevalent concerns these days due to the involvement of untrusted authorities in the counting process. As a result, the counting process faces significant privacy...
详细信息
Privacy and transparency in vote counting are the most prevalent concerns these days due to the involvement of untrusted authorities in the counting process. As a result, the counting process faces significant privacy, trust, and transparency hurdles. Hence, there is a need for an efficient and trusted mechanism to resolve such problems. Blockchain technology has the potential to bring transparency and trust in several applications. Therefore, in this work, we explore blockchain technology in conjunction with a secure partitioning scheme to promote transparency, trust, and privacy between users and participating authorities in a decentralized platform. This paper presents a chaincode-based implementation of our proposed secure and verifiable vote counting mechanism that enables trust and fairness over a decentralized platform. Multiple authorities participate in the vote counting process in a trusted manner to cooperate and coordinate in a decision process over a decentralized platform. Our research exhibits that blockchain technology can eliminate the trust gaps and increase transparency and fairness in the election and vote counting procedure. We register user votes in the blockchain platform based on the secret sharing mechanism to enable fairness and openness between counting authorities. Each vote is recorded into the distributed ledger to support openness and verifiability in our mechanism. The ledger is accessible to every registered user as per the permissioned blockchain policy. We created many authorities in the blockchain network and deployed multiple smart contracts on the Hyperledger platform to analyze the feasibility of our strategy. The performance results are obtained and reported using the Hyperledger Caliper benchmark tool. The results demonstrate that the proposed chaincode-based solution achieves the highest throughput at 200–400 tps for fetching and removing contracts. We achieve the optimal latency of 18.09 s for the vote distribution contract
As communication technologies and equipment evolve, smart assets become smarter. The agricultural industry is also evolving in line with the implementation of modern communication protocols, intelligent sensors, and e...
详细信息
In this paper, we propose novel federated learning (FL) and blockchain-based secure multicast routing (FBSMR) protocol in flying ad hoc networks (FANETs) with cell-free massive MIMO (CF-mMIMO) and simultaneously trans...
详细信息
In this paper, we propose novel federated learning (FL) and blockchain-based secure multicast routing (FBSMR) protocol in flying ad hoc networks (FANETs) with cell-free massive MIMO (CF-mMIMO) and simultaneously transmitting and reflecting-reconfigurable intelligent surface (STAR-RIS) effectively avoiding collaborative attacks. The proposed FBSMR protocol integrates FL with blockchain to enhance security and prevent collaborative attacks during the routing process. Besides, by utilizing a cross-layer design, the proposed FBSMR can enhance network security and quality of service (QoS) performance. Specifically, we implement a blockchain-based approach to support secure multicast routing, which efficiently detects and isolates malicious nodes. By using these techniques, all participating nodes achieve consensus on the validity of routing paths, thereby significantly enhancing overall network security. Besides, we address the cost-minimization problem in the proposed cross-layer design by optimizing the weight values of physical layer information, data link layer information, and network layer information subject to the minimum sequence numbers, maximum end-to-end delay, and hop count constraints. To further enhance the coverage area, improve receive signal quality, and reduce the number of hops, we leverage the capabilities of STAR-RIS technology attached to the UAV (F-STAR-RIS) to refract and reflect incident waves toward desired positions, enabling significant improvements in signal quality and transmission coverage. Additionally, the FL framework is employed for real-time prediction of the secure next node, utilizing local data from each flying access point (F-AP) to predict the optimal next node, STAR-RIS configuration, and phase shift at the STAR-RIS. Simulation results demonstrate that the proposed FBSMR protocol, combined with the FedChain-based clustering protocol, establishes a more secure route against collaborative attacks and outperforms benchmark protocol
In response to the shortcomings of Dwarf Mongoose Optimization(DMO)algorithm,such as insufficient exploitation capability and slow convergence speed,this paper proposes a multi-strategy enhanced DMO,referred to as ***...
详细信息
In response to the shortcomings of Dwarf Mongoose Optimization(DMO)algorithm,such as insufficient exploitation capability and slow convergence speed,this paper proposes a multi-strategy enhanced DMO,referred to as ***,we propose an improved solution search equation that utilizes the Gbest-guided strategy with different parameters to achieve a trade-off between exploration and exploitation(EE).Secondly,the Lévy flight is introduced to increase the diversity of population distribution and avoid the algorithm getting stuck in a local *** addition,in order to address the problem of low convergence efficiency of DMO,this study uses the strong nonlinear convergence factor Sigmaid function as the moving step size parameter of the mongoose during collective activities,and combines the strategy of the salp swarm leader with the mongoose for cooperative optimization,which enhances the search efficiency of agents and accelerating the convergence of the algorithm to the global optimal solution(Gbest).Subsequently,the superiority of GLSDMO is verified on CEC2017 and CEC2019,and the optimization effect of GLSDMO is analyzed in *** results show that GLSDMO is significantly superior to the compared algorithms in solution quality,robustness and global convergence rate on most test ***,the optimization performance of GLSDMO is verified on three classic engineering examples and one truss topology optimization *** simulation results show that GLSDMO achieves optimal costs on these real-world engineering problems.
Situation awareness is the cognitive capability of human and artificial agents to perceive, understand and predict the status of the situation in an environment. Situation awareness systems aim at supporting the situa...
详细信息
Some of the applications in the field of machine learning and computer vision may require a higher level of privacy and security, better cost efficiency, offline operation, and greater scalability and efficiency. This...
详细信息
One of the key problems of the modern day is the presentation of an identity verification system that can perform sufficient accuracy in identity verification, is resilient to assaults and noises, and can be recorded ...
详细信息
暂无评论