This article investigates the impact of Artificial Intelligence (AI) and ChatGPT in the business sector. It highlights the evolution of AI, focusing on the integration and applications of technologies like machine lea...
详细信息
To mitigate the challenges posed by data uncertainty in Full-Self Driving (FSD) systems. This paper proposes a novel feature extraction learning model called Adaptive Region of Interest Optimized Pyramid Network (ARO)...
详细信息
Preserving privacy is imperative in the new unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC)architecture to ensure that sensitive information is protected and kept secure throughout the ***,efficiency ...
详细信息
Preserving privacy is imperative in the new unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC)architecture to ensure that sensitive information is protected and kept secure throughout the ***,efficiency must be considered while developing such a privacy-preserving scheme because the devices involved in these architectures are resource *** study proposes a lightweight and efficient authentication scheme for *** proposed scheme is a hardware-based password-less authentication mechanism that is based on the fact that temporal and memory-related efficiency can be significantly improved while maintaining the data security by adopting a hardwarebased solution with a simple *** proposed scheme works in four stages:system initialization,EU registration,EU authentication,and session *** is implemented as a single hardware chip comprising registers and XOR gates,and it can run the entire process in one clock ***,the proposed scheme has significantly higher efficiency in terms of runtime and memory consumption compared to other prevalent methods in the *** are conducted to evaluate the proposed authentication *** results show that the scheme has an average execution time of 0.986 ms and consumes average memory of 34 *** hardware execution time is approximately 0.39 ns,which is a significantly less than the prevalent schemes,whose execution times range in ***,the security of the proposed scheme is examined,and it is resistant to brute-force *** 1.158×10^(77) trials are required to overcome the system’s security,which is not feasible using fastest available processors.
During recent decades, using credit cards represents a pivotal part of the financial lifeline. Credit cards and online payment gateways are vital elements in the world of world-wide-web. Given the fact that credit car...
详细信息
Image inpainting has made great achievements recently, but it is often tough to generate a semantically consistent image when faced with large missing areas in complex scenes. To address semantic and structural alignm...
详细信息
Over the years, numerous optimization problems have been addressed utilizing meta-heuristic algorithms. Continuing initiatives have always been to create and develop new, practical algorithms. This work proposes a nov...
详细信息
Suicide is a significant public health issue that devastates individuals and society. Early warning systems are crucial in preventing suicide. The purpose of this research is to create a deep learning model to identif...
详细信息
Operational technology, industrial automation, advanced healthcare systems, and smart city infrastructures are common forms of IoT integrated distributed networks. Numerous IoT components require vast amounts of power...
详细信息
Wireless-powered multi-access edge computing (WP-MEC), as a promising computing paradigm with the great potential for breaking through the power limitations of wireless devices, is facing the challenges of reliable ta...
详细信息
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of *** connection between industrial control networks and the external internet is becoming increa...
详细信息
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of *** connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security *** paper proposes a model for the industrial control *** includes a malware containment strategy that integrates intrusion detection,quarantine,and ***,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment *** addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction ***,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is *** otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control *** earlier the immunization of key nodes,the *** the time exceeds the threshold,immunizing key nodes is almost *** analysis provides a better way to contain the malware in the industrial control network.
暂无评论