Blockchain technology has been extensively studied over the past decade as a foundation for decentralized information-sharing platforms due to its promising *** the success of existing blockchain architectures like Bi...
详细信息
Blockchain technology has been extensively studied over the past decade as a foundation for decentralized information-sharing platforms due to its promising *** the success of existing blockchain architectures like Bitcoin,Ethereum,Filecoin,Hyperledger Fabric,BCOS,and BCS,current blockchain applications are still quite *** struggles with scenarios requiring high-speed transactions(e.g.,online markets)or large data storage(e.g.,video services)due to consensus efficiency *** restrictions pose risks to investors in blockchain-based economic systems(e.g.,DeFi),deterring current and potential *** protection challenges make it difficult to involve sensitive data in blockchain applications.
Six-phase motors are becoming more popular because of their advantages such as lower torque ripple, better power distribution per phase, higher efficiency, and fault-tolerant capability compared to the three-phase one...
详细信息
The telegrapher’s equations constitute a set of linear partial differential equations that establish a mathematical correspondence between the electrical current and voltage within transmission lines, taking into acc...
详细信息
End-to-end training has emerged as a prominent trend in speech recognition, with Conformer models effectively integrating Transformer and CNN architectures. However, their complexity and high computational cost pose d...
详细信息
Large number of antennas and higher bandwidth usage in massive multiple-input-multipleoutput(MIMO)systems create immense burden on receiver in terms of higher power *** power consumption at the receiver radio frequenc...
详细信息
Large number of antennas and higher bandwidth usage in massive multiple-input-multipleoutput(MIMO)systems create immense burden on receiver in terms of higher power *** power consumption at the receiver radio frequency(RF)circuits can be significantly reduced by the application of analog-to-digital converter(ADC)of low *** this paper we investigate bandwidth efficiency(BE)of massive MIMO with perfect channel state information(CSI)by applying low resolution ADCs with Rician *** start our analysis by deriving the additive quantization noise model,which helps to understand the effects of ADC resolution on BE by keeping the power constraint at the receiver in *** also investigate deeply the effects of using higher bit rates and the number of BS antennas on bandwidth efficiency(BE)of the *** emphasize that good bandwidth efficiency can be achieved by even using low resolution ADC by using regularized zero-forcing(RZF)combining *** also provide a generic analysis of energy efficiency(EE)with different options of bits by calculating the energy efficiencies(EE)using the achievable *** emphasize that satisfactory BE can be achieved by even using low-resolution ADC/DAC in massive MIMO.
The Gannet Optimization Algorithm (GOA) and the Whale Optimization Algorithm (WOA) demonstrate strong performance;however, there remains room for improvement in convergence and practical applications. This study intro...
详细信息
The Gannet Optimization Algorithm (GOA) and the Whale Optimization Algorithm (WOA) demonstrate strong performance;however, there remains room for improvement in convergence and practical applications. This study introduces a hybrid optimization algorithm, named the adaptive inertia weight whale optimization algorithm and gannet optimization algorithm (AIWGOA), which addresses challenges in enhancing handwritten documents. The hybrid strategy integrates the strengths of both algorithms, significantly enhancing their capabilities, whereas the adaptive parameter strategy mitigates the need for manual parameter setting. By amalgamating the hybrid strategy and parameter-adaptive approach, the Gannet Optimization Algorithm was refined to yield the AIWGOA. Through a performance analysis of the CEC2013 benchmark, the AIWGOA demonstrates notable advantages across various metrics. Subsequently, an evaluation index was employed to assess the enhanced handwritten documents and images, affirming the superior practical application of the AIWGOA compared with other algorithms.
With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of *** study presents a new approach to the encryption and compression of color *** is predicat...
详细信息
With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of *** study presents a new approach to the encryption and compression of color *** is predicated on 2D compressed sensing(CS)and the hyperchaotic ***,an optimized Arnold scrambling algorithm is applied to the initial color images to ensure strong ***,the processed images are con-currently encrypted and compressed using 2D *** them,chaotic sequences replace traditional random measurement matrices to increase the system’s ***,the processed images are re-encrypted using a combination of permutation and diffusion *** addition,the 2D projected gradient with an embedding decryption(2DPG-ED)algorithm is used to reconstruct *** with the traditional reconstruction algorithm,the 2DPG-ED algorithm can improve security and reduce computational ***,it has better *** experimental outcome and the performance analysis indicate that this algorithm can withstand malicious attacks and prove the method is effective.
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain...
详细信息
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware *** this gap can provide valuable insights for enhancing cybersecurity *** numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware *** the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security *** study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows *** objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows *** the accuracy,efficiency,and suitability of each classifier for real-world malware detection *** the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and *** recommendations for selecting the most effective classifier for Windows malware detection based on empirical *** study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and *** data analysis involves understanding the dataset’s characteristics and identifying preprocessing *** preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for *** training utilizes various
Cloud computing is an on-demand service resource that includes applications to data centres on a pay-per-use basis. While allocating resources, the node failure causes the cloud service failures. This reduces the qual...
详细信息
Network attacks, such as botnets stealing sensitive data, constitute a critical concern for administrators in the Internet area. Such attacks can be prevented using a network access control (NAC) scheme. However, exis...
详细信息
暂无评论