Significant voltage overshoots are observed in the input terminals of long cable pulse-width modulation (PWM)-fed induction machines, which can detrimentally impact the machine's lifespan and performance. To mitig...
详细信息
The urgent need for early detection and intervention in colorectal cancer highlights the importance of automating colorectal polyp detection. Despite the use of deep learning techniques for polyp detection from medica...
详细信息
Optimal control techniques are among the most significant technical concepts that can be applied to medical concerns. Establishing a control law for a particular system mathematical model under specified restrictions ...
详细信息
This Emotions have been playing a crucial part in the social, physical, and mental life. Hence identifying the emotions by recognizing the facial expression of the user is of utmost importance. This information obtain...
详细信息
Mobility is the main key for smart living, where navigation and automatic suggestions are also a strategy for a successful life in smart cities. Big Data analytics are behind urban changes in the mobility of smart cit...
详细信息
The research described the design and analysis of a bistable actuator for MEMS devices using a curved beam structure. The investigation revolves around the optimization of length, width, and apex height of the microst...
详细信息
This paper answers three essential questions for audio speech cryptosystems in time and discrete transform *** first question is,what are the best values of sub-keys that must be used to get the best quality and secur...
详细信息
This paper answers three essential questions for audio speech cryptosystems in time and discrete transform *** first question is,what are the best values of sub-keys that must be used to get the best quality and security for the audio cryptosystem in time and discrete transform *** second question is the relation between the number of sub-keys,the number of secret keys used,and the audio speech signal block’s ***,how many possible secret keys can be used to get the best quality and security results for the audio speech cryptosystem in time and discrete transform *** audio cryptosystem discussed before in recent research is applied to answer the three previous *** simulation results and analysis answer all three questions;first,there is no specific,well-defined format or rule for sub-key values that must be used to get a better *** the second question,yes,there is a direct relationship between the number of applicable keys,number of available sub-keys,and block size of speech audio signal and formulated into a first-order *** the third question,each discrete transform domain has a specific acceptable range of sub-keys that imply a particular number of keys that can be used to get a better cryptosystem.
This paper presents a six-node system comprising two transmitter-receiver pairs, an eavesdropper, and a relay. It evaluates the security of the primary pair while the secondary uses jamming to protect against eavesdro...
详细信息
The Internet of Things (IoT) has transformed device communication, necessitating reliable information security, especially physical layer security (PLS). Protecting data confidentiality in wireless transfers is critic...
详细信息
The integration of advanced artificial intelligence (AI) techniques into horticulture has opened new avenues for optimizing crop management and enhancing productivity. This study explores the application of K-means cl...
详细信息
暂无评论