Airplanes play a critical role in global transportation, ensuring the efficient movement of people and goods. Although generally safe, aviation systems occasionally encounter incidents and accidents that underscore th...
详细信息
In this article, we present the first rigorous theoretical analysis of the generalisation performance of a Geometric Semantic Genetic Programming (GSGP) system. More specifically, we consider a hill-climber using the ...
详细信息
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi...
详细信息
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of *** technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the *** the traditional blockchain,data is stored in a Merkle *** data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based ***,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of *** solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC ***,this paper uses PVC instead of the Merkle tree to store big data generated by *** can improve the efficiency of traditional VC in the process of commitment and ***,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of *** mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT.
Detection of color images that have undergone double compression is a critical aspect of digital image *** the existence of various methods capable of detecting double Joint Photographic Experts Group(JPEG) compressio...
详细信息
Detection of color images that have undergone double compression is a critical aspect of digital image *** the existence of various methods capable of detecting double Joint Photographic Experts Group(JPEG) compression,they are unable to address the issue of mixed double compression resulting from the use of different compression *** particular,the implementation of Joint Photographic Experts Group 2000(JPEG2000)as the secondary compression standard can result in a decline or complete loss of performance in existing *** tackle this challenge of JPEG+JPEG2000 compression,a detection method based on quaternion convolutional neural networks(QCNN) is *** QCNN processes the data as a quaternion,transforming the components of a traditional convolutional neural network(CNN) into a quaternion *** relationships between the color channels of the image are preserved,and the utilization of color information is ***,the method includes a feature conversion module that converts the extracted features into quaternion statistical features,thereby amplifying the evidence of double *** results indicate that the proposed QCNN-based method improves,on average,by 27% compared to existing methods in the detection of JPEG+JPEG2000 compression.
Carbon neutrality has become an important design objective worldwide. However, the on-going shift to cloud-naive era does not necessarily mean energy efficiency. From the perspective of power management, co-hosted ser...
详细信息
Carbon neutrality has become an important design objective worldwide. However, the on-going shift to cloud-naive era does not necessarily mean energy efficiency. From the perspective of power management, co-hosted serverless functions are difficult to tame. They are lightweight, short-lived applications sensitive to power capping activities. In addition, they exhibit great individual and temporal variability, presenting idiosyncratic performance/power scaling goals that are often at odds with one another. To date, very few proposals exist in terms of tailored power management for serverless platforms. In this work, we introduce power synchronization, a novel yet generic mechanism for managing serverless functions in a power-efficient way. Our insight with power synchronization is that uniform application power behavior enables consistent and uncompromised function operation on shared host machines. We also propose PowerSync, a synchronization-based power management framework that ensures optimal efficiency based on a clear understanding of functions. Our evaluation shows that PowerSync can improve the energy efficiency of functions by up to 16% without performance loss compared to conventional power management strategies.
This paper focuses on the privacy-preserving security control issue for cyber-physical systems (CPSs) via an encoding-decoding communication scheme (EDCS). To considerably contemplate the delayed data acquisition and ...
详细信息
The growing use of vectors for unstructured data has made efficient hybrid queries-combining boolean filters with vector similarity searches-essential. However, publicly available datasets for evaluating DBMS performa...
详细信息
Live video streaming demands high user Quality of Experience (QoE) and requires significant computing power and bandwidth for video encoding and transmission. The standard adaptive live streaming approach encodes the ...
详细信息
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use...
详细信息
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use are outdated and suffer from numerous vulnerabilities that stem from the design of the underlying BAS *** this paper,we provide a comprehensive,up-to-date survey on BASs and attacks against seven BAS protocols including BACnet,EnOcean,KNX,LonWorks,Modbus,ZigBee,and *** studies of secure BAS protocols are also presented,covering BACnet Secure Connect,KNX Data Secure,KNX/IP Secure,ModBus/TCP Security,EnOcean High Security and Z-Wave *** and ZigBee do not have security *** point out how these security protocols improve the security of the BAS and what issues remain.A case study is provided which describes a real-world BAS and showcases its vulnerabilities as well as recommendations for improving the security of *** seek to raise awareness to those in academia and industry as well as highlight open problems within BAS security.
Agile methodology does not formally define the role of a project manager, and the Scrum methodology distributes this role among team members. However, the success of software development projects often depends heavily...
详细信息
暂无评论