This paper explores the impact of source data compression on the performance of task execution at the receiver side of a communication system, and investigates the interference and impact of channel environment variat...
详细信息
This paper investigates the input-to-state stabilization of discrete-time Markov jump systems. A quantized control scheme that includes coding and decoding procedures is proposed. The relationship between the error in...
详细信息
The development of deep learning has led to increasing demands for computation and memory, making multi-chiplet accelerators a powerful solution. Multi-chiplet accelerators require more precise consideration of hardwa...
详细信息
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the *** technology has been widely used and has developed rapidly in big data systems across ...
详细信息
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the *** technology has been widely used and has developed rapidly in big data systems across various *** increasing number of users are participating in application systems that use blockchain as their underlying *** the number of transactions and the capital involved in blockchain grow,ensuring information security becomes *** the verification of transactional information security and privacy has emerged as a critical ***-based verification methods can effectively eliminate the need for centralized third-party ***,the efficiency of nodes in storing and verifying blockchain data faces unprecedented *** address this issue,this paper introduces an efficient verification scheme for transaction ***,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all ***,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous *** analyses and simulation experiments conclusively demonstrate the superior performance of this *** verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional *** findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of *** scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.
The most well-known type of correspondence between people is Discourse and correspondence assumes a vital part for conveying data. The truth of the matter is that each specific person on the planet won't discuss t...
详细信息
Water resource management relies heavily on reliable water quality predictions. Predicting water quality metrics in the watershed system, including dissolved oxygen (DO), is the main emphasis of this work. The enhance...
详细信息
COVID-19 affected each and every sector of human life. The food sector, security, employment, agriculture, etc. converged a lot during the pandemic. The coronavirus (COVID-19) pandemic has had a significant impact on ...
详细信息
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing ima...
详细信息
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial *** this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and ***,the fingerprint code with a hierarchical community structure is designed based on social network ***,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is *** that,all codeword segments are embedded into the LL,LH,and HL subbands,*** selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our ***,the superiority of the technique is elaborated through comparison with some related image security *** solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social *** the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured.
The pursuit of advanced energy-storage solutions has highlighted the potential of rechargeable batteries with metal anodes due to their high specific capacities and low redox ***,the formation of metal dendrites remai...
详细信息
The pursuit of advanced energy-storage solutions has highlighted the potential of rechargeable batteries with metal anodes due to their high specific capacities and low redox ***,the formation of metal dendrites remains a critical challenge,compromising both safety and operational *** zinc-based batteries(ZBs),traditional methods to suppress dendrite growth have shown limited success and often entail performance ***,we propose a novel strategy termed dendrite rearrangement that leverages the electrochemical self-discharge process to controllably address the dendrite *** temporarily increasing the input voltage within a single cycle,this strategy resets the cell stability without precipitating undesirable side reactions during normal *** pioneering technique extends operational lifespans to over three times their original duration,facilitating 80000 cycles for Zn-ion hybrid capacitors and 3000 hours for Zn symmetrical *** in scaled-up pouch cells,Ah-level symmetrical cells demonstrate a cumulative capacity nearing 200000 mAh,significantly surpassing those of reported metal symmetrical ***,the electrolytic Zn-MnO2battery demonstrates a high capacity approaching 10 Ah,setting a new benchmark among reported ZB *** results mark a significant advancement towards resolving dendrite-related issues in metal anode batteries,paving the way for their sustainable development and potential commercialization.
Unmanned aerial vehicles(UAVs) with limited energy resources, severe path loss, and shadowing to the ground base stations are vulnerable to smart jammers that aim to degrade the UAV communication performance and exhau...
详细信息
Unmanned aerial vehicles(UAVs) with limited energy resources, severe path loss, and shadowing to the ground base stations are vulnerable to smart jammers that aim to degrade the UAV communication performance and exhaust the UAV energy. The UAV anti-jamming communication performance, such as the outage probability, degrades if the robot relay is not aware of the jamming policies and the UAV network topology. In this paper, we propose a robot relay scheme for UAVs against smart jamming, which combines reinforcement learning with a function approximation approach named tile coding, to jointly optimize the robot moving distance and relay power with the unknown jamming channel states and locations. The robot mobility and relay policy are chosen based on the received jamming power, the robot received signal quality,location and energy consumption, and the bit error rate of the UAV messages. We also present a deep reinforcement learning version for the robot with sufficient computing resources. It uses three deep neural networks to choose the robot mobility and relay policy with reduced sample complexity, so as to avoid exploring dangerous policies that lead to the high outage probability of the UAV messages. The network architecture of the three networks is designed with fully connected layers instead of convolutional layers to reduce the computational complexity, which is analyzed by theoretical analyses. We provide the performance bound of the proposed schemes in terms of the bit error rate, robot energy consumption and utility based on a game-theoretic study. Simulation results show that the performance of our proposed relay schemes,including the bit error rate, the outage probability, and the robot energy consumption outperforms the existing schemes.
暂无评论