This study introduces the concept of anonymous data exchange in banking applications using cloud computing. By intertwining innovative methodologies, the proposed framework bolsters security while introducing novel di...
详细信息
In this paper, we have analyzed the impact of improper implementation of Transport Layer Security (TLS) in Android applications. Communication security in Android applications is largely dependent on Transport Layer S...
详细信息
In the densification of Device-to-Device(D2D)-enabled Social Internet of Things(SIoT)networks,improper allocation of resources can lead to high interference,increased signaling overhead,latency,and disruption of Chann...
详细信息
In the densification of Device-to-Device(D2D)-enabled Social Internet of Things(SIoT)networks,improper allocation of resources can lead to high interference,increased signaling overhead,latency,and disruption of Channel State Information(CSI).In this paper,we formulate the problem of sum throughput maximization as a Mixed Integer Non-Linear Programming(MINLP)*** problem is solved in two stages:a tripartite graph-based resource allocation stage and a time-scale optimization *** proposed approach prioritizes maintaining Quality of Service(QoS)and resource allocation to minimize power consumption while maximizing sum *** results demonstrate the superiority of the proposed algorithm over standard benchmark *** of the proposed algorithm using performance parameters such as sum throughput shows improvements ranging from 17%to 93%.Additionally,the average time to deliver resources to CSI users is minimized by 60.83%through optimal power *** approach ensures QoS requirements are met,reduces system signaling overhead,and significantly increases D2D sum throughput compared to the state-of-the-art *** proposed methodology may be well-suited to address the challenges SIoT applications,such as home automation and higher education systems.
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network *** paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key ***,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use *** paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions.
Artificial intelligence (AI) applications in forestry as well as wildlife domains have become more feasible due to the advancements in data science and digital and satellite technologies. However, there is a serious g...
详细信息
Birds are nice-looking from their aesthetic looks and life styles, around 50 billion of birds are living on the earth where some birds are in threat of extinction. For people, distinguishing and classification of bird...
详细信息
While single-modal visible light images or infrared images provide limited information,infrared light captures significant thermal radiation data,whereas visible light excels in presenting detailed texture ***-bining ...
详细信息
While single-modal visible light images or infrared images provide limited information,infrared light captures significant thermal radiation data,whereas visible light excels in presenting detailed texture ***-bining images obtained from both modalities allows for leveraging their respective strengths and mitigating individual limitations,resulting in high-quality images with enhanced contrast and rich texture *** capabilities hold promising applications in advanced visual tasks including target detection,instance segmentation,military surveillance,pedestrian detection,among *** paper introduces a novel approach,a dual-branch decomposition fusion network based on AutoEncoder(AE),which decomposes multi-modal features into intensity and texture information for enhanced *** contrast enhancement module(CEM)and texture detail enhancement module(DEM)are devised to process the decomposed images,followed by image fusion through the *** proposed loss function ensures effective retention of key information from the source images of both *** comparisons and generalization experiments demonstrate the superior performance of our network in preserving pixel intensity distribution and retaining texture *** the qualitative results,we can see the advantages of fusion details and local *** the quantitative experiments,entropy(EN),mutual information(MI),structural similarity(SSIM)and other results have improved and exceeded the SOTA(State of the Art)model as a whole.
Handwritten character segmentation plays a pivotal role in the performance of Optical Character Recognition (OCR) systems. This paper introduces an innovative approach to enhancing segmentation accuracy using Region-B...
详细信息
Detection of violence at an earlier phase is crucial to intercepting potential criminal activities such as murders, rapes, and snatching. It is a critical aspect of public safety and security, involving the identifica...
详细信息
The area of brain-computer interface research is widely spreading as it has a diverse array of potential applications. Motor imagery classification is a boon to several people with motor impairment. Low accuracy and d...
详细信息
暂无评论