Cloud computing (CC) is vulnerable to existing information technology attacks, since it extends and utilizes information technology infrastructure, applications and typical operating systems. In this manuscript, an En...
详细信息
Decentralized Finance (DeFi) has been gaining rising importance due to advanced blockchain technology and web3.0. Consequently, many decentralized finance applications (DeFi apps) have emerged, which aim to reconstruc...
详细信息
Protests are a vital form of public expression, often reflecting collective dissent towards specific policies or injustices. In recent years, the significance of protests as a medium for public opinion has escalated, ...
详细信息
The exponential growth of data and increased reliance on interconnected systems have heightened the need for robust network security. Cyber-Attack Detection Systems (CADS) are essential for identifying and mitigating ...
详细信息
To alleviate the greenhouse effect and maintain the sustainable development, it is of great significance to find an efficient and low-cost catalyst to reduce carbon dioxide(CO_(2)) and generate formic acid(FA). In thi...
详细信息
To alleviate the greenhouse effect and maintain the sustainable development, it is of great significance to find an efficient and low-cost catalyst to reduce carbon dioxide(CO_(2)) and generate formic acid(FA). In this work, based on the first-principles calculation, the catalytic performance of a single transition metal(TM)(TM = Cr, Mn, Fe, Co, Ni, Cu, Zn,Ru, Rh, Pd, Ag, Cd, Ir, Pt, Au, or Hg) atom anchored on C_(9)N_(4) monolayer(TM@C_(9)N_(4)) for the hydrogenation of CO_(2) to FA is calculated. The results show that single TM atom doping in C_(9)N_(4) can form a stable TM@C_(9)N_(4) structure, and Cu@C_(9)N_(4) and Co@C_(9)N_(4) show better catalytic performance in the process of CO_(2) hydrogenation to FA(the corresponding maximum energy barriers are 0.41 eV and 0.43 e V, respectively). The partial density of states(PDOS), projected crystal orbital Hamilton population(p COHP), difference charge density analysis and Bader charge analysis demonstrate that the TM atom plays an important role in the reaction. The strong interaction between the 3d orbitals of the TM atom and the non-bonding orbitals(1πg) of CO_(2) allows the reaction to proceed under mild conditions. In general, our results show that Cu@C_(9)N_(4) and Co@C_(9)N_(4) are a promising single-atom catalyst and can be used as the non-precious metals electrocatalyst for CO_(2) hydrogenation to formic acid.
Recent advancements in medical image analysis have harnessed the potential of deep learning, especially in diagnosing thoracic ailments using chest X-ray (CXR) images. This study introduces a novel approach to detecti...
详细信息
The healthcare sector is growing quickly, making it a complex system. At the same time, fraud in this sector is becoming a serious issue. Misuse of the medical insurance systems is one of the problems. The automated d...
详细信息
Software-Defined Network(SDN)decouples the control plane of network devices from the data *** alleviating the problems presented in traditional network architectures,it also brings potential security risks,particularl...
详细信息
Software-Defined Network(SDN)decouples the control plane of network devices from the data *** alleviating the problems presented in traditional network architectures,it also brings potential security risks,particularly network Denial-of-Service(DoS)*** many research efforts have been devoted to identifying new features for DoS attack detection,detection methods are less accurate in detecting DoS attacks against client hosts due to the high stealth of such *** solve this problem,a new method of DoS attack detection based on Deep Factorization Machine(DeepFM)is proposed in ***,we select the Growth Rate of Max Matched Packets(GRMMP)in SDN as detection ***,the DeepFM algorithm is used to extract features from flow rules and classify them into dense and discrete features to detect DoS *** training,the model can be used to infer whether SDN is under DoS attacks,and a DeepFM-based detection method for DoS attacks against client host is *** results show that our method can effectively detect DoS attacks in *** with the K-Nearest Neighbor(K-NN),Artificial Neural Network(ANN)models,Support Vector Machine(SVM)and Random Forest models,our proposed method outperforms in accuracy,precision and F1 values.
This paper aims to enhance the efficiency of wireless sensor networks (WSNs) within an area of interest (AOI) by optimizing duty cycles. Focusing on a specific AOI divided into clusters, each with a dynamically select...
详细信息
The accuracy and security of a biometric system are the two sides of a coin. A biometric system must be simple, flexible, efficient, and secure enough from unauthorized access. Concerning these requirements, this arti...
详细信息
暂无评论