In this article, a novel method is proposed to facilitate the design of compact, low-profile, pattern reconfigurable antennas with fixed or switchable circular polarization (CP) for Internet of Vehicles (IoV) applicat...
详细信息
As internet use in communication networks has grown, fake news has become a big problem. The misleading heading of the news loses the trust of the reader. Many techniques have emerged, but they fail because fraudsters...
详细信息
Cloud Computing (CC) is widely adopted in sectors like education, healthcare, and banking due to its scalability and cost-effectiveness. However, its internet-based nature exposes it to cyber threats, necessitating ad...
详细信息
The increase in number of people using the Internet leads to increased cyberattack *** Persistent Threats,or APTs,are among the most dangerous targeted *** attacks utilize various advanced tools and techniques for att...
详细信息
The increase in number of people using the Internet leads to increased cyberattack *** Persistent Threats,or APTs,are among the most dangerous targeted *** attacks utilize various advanced tools and techniques for attacking targets with specific *** countries with advanced technologies,like the US,Russia,the UK,and India,are susceptible to this targeted *** is a sophisticated attack that involves multiple stages and specific ***,TTP(Tools,Techniques,and Procedures)involved in the APT attack are commonly new and developed by an attacker to evade the security ***,APTs are generally implemented in multiple *** one of the stages is detected,we may apply a defense mechanism for subsequent stages,leading to the entire APT attack *** detection at the early stage of APT and the prediction of the next step in the APT kill chain are ongoing *** survey paper will provide knowledge about APT attacks and their essential *** follows the case study of known APT attacks,which will give clear information about the APT attack process—in later sections,highlighting the various detection methods defined by different researchers along with the limitations of the *** used in this article comes from the various annual reports published by security experts and blogs and information released by the enterprise networks targeted by the attack.
In the realm of medical datasets, particularly when considering diabetes, the occurrence of data incompleteness is a prevalent issue. Unveiling valuable patterns through medical data analysis is crucial for early and ...
详细信息
In 2018, there were 1 million occurrences of non-melanoma cancer and 288,000 occurrences of malignant skin cancer (MM) recorded worldwide. Given the aging of the population and limited resources for medical care, a co...
详细信息
Agile methodology does not formally define the role of a project manager, and the Scrum methodology distributes this role among team members. However, the success of software development projects often depends heavily...
详细信息
Rice fields all across the world are affected by spikelet sterility, often known as rice spikelet's disease. It is characterized by the improper development of spikelet’s, which lowers grain output and quality. F...
详细信息
Antenna optimization using machine learning is a rapidly evolving field that leverages the power of artificial intelligence to design and improve antenna systems. Antenna optimization is a process of modifying antenna...
详细信息
Photovoltaic(PV)modules age with time for various reasons such as corroded joints and terminals and glass coating defects,and their ageing degrades the PV array *** the help of the PV array numerical model,this paper ...
详细信息
Photovoltaic(PV)modules age with time for various reasons such as corroded joints and terminals and glass coating defects,and their ageing degrades the PV array *** the help of the PV array numerical model,this paper explores the effects of PV module ageing on the PV array power,and the power gains and costs of rearranging and recabling aged PV modules in a PV *** numerical PV array model is first revised to account for module ageing,rearrangement and recabling,with the relevant equations presented *** updated numerical model is then used to obtain the array powers for seven different PV *** power results are then analysed in view of the attributes of the seven PV array examples.A guiding method to recommend recabling after rearranging aged modules is then proposed,leading to further significant power gains,while eliminating intra-row *** certain conditions are met,it was shown that recabling PV modules after rearranging them may lead to further significant power gains,reaching 57%and 98%in two considered PV array *** gains are possible in other arrays.A cost-benefit analysis weighing annual power gains versus estimated recabling costs is also given for the seven considered PV array examples to guide recabling decisions based on technical and economic *** the considered examples,recabling costs can be recovered in<4 *** with the powers of the aged arrays,power gains due to our proposed rearranging and recabling the PV arrays ranged between 73%and 131%in the considered examples—well over the gains reported in the ***,the cost of our static module rearrangement and recabling method outshines the costs of dynamic reconfiguration methods recently published in the literature.
暂无评论