This work suggests a brand-new 1*4 two-dimensional demultiplexer design based on multicore photonic crystal fiber. Numerical models show that the optical signals can be separated in a photonic crystal fiber constructi...
详细信息
In this paper, a multiband miniaturized crescent-shaped patch antenna with circular slots is presented for ultra-wideband applications. The proposed antenna is constructed on a Flame Retardant 4 (FR-4) dielectric subs...
详细信息
SHM is a very important process in terms of the safety and durability of infrastructure. Traditional SHM often faces problems detecting minor structural defects and handling large datasets. Therefore, certain more adv...
详细信息
Security, heterogeneity, and interoperability are the prominent concerns in wireless sensor networks (WSNs) with restricted amounts of resources such as energy, transmission range, and processing of packets. Moreover,...
详细信息
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the *** cookies are expl...
详细信息
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the *** cookies are exploited to carry client patterns observed by a *** client patterns facilitate the particular client’s future visit to the corresponding ***,security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the *** protocols have been introduced that maintain HTTP cookies,but many of those fail to achieve the required security,or require a lot of resource *** this article,we have introduced a lightweight Elliptic Curve Cryptographic(ECC)based protocol for authenticating client and server transactions to maintain the privacy and security of HTTP *** proposed protocol uses a secret key embedded within a *** proposed protocol ismore efficient and lightweight than related protocols because of its reduced computation,storage,and communication ***,the analysis presented in this paper confirms that proposed protocol resists various known attacks.
In order to forecast the run time of the jobs that were submitted, this research provides two linear regression prediction models that include continuous and categorical factors. A continuous predictor is built using ...
详细信息
Cardiovascular diseases (CVDs) persist as a primary cause of mortality on a global scale, necessitating effective prediction methods. This study presents a novel modelling approach utilizing the Self-Organizing Map (S...
详细信息
Diabetes is one of the most common diseases in Jordan. It is the main reason of death among Jordanian adult citizens. Worldwide, 48% of all deaths are due to Diabetes occurred before the age of 70 years. Hence, this r...
详细信息
When performing the simulation process, we encounter many systems that do not follow by their nature the uniform distribution adopted in the process of generating the random numbers necessary for the simulation proces...
详细信息
Deep learning-based approaches are applied successfully in manyfields such as deepFake identification,big data analysis,voice recognition,and image *** is the combination of deep learning in fake creation,which states c...
详细信息
Deep learning-based approaches are applied successfully in manyfields such as deepFake identification,big data analysis,voice recognition,and image *** is the combination of deep learning in fake creation,which states creating a fake image or video with the help of artificial intelligence for political abuse,spreading false information,and *** artificial intel-ligence technique has a wide demand,increasing the problems related to privacy,security,and *** paper has analyzed the features related to the computer vision of digital content to determine its *** method has checked the computer vision features of the image frames using the fuzzy clustering feature extraction *** the proposed deep belief network with loss handling,the manipulation of video/image is found by means of a pairwise learning *** proposed approach has improved the accuracy of the detection rate by 98%on various datasets.
暂无评论