Vehicle to Everything (V2X) is a core 5G technology. V2X and its enabler, Device-to-Device (D2D), are essential for the Internet of Things (IoT) and the Internet of Vehicles (IoV). V2X enables vehicles to communicate ...
详细信息
INTRODUCTION With the rapid development of remote sensing technology,high-quality remote sensing images have become widely *** automated object detection and recognition of these images,which aims to automatically loc...
INTRODUCTION With the rapid development of remote sensing technology,high-quality remote sensing images have become widely *** automated object detection and recognition of these images,which aims to automatically locate objects of interest in remote sensing images and distinguish their specific categories,is an important fundamental task in the *** provides an effective means for geospatial object monitoring in many social applications,such as intelligent transportation,urban planning,environmental monitoring and homeland security.
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate wi...
详细信息
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate with each *** one party refuses to do so,the channel is unstable.A stable channel is thus *** nodes may show uncooperative behavior,they may have a negative impact on the stability of such *** order to address this issue,this work proposes a dynamic evolutionary game model based on node *** model considers various defense strategies'cost and attack success ratio under *** can dynamically adjust their strategies according to the behavior of attackers to achieve their effective *** equilibrium stability of the proposed model can be *** proposed model can be applied to general channel *** is compared with two state-of-the-art blockchain channels:Lightning network and Spirit *** experimental results show that the proposed model can be used to improve a channel's stability and keep it in a good cooperative stable *** its use enables a blockchain to enjoy higher transaction success ratio and lower transaction transmission delay than the use of its two peers.
Spiking neural networks (SNNs) have gained sig-nificant attention as a promising framework in computational neuroscience and artificial intelligence, offering benefits such as low energy consumption and minimal memory...
详细信息
Because of the population of photography camera, human being could have photography equipment to take a picture became an easy task. However, to have a good photography is not an easy task. The basic of a good photo i...
详细信息
On-site warnings can decrease the range of late alert zone during earthquakes. This study develops a deep learning model to predict whether the maximum peak ground acceleration at a station exceeds 25 Gal based on the...
详细信息
With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,whic...
详细信息
With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,which makes task assignment inefficient due to insufficient *** this paper,an Intelligent and Trustworthy task assignment method based on Trust and Social relations(ITTS)is proposed for scenarios with many tasks and few ***,ITTS first makes initial assignments based on trust and social influences,thereby transforming the complex large-scale industrial task assignment of the platform into the small-scale task assignment for each ***,an intelligent Q-decision mechanism based on workers'social relation is proposed,which adopts the first-exploration-then-utilization principle to allocate *** when a worker cannot cope with the assigned tasks,it initiates dynamic worker recruitment,thus effectively solving the worker shortage problem as well as the cold start *** importantly,we consider trust and security issues,and evaluate the trust and social circles of workers by accumulating task feedback,to provide the platform a reference for worker recruitment,thereby creating a high-quality worker ***,extensive simulations demonstrate ITTS outperforms two benchmark methods by increasing task completion rates by 56.49%-61.53%and profit by 42.34%-47.19%.
Wireless network stability is critical for organizations. Most companies rely on a solid Internet connection for at least part of their day-to-day activities. It is essential to show the fast and high capacity of Wi-F...
详细信息
We used a Convolutional Neural network (CNN) to reconstruct the electromagnetic imaging of a perfect conductor in half-space through the traverse magnetic wave. Since the conventional iterative algorithm is time-consu...
详细信息
As one of the major threats to the current DeFi(Decentralized Finance)ecosystem,reentrant attack induces data inconsistency of the victim smart contract,enabling attackers to steal on-chain assets from DeFi projects,w...
详细信息
As one of the major threats to the current DeFi(Decentralized Finance)ecosystem,reentrant attack induces data inconsistency of the victim smart contract,enabling attackers to steal on-chain assets from DeFi projects,which could terribly do harm to the confidence of the blockchain ***,protecting DeFi projects from the reentrant attack is very difficult,since generating a call loop within the highly automatic DeFi ecosystem could be very *** researchers mainly focus on the detection of the reentrant vulnerabilities in the code testing,and no method could promise the non-existent of reentrant *** this paper,we introduce the database lock mechanism to isolate the correlated smart contract states from other operations in the same contract,so that we can prevent the attackers from abusing the inconsistent smart contract *** to the existing resolutions of front-running,code audit,andmodifier,our method guarantees protection resultswith better *** we further evaluate our method on a number of de facto reentrant attacks observed from *** results prove that our method could efficiently prevent the reentrant attack with less running cost.
暂无评论