Social media has grown to be an essential and significant aspect of our lives in the modern day. Due to the widespread usage of laptops, mobile phones, and other devices, individuals find it simpler to communicate wit...
详细信息
This article looks at the opportunities, application and challenges of 5G Wireless Communication Technologies and Internet of Things (IoT). A brief history from 1G to 5G is presented and the limitations of 4G and the ...
详细信息
ISBN:
(数字)9798331528713
ISBN:
(纸本)9798331528720
This article looks at the opportunities, application and challenges of 5G Wireless Communication Technologies and Internet of Things (IoT). A brief history from 1G to 5G is presented and the limitations of 4G and the introduction of 5G as a solution for problems with latency and speed. The paper also describes the 5G IoT concept, the architecture and advanced technologies with focus on different IoT applications such as smart agriculture and smart city. When speaking of aspects such as energy consumption, privacy and security concerns, as well as trade-offs strategies, it underlines how important collaboration is to achieve the benefits that the 5G IoT will bring. The paper itself provides a roadmap for next studies with a purpose of advancing development of the integrated, safe, and efficient wireless. As 5G Wireless Communication and IoT progresses the expectation is that it will enhance and revolutionalize several domains that will offer a scalable connectivity that is faster and more reliable. This join venture is believed to open new value adding opportunities for application in smart city, automobile, medical, industrial, robotic and so on several other fields. The term 5G IoT has also been used with the intention of establishing connections of several devices, very low latency and high degree of data rate for real time analysis and decision making.
Optical metasurfaces are engineered 2D electromagnetic structures enabling flat optical elements with properties not readily found in nature. Their unit cells, meta-atoms, usually are represented by a set of electric ...
详细信息
This paper addresses the topic of frequency regulation of a single-area power system connected to an electric vehicle (EV) aggregator over a non-ideal communication network. It is considered that the command control a...
详细信息
This paper addresses the topic of frequency regulation of a single-area power system connected to an electric vehicle (EV) aggregator over a non-ideal communication network. It is considered that the command control action is received by the EV aggregator with constant delay and the power system includes uncertain parameters. Due to the presence of uncertainties and the delay term, the frequency regulation problem is non-convex and hard to solve. The present approaches in the literature convert the non-convex control design problem into a convex problem with a set of Linear Matrix Inequalities (LMIs), which is conservative and in many cases results infeasibility. In this paper, an innovative iterative algorithm, called direct search, is employed for the time-delayed system to design the unknown parameters of a pre-assumed controller. The controller choice is not limited and various controllers' structures can be assumed. Without loss of generality, a proportional-integral (PI) controller is designed. The novel direct search algorithm can determine a feasible solution whenever at least one solution lays in the design space. Hence, by selecting a wide design space, we can anticipate that the PI controller guarantees closed-loop stability. Numerical simulations are carried out to demonstrate the performance of the developed controller compared to the state-of-the-art approach. IEEE
Wi-wireless networks are becoming more pervasive and are frequently the primary goal of malicious attackers. Therefore, it is miles crucial that wireless networks are nicely secured to defend their users from maliciou...
详细信息
Binary obfuscation is a very broad set of techniques widely employed in the context of code protection from piracy. However, it is also used for malicious goals, e.g. virus writers often employ obfuscation in order to...
Binary obfuscation is a very broad set of techniques widely employed in the context of code protection from piracy. However, it is also used for malicious goals, e.g. virus writers often employ obfuscation in order to evade signature-based antivirus detection. Thus, the ability to detect if an executable has been obfuscated is of paramount importance, as it allows to thwart the execution of potentially malicious code. The task of detection, however, is not easy, since many different obfuscating transformations exist and the alteration of an original code is not always easily detectable. In this paper, we want to shed light on the blurry task of obfuscation detection. We will look at this task through the brand new lenses of explainable artificial intelligence (XAI), in order to finally sharpen the obscure landscape of obfuscated software. Thanks to XAI we will be able to identify the relevant features altered by the transformating obfuscation as well as the invariant ones, that can be used for obfuscation-resistant malware signatures. We show our findings thanks to an evaluation with a dataset of obfuscated and non-obfuscated binaries, explaining the important features that lead to the detection of obfuscating transformations.
Breast cancer is one of the most common cancer types. This is the second-leading cause of cancer-related death in women. It ranked 2nd according to available data lung cancers is the only one causing more causalities....
详细信息
In this article,modified versions of variational iteration algorithms are presented for the numerical simulation of the diffusion of oil *** numerical examples are given to demonstrate the applicability and validity o...
详细信息
In this article,modified versions of variational iteration algorithms are presented for the numerical simulation of the diffusion of oil *** numerical examples are given to demonstrate the applicability and validity of the proposed *** obtained results are compared with the existing solutions,which reveal that the proposed methods are very effective and can be used for other nonlinear initial value problems arising in science and engineering.
This study proposes a novel nature-inspired meta-heuristic optimizer based on the Reptile Search Algorithm combed with Salp Swarm Algorithm for image segmentation using gray-scale multi-level thresholding,called *** p...
详细信息
This study proposes a novel nature-inspired meta-heuristic optimizer based on the Reptile Search Algorithm combed with Salp Swarm Algorithm for image segmentation using gray-scale multi-level thresholding,called *** proposed method introduces a better search space to find the optimal solution at each ***,we proposed RSA-SSA to avoid the searching problem in the same area and determine the optimal multi-level *** obtained solutions by the proposed method are represented using the image *** proposed RSA-SSA employed Otsu’s variance class function to get the best threshold values at each *** performance measure for the proposed method is valid by detecting fitness function,structural similarity index,peak signal-to-noise ratio,and Friedman ranking *** benchmark images of COVID-19 validate the performance of the proposed *** results showed that the proposed RSA-SSA outperformed other metaheuristics optimization algorithms published in the literature.
In this paper, the influence of the human body communication (HBC) channel conditions changes on Inductance Shift Keying (ISK-CC-HBC) is analyzed. In particular in ISK-CC-HBC, information is mapped by impedance change...
详细信息
ISBN:
(数字)9798350386394
ISBN:
(纸本)9798350386400
In this paper, the influence of the human body communication (HBC) channel conditions changes on Inductance Shift Keying (ISK-CC-HBC) is analyzed. In particular in ISK-CC-HBC, information is mapped by impedance change at the transmitter side through switching inductance between signal and ground electrode. To achieve maximum Euclidean distance between the constellation points, and consequently a low bit error rate (BER), correct inductance value is crucial. However, the state of the HBC channel varies depending on the person on which the communication takes place. Therefore, in this paper, the performance of the ISK-CC-HBC system was analyzed to determine the optimal inductance and BER for five persons of different ages and genders.
暂无评论