The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile *** networks are sufficiently scaled to interconnect billions of users and *** i...
详细信息
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile *** networks are sufficiently scaled to interconnect billions of users and *** in academia and industry are focusing on technological advancements to achieve highspeed transmission,cell planning,and latency reduction to facilitate emerging applications such as virtual reality,the metaverse,smart cities,smart health,and autonomous *** continuously improves its network functionality to support these *** input multiple output(MIMO)technology offers spectral efficiency,dependability,and overall performance in *** article proposes a secure channel estimation technique in MIMO topology using a norm-estimation model to provide comprehensive insights into protecting NextG network components against adversarial *** technique aims to create long-lasting and secure NextG networks using this extended *** viability of MIMO applications and modern AI-driven methodologies to combat cybersecurity threats are explored in this ***,the proposed model demonstrates high performance in terms of reliability and accuracy,with a 20%reduction in the MalOut-RealOut-Diff metric compared to existing state-of-the-art techniques.
A language framework for determining the similarity of two snipped texts is proposed. The edit distance concept is employed as a frame algorithm to capture syntactic and semantic similarities. In the proposed work, sy...
详细信息
In this study, we presente digital solution for training master's students in engineeringsciences, using a bimodal learning approach at the Higher Institute of Technology of Bangui's University. This proposal...
详细信息
A virtual chatbot assistant is an interactive application designed to simulate human-like communication and respond to user inquiries promptly. It focuses on building an interesting user interface and putting simple c...
详细信息
Machine Learning Research often involves the use of diverse libraries, modules, and pseudocodes for data processing, cleaning, filtering, pattern recognition, and computer intelligence. Quantization of Effort Required...
详细信息
作者:
Gabr, MohamedKorayem, YousefChen, Yen-LinYee, Por LipKu, Chin SoonAlexan, Wassim
Faculty of Media Engineering and Technology Computer Science Department Cairo11835 Egypt National Taipei University of Technology
Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Malaya
Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Universiti Tunku Abdul Rahman
Department of Computer Science Kampar31900 Malaysia
Faculty of Information Engineering and Technology Communications Department Cairo11835 Egypt
New Administrative Capital Mathematics Department Cairo13507 Egypt
This work proposes a novel image encryption algorithm that integrates unique image transformation techniques with the principles of chaotic and hyper-chaotic systems. By harnessing the unpredictable behavior of the Ch...
详细信息
The exponential growth of academic publications has made scholarly research recommender systems indispensable tools for researchers. These systems rely on diverse evaluation metrics to assess their effectiveness and r...
详细信息
The task of identifying key skills from job vacancies descriptions is considered in the article. The source data consists of vacancy texts from the 'Jobs in Russia' portal, in which skill-related entities were...
详细信息
Wheat is the most important cereal crop,and its low production incurs import pressure on the *** fulfills a significant portion of the daily energy requirements of the human *** wheat disease is one of the major facto...
详细信息
Wheat is the most important cereal crop,and its low production incurs import pressure on the *** fulfills a significant portion of the daily energy requirements of the human *** wheat disease is one of the major factors that result in low production and negatively affects the national ***,timely detection of wheat diseases is necessary for improving *** CNN-based architectures showed tremendous achievement in the image-based classification and prediction of crop ***,these models are computationally expensive and need a large amount of training *** this research,a light weighted modified CNN architecture is proposed that uses eight layers particularly,three convolutional layers,three SoftMax layers,and two flattened layers,to detect wheat diseases *** high-resolution images were collected from the fields in Azad Kashmir(Pakistan)and manually annotated by three human *** convolutional layers use 16,32,and 64 *** filter uses a 3×3 kernel *** strides for all convolutional layers are set to *** this research,three different variants of datasets are *** variants S1-70%:15%:15%,S2-75%:15%:10%,and S3-80%:10%:10%(train:validation:test)are used to evaluate the performance of the proposed *** extensive experiments revealed that the S3 performed better than S1 and S2 datasets with 93%*** experiment also concludes that a more extensive training set with high-resolution images can detect wheat diseases more accurately.
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive...
详细信息
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive,and privacy-aware vehicular applications in Io V result in the transformation from cloud computing to edge computing,which enables tasks to be offloaded to edge nodes(ENs) closer to vehicles for efficient execution. In ITS environment,however, due to dynamic and stochastic computation offloading requests, it is challenging to efficiently orchestrate offloading decisions for application requirements. How to accomplish complex computation offloading of vehicles while ensuring data privacy remains challenging. In this paper, we propose an intelligent computation offloading with privacy protection scheme, named COPP. In particular, an Advanced Encryption Standard-based encryption method is utilized to implement privacy protection. Furthermore, an online offloading scheme is proposed to find optimal offloading policies. Finally, experimental results demonstrate that COPP significantly outperforms benchmark schemes in the performance of both delay and energy consumption.
暂无评论