Human action recognition from aerial imagery poses significant challenges due to the dynamic nature of the scenes and the complexity of human movements. In this paper, we present an enhanced system that combines YOLO ...
详细信息
The Taiwanese livestock industry grapples with escalating costs and challenges such as labor shortages, environmental changes, pollution, and disease threats. Trade liberalization and cheaper imports further highlight...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network *** paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key ***,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use *** paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions.
Utilizing the multi-dimensional (MD) space for constellation shaping has been proven to be an effective approach for achieving shaping gains. Despite there exists a variety of MD modulation formats tailored for specif...
详细信息
This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactiv...
详细信息
This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactively reconfigure wireless environments to improve both sensing and communication(S&C) performance. First, we exploit a single IRS to enable wireless sensing in the base station's(BS's) non-line-of-sight(NLoS) area. In particular, we present three IRS-enabled NLoS target sensing architectures with fully-passive, semi-passive, and active IRSs, respectively. We compare their pros and cons by analyzing the fundamental sensing performance limits for target detection and parameter estimation. Next, we consider a single IRS to facilitate integrated sensing and communication(ISAC), in which the transmit signals at the BS are used for achieving both S&C functionalities, aided by the IRS through reflective beamforming. We present joint transmit signal and receiver processing designs for realizing efficient ISAC, and jointly optimize the transmit beamforming at the BS and reflective beamforming at the IRS to balance the fundamental performance tradeoff between S&C. Furthermore, we discuss multi-IRS networked ISAC, by particularly focusing on multi-IRS-enabled multi-link ISAC, multi-region ISAC, and ISAC signal routing, respectively. Finally, we highlight various promising research topics in this area to motivate future work.
Recent data-intensive applications encounter memory wall bottlenecks in the traditional processor-centric computing architecture due to the need for frequent and extensive off-chip data movement. The emerging 3D-enabl...
详细信息
Background: Cloud services have become a popular approach for offering efficient services for a wide range of activities. Predicting hardware failures in a cloud data center can minimize downtime and make the system m...
详细信息
During the unprecedented expansion of global data, efficient storage solutions are essential for processing massive datasets stored on modern storage devices. B-epsilon-tree (Bϵ-tree) is one of the most well-known tec...
详细信息
Explainable artificial intelligence is beneficial in converting opaque machine learning models into transparent ones and outlining how each one makes decisions in the healthcare industry. To comprehend the variables t...
详细信息
The images captured under varying illumination or adverse weather conditions exhibit distinct distributions in the high-dimensional feature space, hindering the performance of object detection networks. To address thi...
详细信息
暂无评论