Low-light image enhancement is highly desirable for outdoor image processing and computer vision applications. Research conducted in recent years has shown that images taken in low-light conditions often pose two main...
详细信息
In recent times, the system's mathematical expression and operation have gained greater reach in engineering and mathematics. It is vital to solving more complex expressions and equations in a short time. The most...
详细信息
As internet use in communication networks has grown, fake news has become a big problem. The misleading heading of the news loses the trust of the reader. Many techniques have emerged, but they fail because fraudsters...
详细信息
The microphysical structure of rain has a significant impact on the quality of radio signal transmission in the upcoming deployment of 5G millimetre-wave wireless communications in South Africa. To address this, mitig...
详细信息
The increase in number of people using the Internet leads to increased cyberattack *** Persistent Threats,or APTs,are among the most dangerous targeted *** attacks utilize various advanced tools and techniques for att...
详细信息
The increase in number of people using the Internet leads to increased cyberattack *** Persistent Threats,or APTs,are among the most dangerous targeted *** attacks utilize various advanced tools and techniques for attacking targets with specific *** countries with advanced technologies,like the US,Russia,the UK,and India,are susceptible to this targeted *** is a sophisticated attack that involves multiple stages and specific ***,TTP(Tools,Techniques,and Procedures)involved in the APT attack are commonly new and developed by an attacker to evade the security ***,APTs are generally implemented in multiple *** one of the stages is detected,we may apply a defense mechanism for subsequent stages,leading to the entire APT attack *** detection at the early stage of APT and the prediction of the next step in the APT kill chain are ongoing *** survey paper will provide knowledge about APT attacks and their essential *** follows the case study of known APT attacks,which will give clear information about the APT attack process—in later sections,highlighting the various detection methods defined by different researchers along with the limitations of the *** used in this article comes from the various annual reports published by security experts and blogs and information released by the enterprise networks targeted by the attack.
Fog computing extends cloud capabilities to the network edge, aiding IoT and users. It mitigates cloud issues like latency and reliability. However, fog’s limited resources pose security vulnerabilities like data the...
详细信息
In the realm of medical datasets, particularly when considering diabetes, the occurrence of data incompleteness is a prevalent issue. Unveiling valuable patterns through medical data analysis is crucial for early and ...
详细信息
Photovoltaic(PV)modules age with time for various reasons such as corroded joints and terminals and glass coating defects,and their ageing degrades the PV array *** the help of the PV array numerical model,this paper ...
详细信息
Photovoltaic(PV)modules age with time for various reasons such as corroded joints and terminals and glass coating defects,and their ageing degrades the PV array *** the help of the PV array numerical model,this paper explores the effects of PV module ageing on the PV array power,and the power gains and costs of rearranging and recabling aged PV modules in a PV *** numerical PV array model is first revised to account for module ageing,rearrangement and recabling,with the relevant equations presented *** updated numerical model is then used to obtain the array powers for seven different PV *** power results are then analysed in view of the attributes of the seven PV array examples.A guiding method to recommend recabling after rearranging aged modules is then proposed,leading to further significant power gains,while eliminating intra-row *** certain conditions are met,it was shown that recabling PV modules after rearranging them may lead to further significant power gains,reaching 57%and 98%in two considered PV array *** gains are possible in other arrays.A cost-benefit analysis weighing annual power gains versus estimated recabling costs is also given for the seven considered PV array examples to guide recabling decisions based on technical and economic *** the considered examples,recabling costs can be recovered in<4 *** with the powers of the aged arrays,power gains due to our proposed rearranging and recabling the PV arrays ranged between 73%and 131%in the considered examples—well over the gains reported in the ***,the cost of our static module rearrangement and recabling method outshines the costs of dynamic reconfiguration methods recently published in the literature.
In 2018, there were 1 million occurrences of non-melanoma cancer and 288,000 occurrences of malignant skin cancer (MM) recorded worldwide. Given the aging of the population and limited resources for medical care, a co...
详细信息
The surge in online activities has led to the increasing popularity of sharing video data across diverse applications, including online education tutorials, social networking, video calling, and OTT platforms. Encrypt...
详细信息
暂无评论