This paper investigates a security problem of simultaneously addressing two types of attacks:Eavesdropping and *** authors model the target system as a discrete-event system(DES)with subsets of concealable events and ...
详细信息
This paper investigates a security problem of simultaneously addressing two types of attacks:Eavesdropping and *** authors model the target system as a discrete-event system(DES)with subsets of concealable events and protectable events,in order to make the proposed methodology applicable to various practical systems and employ two existing works of DES security:Degree of opacity and state ***,the authors consider that all protectable events are observable,and some observable events are *** addition,protectable events cannot be protected once they are *** such a constraint,the goal is to figure out which events to conceal and which transitions to protect so that the prescribed requirements of degree of opacity and state protection are *** this work the authors decide which events to conceal as all transitions of a given event label are concealed or not *** proposed problem formulation also requires a solution to only involve absolutely necessary protectable events in order for the system to avoid superfluous protection *** authors first examine a general version of our security problem with an intuitive algorithm to compute acceptable solutions,and then present a special version which results in a reduced computation time compared to the general version.
In response to the growing complexity of Deep Neural Network (DNN) models, the paradigm of approximate computing has emerged as a compelling approach to strike a balance between computational efficiency and model accu...
详细信息
This paper presents a simulation study on integrating grid-connected photovoltaic (PV) systems with a potential to implement battery storage in residential settings. It analyses the performance and feasibility of such...
详细信息
The phishing problem poses a significant threat in modern information systems, putting both individuals and businesses at risk of financial and professional harm. Owing to social media's rapid development and wide...
详细信息
Remote intelligence in the application of robotics and the autonomous system relies heavily on seamless wireless connections. The 5G mobile network technology meets traditional manufacturing enterprises' applicati...
详细信息
Remote intelligence in the application of robotics and the autonomous system relies heavily on seamless wireless connections. The 5G mobile network technology meets traditional manufacturing enterprises' application requirements for wireless networks based on robot transformation and upgrading, robot interconnection, and remote interactive applications in production. However, there exists many challenging 5G communication issues, such as different communication protocols in the system varies with different robots and no dis-ruptive changes to the physical layer.
Heart disease is the highest cause of death in the world. Arrhythmia is an abnormality in the rhythm of the heartbeat. The heart beats too fast, too slow, or irregularly. Arrhythmias are not always dangerous, e.g., so...
详细信息
Benefited from their flexibility and on-demand deployment capability, unmanned aerial vehicles (UAVs) have emerged as critical aerial communication platforms in future Internet of Vehicles (IoV). However, limited spec...
详细信息
This study presents an edge-based system for underwater image enhancement using CLAHE and its fusion with various techniques. Utilizing the NVIDIA Jetson Orin Nano and the Streamlit framework, the system processes ima...
详细信息
Reliability, efficiency and continuity of power energy supplied is an area which receives increasing attention as the main infrastructure of power transmission and distribution systems in many countries is ageing. Hot...
详细信息
The network switches in the data plane of Software Defined Networking (SDN) are empowered by an elementary process, in which enormous number of packets which resemble big volumes of data are classified into specific f...
详细信息
The network switches in the data plane of Software Defined Networking (SDN) are empowered by an elementary process, in which enormous number of packets which resemble big volumes of data are classified into specific flows by matching them against a set of dynamic rules. This basic process accelerates the processing of data, so that instead of processing singular packets repeatedly, corresponding actions are performed on corresponding flows of packets. In this paper, first, we address limitations on a typical packet classification algorithm like Tuple Space Search (TSS). Then, we present a set of different scenarios to parallelize it on different parallel processing platforms, including Graphics Processing Units (GPUs), clusters of Central Processing Units (CPUs), and hybrid clusters. Experimental results show that the hybrid cluster provides the best platform for parallelizing packet classification algorithms, which promises the average throughput rate of 4.2 Million packets per second (Mpps). That is, the hybrid cluster produced by the integration of Compute Unified Device Architecture (CUDA), Message Passing Interface (MPI), and OpenMP programming model could classify 0.24 million packets per second more than the GPU cluster scheme. Such a packet classifier satisfies the required processing speed in the programmable network systems that would be used to communicate big medical data.
暂无评论