The paper presents the implementation of a Switched Capacitor Power Amplifier (SCPA) to be integrated into a Narrowband Internet of Things (NB-IoT) Transceiver. The SCPA is designed to operate at a frequency of 0.9GHz...
详细信息
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ...
详细信息
Among various power system disturbances,cascading failures are considered the most serious and extreme threats to grid operations,potentially leading to significant stability issues or even widespread power *** power ...
详细信息
Among various power system disturbances,cascading failures are considered the most serious and extreme threats to grid operations,potentially leading to significant stability issues or even widespread power *** power systems’behaviors during cascading failures is of great importance to comprehend how failures originate and propagate,as well as to develop effective preventive and mitigative control *** intricate mechanism of cascading failures,characterized by multi-timescale dynamics,presents exceptional challenges for their *** paper provides a comprehensive review of simulation models for cascading failures,providing a systematic categorization and a comparison of these *** challenges and potential research directions for the future are also discussed.
Melanoma is the deadliest form of skin cancer,with an increasing incidence over recent *** the past decade,researchers have recognized the potential of computer vision algorithms to aid in the early diagnosis of *** a...
详细信息
Melanoma is the deadliest form of skin cancer,with an increasing incidence over recent *** the past decade,researchers have recognized the potential of computer vision algorithms to aid in the early diagnosis of *** a result,a number of works have been dedicated to developing efficient machine learning models for its accurate classification;still,there remains a large window for improvement necessitating further research *** of the existing methods include lower accuracy and high computational complexity,which may be addressed by identifying and selecting the most discriminative features to improve classification *** this work,we apply transfer learning to a Nasnet-Mobile CNN model to extract deep features and augment it with a novel nature-inspired feature selection algorithm called Mutated Binary Artificial Bee *** selected features are fed to multiple classifiers for final *** use PH2,ISIC-2016,and HAM10000 datasets for experimentation,supported by Monte Carlo simulations for thoroughly evaluating the proposed feature selection *** carry out a detailed comparison with various benchmark works in terms of convergence rate,accuracy histogram,and reduction percentage histogram,where our method reports 99.15%(2-class)and 97.5%(3-class)accuracy on the PH^(2) dataset,while 96.12%and 94.1%accuracy for the other two datasets,respectively,against minimal features.
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based...
详细信息
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based intrusion detection systems can capture complex network behaviours,their“black-box”nature often limits trust and actionable insight for security *** study introduces a novel approach that integrates Explainable Artificial Intelligence—xAI—with the Random Forest classifier to derive human-interpretable rules,thereby enhancing the detection of Distributed Denial of Service(DDoS)*** proposed framework combines traditional static rule formulation with advanced xAI techniques—SHapley Additive exPlanations and Scoped Rules-to extract decision criteria from a fully trained *** methodology was validated on two benchmark datasets,CICIDS2017 and *** rules were evaluated against conventional Security Information and Event Management systems rules with metrics such as precision,recall,accuracy,balanced accuracy,and Matthews Correlation *** results demonstrate that xAI-derived rules consistently outperform traditional static ***,the most refined xAI-generated rule achieved near-perfect performance with significantly improved detection of DDoS traffic while maintaining high accuracy in classifying benign traffic across both datasets.
This paper explores strategies for accelerating the research and development (R&D) process through in-house pre-compliance testing in a dedicated laboratory. The focus is on conducting electromagnetic compatibilit...
详细信息
This paper considers the problem of constructing finite-dimensional state space realizations for stochastic processes that can be represented as the outputs of a certain type of a causal system driven by a continuous ...
详细信息
Determining electromagnetic (EM) coupling to printed circuit boards (PCBs) is essential to finding potential EM susceptibilities early in the design process. For realistic PCB structures, analysis usually relies heavi...
详细信息
In order to support the learning of novice students in Java programming, the web-based Java Programming Learning Assistant System (JPLAS) has been developed. JPLAS offers several types of exercise problems to foster c...
详细信息
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the *** technology has been widely used and has developed rapidly in big data systems across ...
详细信息
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the *** technology has been widely used and has developed rapidly in big data systems across various *** increasing number of users are participating in application systems that use blockchain as their underlying *** the number of transactions and the capital involved in blockchain grow,ensuring information security becomes *** the verification of transactional information security and privacy has emerged as a critical ***-based verification methods can effectively eliminate the need for centralized third-party ***,the efficiency of nodes in storing and verifying blockchain data faces unprecedented *** address this issue,this paper introduces an efficient verification scheme for transaction ***,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all ***,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous *** analyses and simulation experiments conclusively demonstrate the superior performance of this *** verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional *** findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of *** scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.
暂无评论