Various mobile devices and applications are now used in daily *** devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G mobile...
详细信息
Various mobile devices and applications are now used in daily *** devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G mobile ***-security cryptography guarantees that essential data can be transmitted securely;however,it increases energy consumption and reduces data processing ***,this study proposes a low-energy data encryption(LEDE)algorithm based on the Advanced Encryption Standard(AES)for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things(IoT)*** the proposed LEDE algorithm,the system time parameter is employed to create a dynamic S-Box to replace the static S-Box of *** indicated that six-round LEDE encryption achieves the same security level as 10-round conventional AES *** reduction in encryption time results in the LEDE algorithm having a 67.4%lower energy consumption and 43.9%shorter encryption time than conventional AES;thus,the proposed LEDE algorithm can improve the performance and the energy consumption of IoT edge devices.
Clustering strategies for reducing the energy consumption and extending the network life have been employed widely in Wireless Sensor Network (WSN). The clustering mechanism can extend the network’s service life and ...
详细信息
The convergence of flying objects, Mobile Ad Hoc Networks (MANETs), and Wireless Sensor Networks (WSNs) has been made feasible by the widespread proliferation of wireless communication technology. This study delves in...
详细信息
As big data,Artificial Intelligence,and Vehicle-to-Everything(V2X)communication have advanced,Intelligent Transportation Systems(ITS)are being developed to enable efficient and safe transportation *** Toll Collection(...
详细信息
As big data,Artificial Intelligence,and Vehicle-to-Everything(V2X)communication have advanced,Intelligent Transportation Systems(ITS)are being developed to enable efficient and safe transportation *** Toll Collection(ETC),which is one of the services included in ITS systems,is an automated system that allows vehicles to pass through toll plazas without stopping for manual *** ETC system is widely deployed on highways due to its contribution to stabilizing the overall traffic system *** ensure secure and efficient toll payments,designing a distributed model for sharing toll payment information among untrusted toll service providers is ***,the current ETC system operates under a centralized ***,both toll service providers and toll plazas know the toll usage history of *** raises concerns about revealing the entire driving routes and patterns of *** address these issues,blockchain technology,suitable for secure data management and data sharing in distributed systems,is being applied to the ETC *** enables efficient and transparent management of ETC ***,the public nature of blockchain poses a challenge where users’usage records are exposed to all *** tackle this,we propose a blockchain-based toll ticket model named AnonymousTollPass that considers the privacy of *** proposed model utilizes traceable ring signatures to provide unlinkability between tickets used by a vehicle and prevent the identity of the vehicle using the ticket from being identified among the ring members for the ***,malicious vehicles’identities can be traced when they attempt to reuse *** conducting simulations,we show the effectiveness of the proposed model and demonstrate that gas fees required for executing the proposed smart contracts are only 10%(when the ring size is 50)of the fees required in previous studies.
Cervical cancer remains the top killer of women at a young age in the world, 85% of cases are detected in low-income countries. Preventive measures and therapeutic response are enhanced if potential hazards are identi...
详细信息
Orthogonal frequency-division multiplexing(OFDM) has been developed into a popular modulation scheme for wireless communication systems, used in applications such as LTE and 5 G. In wireless communication systems, non...
详细信息
Orthogonal frequency-division multiplexing(OFDM) has been developed into a popular modulation scheme for wireless communication systems, used in applications such as LTE and 5 G. In wireless communication systems, nonlinearity caused by radio frequency(RF)amplifiers will generate distortions to both passband and adjacent channels such that the transmission quality is degraded. The study of this article aims to predict the power spectrum for OFDM based signals at the output of an RF amplifier due to the nonlinearity. In this article,based on Taylor polynomial coefficients, a power spectrum expression for amplified OFDM signals in terms of intercept points(up to nth-order) is derived. This model is useful to RF engineers in choosing and testing RF amplifiers with appropriate specifications, such as intercept points and gain, to meet the requirements of wireless standards. Measurements are carried out to confirm the results of the proposed model.
In the last decade, due to the widespread and inexpensive availability of digital video cameras, digital videos (DV) are employed for security purposes daily, and they are generally regarded as a more credible form of...
详细信息
In the last decade, due to the widespread and inexpensive availability of digital video cameras, digital videos (DV) are employed for security purposes daily, and they are generally regarded as a more credible form of evidence than still photographs. Due to the tremendous growth of video editing tools, anyone with access to advanced editing software and a modern Smartphone can easily do digital video manipulations and fake it. As a result, to utilize video content as proof in court, it is necessary to evaluate and determine whether it is original or modified. To check the integrity and validity of video recordings, digital forgery detection techniques are required. The objective of the study is to present a systematic review of techniques for detecting forgery in digital videos. We conducted a systematic literature review (SLR) in this study to present a detailed review of the initial and recent research efforts in Digital video forgery detection, summarizing 260 relevant papers from 2000 to 2023 that have presented a variety of techniques. For analysis, we have presented our references in three different ways: according to the type of forgery detected, according to the type of model or technique used and according to the feature used for forgery detection. We look through the several datasets that are cited in articles and determine their applicable domain. Then, we looked at the numerous measuring metrics employed by different research papers and compared the effectiveness of deep and non-deep models in each category of forgery that was found. Finally, research gaps concerning passive video forgery detection are classified and highlighted. A comparison between our survey and other existing survey articles has been presented in the paper. Researchers who wish to work on video forgery detection will get assistance to determine what kind of efforts in forgery detection work is still required. This survey will also help to select techniques and features based on their
The progress in technology has provided opportunities for innovative solutions to intricate challenges. One possible method is employing reinforcement learning to model flying trajectories in intricate environments. G...
详细信息
ISBN:
(纸本)9798331530938
The progress in technology has provided opportunities for innovative solutions to intricate challenges. One possible method is employing reinforcement learning to model flying trajectories in intricate environments. Game development is a discipline that involves intricate reasoning and dynamic interplay between the user and the game environment. By employing several gaming engines, developers are now able to replicate real-life situations through the implementation of diverse machine learning methods. Aircraft simulation in game creation using reinforcement learning involves creating a visual depiction of real-life settings where aircraft may navigate complex environments without direct input from a human user. Currently, reinforcement learning is not widely applied in game development, particularly in simulation-based path finding techniques. This algorithm approaches possess the efficacy and capacity to generate sophisticated neural networks capable of directing an agent to do certain tasks. The aim of this project is to create aircraft simulations for game development by utilizing reinforcement-learning techniques, so that it can provide a foundational idea of the usage of this algorithm in path-detection based decision-making techniques. The goal is to demonstrate the effectiveness of reinforcement learning in a real-world scenario, where the aircraft independently assesses and selects its flying trajectory. The system will undergo testing in three distinct phases, involving the utilization of Blender3D, Unity 3D, and Anaconda prompts. The results will then be compared using TensorFlow. Several training sessions will be conducted in various environments using the Anaconda environment to optimize the outcomes. In the latter stages of development, a dynamic user interface will be implemented to enhance the user's experience. The method is anticipated to produce 152% improved AI-trained data, which can be utilized for constructing extensive simulation and game-proj
This paper investigates a novel engineering problem,i.e.,security-constrained multi-period operation of micro energywater *** problem is computationally challenging because of its high nonlinearity,nonconvexity,and la...
详细信息
This paper investigates a novel engineering problem,i.e.,security-constrained multi-period operation of micro energywater *** problem is computationally challenging because of its high nonlinearity,nonconvexity,and large *** propose a two-stage iterative algorithm employing a hybrid physics and data-driven contingency filtering(CF)method and convexification to solve *** convexified master problem is solved in the first stage by considering the base case operation and binding contingencies set(BCS).The second stage updates BCS using physics-based data-driven methods,which include dynamic and filtered data *** method is faster than existing CF methods because it relies on offline optimization problems and contains a limited number of online optimization *** validate effectiveness of the proposed method using two different case studies:the IEEE 13-bus power system with the EPANET 8-node water system and the IEEE 33-bus power system with the Otsfeld 13-node water system.
In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two *** kinds of networks are called bridge networks which are utilized in interconnection networks of P...
详细信息
In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two *** kinds of networks are called bridge networks which are utilized in interconnection networks of PC,portable networks,spine of internet,networks engaged with advanced mechanics,power generation interconnection,bio-informatics and substance intensify *** number that can be entirely calculated by a graph is called graph *** mathematical graph invariants have been portrayed and utilized for connection investigation during the latest twenty ***,no trustworthy evaluation has been embraced to pick,how much these invariants are associated with a network graph or subatomic *** this paper,it will discuss three unmistakable varieties of bridge networks with an incredible capacity of assumption in the field of computerscience,chemistry,physics,drug industry,informatics and arithmetic in setting with physical and manufactured developments and networks,since Contraharmonic-quadratic invariants(CQIs)are recently presented and have different figure qualities for different varieties of bridge graphs or *** study settled the geography of bridge graphs/networks of three novel sorts with two kinds of CQI and Quadratic-Contraharmonic Indices(QCIs).The deduced results can be used for the modeling of the above-mentioned networks.
暂无评论