Early detection of any disease and starting its treatment in this early stage are the most important steps in case of any life-threatening disease. Stroke is not an exception in this regard which is one of the leading...
详细信息
Human pose estimation aims at locating the specific joints of humans from the images or videos. While existing deep learning-based methods have achieved high positioning accuracy, they often struggle with generalizati...
详细信息
As the use of big data and its potential benefits become more widespread, public and private organizations around the world have realized the imperative of incorporating comprehensive and robust technologies into thei...
详细信息
In DC distributed power systems(DPSs),the complex impedance interactions possibly lead to DC bus voltage oscillation or *** previous research,the stability analysis of DPSs is implemented based on mathematical analysi...
详细信息
In DC distributed power systems(DPSs),the complex impedance interactions possibly lead to DC bus voltage oscillation or *** previous research,the stability analysis of DPSs is implemented based on mathematical analysis in control *** specific mechanisms of the instability of the cascade system have not been intuitively *** this paper,the stability analysis of DPSs based on the traditional Nyquist criterion is simplified to the resonance analysis of the seriesconnected port impedance(Z=R+jX)of source and load *** reveals that the essential reason for impedance instability of a DC cascade system is that the negative damping characteristic(R<0)of the port the overall impedance amplifies the internal resonance source at reactance zero-crossing *** simplified stability criterion for DC cascade systems can be concluded as:in the negative damping frequency ranges(R<0),there exists no zero-crossing point of the reactance component(i.e.,X=0).According to the proposed stability criterion,the oscillation modes of cascade systems are classified.A typical one is the internal impedance instability excited by the negative damping,and the other one is that the external disturbance amplified by negativity in a low stability ***,the impedance reshaping method for stability improvement of the system can be further *** validity of the simplified criterion is verified theoretically and experimentally by a positive damping reshaping method.
Video forgery detection has been necessary with recent spurt in fake videos like Deepfakes and doctored videos from multiple video capturing devices. In this paper, we provide a novel technique of detecting fake video...
详细信息
Due to the increasing prominence of social network services, political communication has experienced a paradigm shift. To communicate with internet users, politicians, candidates, and political organizations create fa...
详细信息
information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data commu...
详细信息
information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data communication across various ***,IoT devices,typically low-powered,are susceptible to cyber ***,blockchain has emerged as a robust solution to secure these devices due to its decentralised ***,the fusion of blockchain and IoT technologies is challenging due to performance bottlenecks,network scalability limitations,and blockchain-specific security ***,on the other hand,is a recently emerged information security solution that has great potential to secure low-powered IoT *** study aims to identify blockchain-specific vulnerabilities through changes in network behaviour,addressing a significant research gap and aiming to mitigate future cybersecurity *** blockchain and IoT technologies presents challenges,including performance bottlenecks,network scalability issues,and unique security *** paper analyses potential security weaknesses in blockchain and their impact on network *** developed a real IoT test system utilising three prevalent blockchain applications to conduct *** results indicate that Distributed Denial of Service(DDoS)attacks on low-powered,blockchain-enabled IoT sensor networks cause measurable anomalies in network and device performance,specifically:(1)an average increase in CPU core usage to 34.32%,(2)a reduction in hash rates by up to 66%,(3)an increase in batch timeout by up to 14.28%,and(4)an increase in block latency by up to 11.1%.These findings suggest potential strategies to counter future DDoS attacks on IoT networks.
In recent times, drastic climate changes have caused a substantial increase in the growth of crop diseases. This causes large-scale demolition of crops, decreases cultivation, and eventually leads to the financial los...
详细信息
In this work, the SHA-256 mapper of the blockchain has been utilized to secure medical data from brute-force attacks. The uniform distribution and lower correlation of the encrypted data are achieved using the multi-c...
详细信息
Intermittent deep neural network (DNN) inference is a promising technique to enable intelligent applications on tiny devices powered by ambient energy sources. Nonetheless, intermittent execution presents inherent cha...
详细信息
暂无评论