The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate wi...
详细信息
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate with each *** one party refuses to do so,the channel is unstable.A stable channel is thus *** nodes may show uncooperative behavior,they may have a negative impact on the stability of such *** order to address this issue,this work proposes a dynamic evolutionary game model based on node *** model considers various defense strategies'cost and attack success ratio under *** can dynamically adjust their strategies according to the behavior of attackers to achieve their effective *** equilibrium stability of the proposed model can be *** proposed model can be applied to general channel *** is compared with two state-of-the-art blockchain channels:Lightning network and Spirit *** experimental results show that the proposed model can be used to improve a channel's stability and keep it in a good cooperative stable *** its use enables a blockchain to enjoy higher transaction success ratio and lower transaction transmission delay than the use of its two peers.
The success of Internet of Things (IoT) services will be determined by how the security of the IoT devices and the networks to which they are connected can be guaranteed. Integrating biometric recognition technology i...
详细信息
A three-phase three-wire LCL grid-connected inverter is usually used as an interface between renewable-energy sources and grid. However, grid voltage is always distorted and results in grid-current distortion when the...
详细信息
Photovoltaic arrays receive varying levels of solar radiation due to factors such as shadows created by clouds, surrounding buildings, and other obstructions. Therefore, an effective Maximum Power Point Tracking (MPPT...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Securi...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Security (PLS). Ensuring data confidentiality and integrity during wireless communications poses a primary challenge in IoT environments. Additionally, within the constrained frequency bands available, Cognitive Radio Networks (CRNs) has emerged as an urgent necessity to optimize spectrum utilization. This technology enables intelligent management of radio frequencies, enhancing network efficiency and adaptability to dynamic environmental changes. In this research, we focus on examining the PLS for the primary channel within the underlying CRNs. Our proposed model involves a primary source-destination pair and a secondary transmitter-receiver pair sharing the same frequency band simultaneously. In the presence of a common eavesdropper, the primary concern lies in securing the primary link communication. The secondary user (SU) acts as cooperative jamming, strategically allocating a portion of its transmission power to transmit artificial interference, thus confusing the eavesdropper and protecting the primary user's (PU) communication. The transmit power of the SU is regulated by the maximum interference power tolerated by the primary network's receiver. To evaluate the effectiveness of our proposed protocol, we develop closed-form mathematical expressions for intercept probability ((Formula presented.)) and outage probability (OP) along the primary communication link. Additionally, we derive mathematical expressions for OP along the secondary communications network. Furthermore, we investigate the impact of transmit power allocation on intercept and outage probabilities across various links. Through both simulation and theoretical analysis, our protocol aims to enhance protection and outage efficiency for the primary link while ensuring appropriate secondary
The formation of 2D lateral heterostructures in rippled MoS2 and similar transition metal dichalcogenides (TMDs) is studied using density functional theory. Compression of rippled TMDs beyond a threshold compression l...
详细信息
The formation of 2D lateral heterostructures in rippled MoS2 and similar transition metal dichalcogenides (TMDs) is studied using density functional theory. Compression of rippled TMDs beyond a threshold compression leads to the formation of a flat valence band associated with strongly localized holes. The implications for exciton manipulation and the emergence of one-dimensional heavy fermion behavior are discussed.
Accurate prediction of drivers' gaze is an important component of vision-based driver monitoring and assistive systems. Of particular interest are safety-critical episodes, such as performing maneuvers or crossing...
详细信息
Integrating distributed energy resources (DERs) into a power system requires more advanced control mechanisms. One of the control strategies used for Volt-VAR control (VVC) is to manage voltage and reactive power. Wit...
详细信息
In this paper, we model and characterize an unconventionally wide GaN HEMT device. Each finger of the device has a width of 150 μ m which allows the modeling methodology to examine the wave propagation effects at hig...
详细信息
暂无评论