With the continuous expansion of the scale of air transport, the demand for aviation meteorological support also continues to grow. The impact of hazardous weather on flight safety is critical. How to effectively use ...
详细信息
Photovoltaic - Battery Energy Storage systems (PVBESS) are a promising solution against technical bottlenecks of high PV penetration. Public buildings are suitable for installation, although currently underexploited, ...
详细信息
The subject of this paper is sequential decomposition algorithms. They are applied to graph models of various sizes. A study of their speed and applicability was made with software applications developed for the purpo...
详细信息
Deep neural network (DNN) models have shown promise in lung disease classification using spectrogram transformations of respiratory sounds. However, these models typically process entire images, which can be...
详细信息
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ...
详细信息
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.
Frequency selective surfaces are a periodic array of unit cells that, when illuminated externally, have a specific frequency response that depends on element geometry, spacing, and substrate properties. Theoretically,...
详细信息
Climate-induced disasters pose significant threats to human lives, infrastructure, and ecosystems. Deep learning techniques, combined with remote sensing, offer powerful tools for predicting, detecting, and mitigating...
详细信息
Finding hidden order within disorder is a common interest in material science1,2, wave physics3,4, and mathematics5. The Riemann hypothesis, stating the locations of nontrivial zeros of the Riemann zeta function6, ten...
详细信息
Cryptography is an essential topic for modern digital systems. In the past two decades, FPGA-based encryptions has proved to be effective. Through this project, we explore a cryptographic application of FPGAs by imple...
详细信息
We introduce a simple geometry for slow-wave structures (SWSs) in sheet-beam traveling-wave tubes (TWTs). The staggered microstrip grating SWS is a space harmonic structure with geometry and bandwidth with analogous t...
详细信息
暂无评论