Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). Data labeling difficulties, incorrect conclusions, and vulnerability to malicious data i...
详细信息
Graph alignment refers to the task of finding the vertex correspondence between two correlated graphs of n vertices. Extensive study has been done on polynomial-time algorithms for the graph alignment problem under th...
详细信息
Dynamic network architectures that utilize communication, computing, and storage resources at the wireless edge are key to delivering emerging services in next-generation networks (e.g., AR/VR, 3D video, intelligent c...
详细信息
Dynamic network architectures that utilize communication, computing, and storage resources at the wireless edge are key to delivering emerging services in next-generation networks (e.g., AR/VR, 3D video, intelligent cars, etc). Network slicing can be significantly enhanced by including dynamically available resources throughout the fog/edge/cloud continuum and using mmWave/THz bands. However, network slicing of dynamic multi-tier computing networks remains under-explored. In this paper, we present a self-learning end-to-end network slicing mechanism (SELF-E2E-NS) that facilitates collaboration between the Infrastructure Provider (InP) and tenants to slice their subscribers' resources (i.e., radio, computing, and storage) as fog resources. To adapt to the uncertain availability of resources at the edge and minimize the risk of non-satisfying service level agreements (SLAs), our slicing mechanism has two operational modes. Operational mode 1 is for joint network slicing (JNS) in which the InP infrastructure is augmented with fog resources and jointly sliced to meet high throughput and delay tolerant requirements. Operational mode 2 is for independent network slicing (INS) in which the InP infrastructure and fog resources are sliced separately to achieve high throughput, low-latency, and high-reliability requirements. Our schemes leverage mmWave/THz, fog/edge/cloud computing, and caching to achieve new service requirements. We design a DQ-E2E-JNS algorithm that uses Deep Dueling network and a MAAC-E2E-INS algorithm based on multi-agent actor-critic, which incorporate service-aware pricing feedback and fog trading matching, respectively. These algorithms find the optimal slice request admission and collaboration policy that maximizes the long-term revenue of the InP and tenants for each mode. The simulation results show that our novel slicing mechanism can serve up to 4 times more requests and effectively exploits different spectrum bands and fog resources to improve re
The traditional plasma etching process for defining micro-LED pixels could lead to significant sidewall *** near sidewall regions act as non-radiative recombination centers and paths for current leakage,significantly ...
详细信息
The traditional plasma etching process for defining micro-LED pixels could lead to significant sidewall *** near sidewall regions act as non-radiative recombination centers and paths for current leakage,significantly deteriorating device *** this study,we demonstrated a novel selective thermal oxidation(STO)method that allowed pixel definition without undergoing plasma damage and subsequent dielectric *** annealing in ambient air oxidized and reshaped the LED structure,such as p-layers and InGaN/GaN multiple quantum ***,the pixel areas beneath the pre-deposited SiO_(2)layer were selectively and effectively *** was demonstrated that prolonged thermal annealing time enhanced the insulating properties of the oxide,significantly reducing LED leakage ***,applying a thicker SiO_(2)protective layer minimized device resistance and boosted device efficiency *** the STO method,InGaN green micro-LED arrays with 50-,30-,and 10-μm pixel sizes were manufactured and *** results indicated that after 4 h of air annealing and with a 3.5-μm SiO_(2)protective layer,the 10-μm pixel array exhibited leakage currents density 1.2×10^(-6)A/cm^(2)at-10 V voltage and a peak on-wafer external quantum efficiency of~6.48%.This work suggests that the STO method could become an effective approach for future micro-LED manufacturing to mitigate adverse LED efficiency size effects due to the plasma etching and improve device ***-LEDs fabricated through the STO method can be applied to micro-displays,visible light communication,and optical interconnect-based *** planar pixel geometry will provide more possibilities for the monolithic integration of driving circuits with ***,the STO method is not limited to micro-LED fabrication and can be extended to design other III-nitride devices,such as photodetectors,laser diodes,high-electron-mobility transistors
Grid-tie voltage source converters(VSCs)can operate in three distinct modes:AC-dominant,DC-dominant,and balanced,depending on the placement of the stiff voltage *** distinct operation modes of the VSCs traditionally d...
详细信息
Grid-tie voltage source converters(VSCs)can operate in three distinct modes:AC-dominant,DC-dominant,and balanced,depending on the placement of the stiff voltage *** distinct operation modes of the VSCs traditionally demand different synchronization control techniques,leading to heterogeneous *** is challenging for the power system to accommodate and coordinate heterogeneous VSCs.A promising universal synchronization control technique for VSCs is the DC-link voltage synchronization control(DVSC)based on a lead compensator(LC).The LC DVSC stabilizes both the DC and AC voltages of a VSC while achieving synchronization with the AC *** results in a dual-port grid-forming(DGFM)characteristic for the ***,there has been very limited study on the stability and synchronization controller design of the VSCs with the LC DVSC operating in various *** bridge this gap,the paper presents a quantitative analysis on the stability and steady-state performance of the LC DVSC in all three operation modes of the DGFM *** on the analysis,the paper provides step-by-step design guidelines for the LC ***,the paper uncovers an instability issue related to the LC DVSC when the DGFM VSC operates in the balanced *** tackle the instability issue,a virtual resistance control is proposed and integrated with the LC *** results validate the analysis and demonstrate the effectiveness of the DGFM VSC with the LC DVSC designed using the proposed guidelines in all three operation ***,the paper demonstrates the feasibility of employing the DGFM VSC with the LC DVSC for all three possible operation modes,which can help overcome the challenges associated with accommodating and coordinating heterogeneous VSCs in the power system.
In this paper, we have proposed a novel deep-learning model to process electrocardiogram (ECG) signals from single-lead ECG device. This is achieved by using a hybrid of CNN (convolutional neural network) and LSTM (lo...
详细信息
Reconfigurable Intelligent Surface (RIS) system channel estimation involves many channel parameters and is costly. However, RIS is often used in millimeter-wave (mmWave) frequencies where sparse channel estimation can...
详细信息
The Nong Han Chaloem Phrakiat Lotus Park is a tourist attraction and a source of learning regarding lotus ***,as a training area,it lacks appeal and learning motivation due to its conventional presentation of informat...
详细信息
The Nong Han Chaloem Phrakiat Lotus Park is a tourist attraction and a source of learning regarding lotus ***,as a training area,it lacks appeal and learning motivation due to its conventional presentation of information regarding lotus *** current study introduced the concept of smart learning in this setting to increase interest and motivation for *** neural networks(CNNs)were used for the classification of lotus plant species,for use in the development of a mobile application to display details about each *** scope of the study was to classify 11 species of lotus plants using the proposed CNN model based on different techniques(augmentation,dropout,and L2)and hyper parameters(dropout and epoch number).The expected outcome was to obtain a high-performance CNN model with reduced total parameters compared to using three different pre-trained CNN models(Inception V3,VGG16,and VGG19)as *** performance of the model was presented in terms of accuracy,F1-score,precision,and recall *** results showed that the CNN model with the augmentation,dropout,and L2 techniques at a dropout value of 0.4 and an epoch number of 30 provided the highest testing accuracy of *** best proposed model was more accurate than the pre-trained CNN models,especially compared to Inception *** addition,the number of total parameters was reduced by approximately 1.80–2.19 *** findings demonstrated that the proposed model with a small number of total parameters had a satisfactory degree of classification accuracy.
The process of modifying digital images has been made significantly easier by the availability of several image editing software. However, in a variety of contexts, including journalism, judicial processes, and histor...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized *** study provides an approach to color image encryption that could find practical use in various *** proposed method,which combines four chaotic systems,employs singular value decomposition and a chaotic sequence,making it both secure and *** unified average change intensity,the number of pixels’change rate,information entropy analysis,correlation coefficient analysis,compression friendliness,and security against brute force,statistical analysis and differential attacks are all used to evaluate the algorithm’s *** a thorough investigation of the experimental data,it is concluded that the proposed image encryption approach is secure against a wide range of attacks and provides superior compression friendliness when compared to chaos-based alternatives.
暂无评论