The present contribution quantifies the effect of Hardware Imperfections (HWI) on Artificial Intelligence (AI)empowered anti-jamming wireless communication scenarios. To that end, we consider an AI-empowered wireless ...
详细信息
In recent years, cloud-native applications have been widely hosted and managed in containerized environments due to their unique benefits, such as being lightweight, portable, and cost-efficient. Their growing popular...
详细信息
This work presents an adaptive tracking guidance method for robotic fishes. The scheme enables robots to suppress external interference and eliminate motion jitter. An adaptive integral surge line-of-sight guidance ru...
详细信息
This work presents an adaptive tracking guidance method for robotic fishes. The scheme enables robots to suppress external interference and eliminate motion jitter. An adaptive integral surge line-of-sight guidance rule is designed to eliminate dynamics interference and sideslip issues. Limited-time yaw and surge speed observers are reported to fit disturbance variables in the model. The approximation values can compensate for the system's control input and improve the robots' tracking ***, this work develops a terminal sliding mode controller and third-order differential processor to determine the rotational torque and reduce the robots' run jitter. Then, Lyapunov's theory proves the uniform ultimate boundedness of the proposed method. Simulation and physical experiments confirm that the technology improves the tracking error convergence speed and stability of robotic fishes.
This work presents a blockchain-based communication architecture for multi-agent smart manufacturing systems, enhanced with federated learning to improve security, data privacy, and scalability. Comparative evaluation...
详细信息
Human activity recognition (HAR) plays a crucial role in assisting the elderly and individuals with vascular dementia by providing support and monitoring for their daily activities. This paper presents a deep learning...
详细信息
In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player ga...
详细信息
In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player game model and derive Nash equilibria in response to different types of insider *** analyzing these Nash equilibria,we provide quantitative solutions to advanced persistent threat problems pertaining to insider ***,we have conducted a comparative assessment of the optimal defense strategy and corresponding defender's costs between two types of insider ***,our findings advocate a more proactive defense strategy against inadvertent insider threats in contrast to malicious ones,despite the latter imposing a higher burden on the *** theoretical results are substantiated by numerical results,which additionally include a detailed exploration of the conditions under which different insiders adopt risky *** conditions can serve as guiding indicators for the defender when calibrating their monitoring intensities and devising defensive strategies.
This study presented a surface-functionalized sensor probe using 3-aminopropyltriethoxysilane(APTES)self-assembled monolayers on a Kretschmann-configured plasmonic *** probe featured stacked nanocomposites of gold(via...
详细信息
This study presented a surface-functionalized sensor probe using 3-aminopropyltriethoxysilane(APTES)self-assembled monolayers on a Kretschmann-configured plasmonic *** probe featured stacked nanocomposites of gold(via sputtering)and graphene quantum dots(GQD,via spin-coating)for highly sensitive and accurate uric acid(UA)detection within the physiological *** encompassed the field emission scanning electron microscopy for detailed imaging,energy-dispersive X-ray spectroscopy for elemental analysis,and Fourier transform infrared spectroscopy for molecular *** functionalization increased sensor sensitivity by 60.64%,achieving 0.0221°/(mg/dL)for the gold-GQD probe and 0.0355°/(mg/dL)for the gold-APTES-GQD probe,with linear correlation coefficients of 0.8249 and 0.8509,*** highest sensitivity was 0.0706°/(mg/dL),with a linear correlation coefficient of 0.993 and a low limit of detection of 0.2 mg/***,binding affinity increased dramatically,with the Langmuir constants of 14.29μM^(-1)for the gold-GQD probe and 0.0001μM^(-1)for the gold-APTES-GQD probe,representing a 142900-fold *** probe demonstrated notable reproducibility and repeatability with relative standard deviations of 0.166%and 0.013%,respectively,and exceptional temporal stability of 99.66%.These findings represented a transformative leap in plasmonic UA sensors,characterized by enhanced precision,reliability,sensitivity,and increased surface binding capacity,synergistically fostering unprecedented practicality.
Today., the use of robotic navigational tools is widely used both in academical research and the technological industry., there is a growing need for planning paths of navigation to autonomous machines., robots and tr...
详细信息
Anomaly detection for rail running bands, the pattern of wheel-rail contact area, is crucial to analyze composite rail irregularities. This paper presents an all-weather vision-based solution for running-band inspecti...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
暂无评论