In today’s data-driven world, data privacy and security is of utmost importance. Social media platforms have become the main source of data breaches due to the sheer number of users who are exposed to these risks. It...
In today’s data-driven world, data privacy and security is of utmost importance. Social media platforms have become the main source of data breaches due to the sheer number of users who are exposed to these risks. It is essential to understand the viable risks associated with such breaches in order to ensure that personal data remains secure. In this paper, we have discussed and reviewed the different forms of digital privacy breaches, their risks, possible preventive strategies and responsibilities of Institutions and Governments to handle digital security.
This study considers the Block-Toeplitz structural properties inherent in traditional multichannel forward model matrices, using Full Matrix Capture (FMC) in ultrasonic testing as a case study. We propose an analytica...
详细信息
This study considers the Block-Toeplitz structural properties inherent in traditional multichannel forward model matrices, using Full Matrix Capture (FMC) in ultrasonic testing as a case study. We propose an analytica...
详细信息
ISBN:
(数字)9789464593617
ISBN:
(纸本)9798331519773
This study considers the Block-Toeplitz structural properties inherent in traditional multichannel forward model matrices, using Full Matrix Capture (FMC) in ultrasonic testing as a case study. We propose an analytical convolutional forward model that transforms reflectivity maps into FMC data. Our findings demonstrate that the convolutional model excels over its matrix-based counterpart in terms of computational efficiency and storage requirements. This accelerated forward modeling approach holds significant potential for various inverse problems, notably enhancing Sparse Signal Recovery (SSR) within the context LASSO regression, which facilitates efficient Convolutional Sparse Coding (CSC) algorithms. Additionally, we explore the integration of Convolutional Neural Networks (CNNs) for the forward model, employing deep unfolding to implement the Learned Block Convolutional ISTA (BC-LISTA).
In the vast expanse of global travel, the intricate web of interconnected airline networks serves as the lifeline of modern aviation. Amidst the bustling realm of global aviation, where time and resources are of the e...
详细信息
We present QDarts, an efficient simulator for realistic charge stability diagrams of quantum dot array (QDA) devices in equilibrium states. It allows for pinpointing the location of concrete charge states and their tr...
详细信息
This paper focuses on transformers based end-to-end object detection methods. End to end object detection is a new paradigm that has got attention in recent times. It does not require complex hand-engineered component...
详细信息
Sharing up-to-date information about the surrounding measured by On-Board Units (OBUs) and Roadside Units (RSUs) is crucial in accomplishing traffic efficiency and pedestrians safety towards Intelligent Transportation...
Sharing up-to-date information about the surrounding measured by On-Board Units (OBUs) and Roadside Units (RSUs) is crucial in accomplishing traffic efficiency and pedestrians safety towards Intelligent Transportation Systems (ITS). Transferring measured data demands $\geq$10Gbit/s transfer rate and $\geq$1GHz bandwidth though the data is lost due to unusual data transfer size and impaired line of sight (LOS) propagation. Most existing models concentrated on resource optimization instead of measured data optimization. Subsequently, RSU-LiDARs have become increasingly popular in addressing object detection, mapping and resource optimization issues of Edge-based Software-Defined Vehicular Orchestration (ESDVO). In this regard, we design a two-step data-driven optimization approach called Object-aware Multi-criteria Decision-Making (OMDM) approach. First, the surroundings-measured data by RSUs and OBUs is processed by cropping object-enabled frames using YoLo and FRCNN at RSU. The cropped data likely share over the environment based on the RSU Computation-Communication method. Second, selecting the potential vehicle/device is treated as an NP-hard problem that shares information over the network for effective path trajectory and stores the cosine data at the fog server for end-user accessibility. In addition, we use a nonlinear programming multi-tenancy heuristic method to improve resource utilization rates based on device preference predictions (Like detection accuracy and bounding box tracking) which elaborately concentrate in future work. The simulation results agree with the targeted effectiveness of our approach, i.e., mAP($\geq$71%) with processing delay ($\leq3.5\times 10^{6}$bits/slot), and transfer delay ($\leq$3Sms). Our simulation results indicate that our approach is highly effective.
Controller Area Networks (CAN) has become the dominant data communication and networking system used in today's smart vehicles, autonomous mobile platforms, and industrial control systems. Although CAN bus, a vehi...
Controller Area Networks (CAN) has become the dominant data communication and networking system used in today's smart vehicles, autonomous mobile platforms, and industrial control systems. Although CAN bus, a vehicle bus standard designed to allow microcontrollers and devices to communicate with each other's applications provides robust and reliable internode data communication, existing CAN technology lacks support for secure data communication and data authentication. This paper explores the utilization of a lightweight and power-efficient authenticated data encryption engine based on TinyJAMBU-128. The proposed system is suitable for autonomous mobile platforms with CAN bus capability. In our proposed testbed, CAN data frames transmitted over the bus will be encrypted and authenticated with minimal power consumption using TinyJAMBU-128. We have analyzed the performance of TinyJAMBU-128 against three parameterized data encryption modules: AES-128/192/256, CAMELLIA-128/192/256, and ARIA-128/192/256. Based on our simulation data, CAN frames encrypted and authenticated via TinyJAMBU-128 required 22%, 17%, and 15% less average energy consumption compared to AES, CAMELLIA, and ARIA respectively.
Due to covid-19 pandemic, research in e-healthcare system is gaining popularity because in most of the cases e-healthcare system does not require to present patient physically at doctor’s door. The reason behind this...
详细信息
Climatic information such as temperature, humidity, and precipitation are useful for agriculturists, businesses, researchers, and the government. Estimating precipitation is a major factor that affects the environment...
Climatic information such as temperature, humidity, and precipitation are useful for agriculturists, businesses, researchers, and the government. Estimating precipitation is a major factor that affects the environment and is one of the most important aspects of meteorological science. In this study, factual approaches and machine learning methods are used to estimate and forecast meteorological parameters for the government. Estimating precipitation is a major factor that affects the environment and is one of the most important aspects of meteorological science. Approaches are used to forecast and estimate precipitation. Daily observations were used as part of the experiment. Validation of results using real-world data is used to check the accuracy of forecasting model experimentation. The experimental results show that distribution, correlation, line-plots, and neural networks perform well for forecasting meteorological characteristics and have the best classification accuracy when compared to other types of machine learning methods for precipitation forecasting.
暂无评论