Traffic monitoring is critical for avoiding fatal accidents on the roads as well as essential for ensuring that traffic rules are followed. An effective traffic monitoring system is made possible by cutting-edge compu...
详细信息
This paper introduces a refined version of the Moth Flame Optimization (MFO) algorithm, Superiority of Feasible Solutions-Moth Flame Optimization (SF-MFO), in recognition of the significant influence of renewable ener...
详细信息
Decimal operands expressed in BCD is often the convenient data format used in embedded systems and human-centric applications. For optimized arithmetic computation on hardware where binary arithmetic can be convenient...
详细信息
This project looks into the possibility of applying machine learning to optimize wireless networks for adaptive communication. Using 5G resource data, it applies preprocessing, exploratory analysis, and visualization ...
详细信息
Modular inversion computation forms a crucial component in Elliptic Curve Cryptosystems. In this paper, we have proposed a fast VLSI architecture for Kaliski's Montgomery domain modular inversion al-gorithm using ...
详细信息
Challenges of farming are getting worse due to pests, other environmental issues, and changes in the climate. Several novel technologies have been developed to improve plant growth and productivity, yet there are stil...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web o...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web of challenges, prominently centered around potential threats and data security implications. Recent cryptography techniques, such as DNA-based cryptography, 3D chaos-based cryptography, and optical cryptography, face challenges including large encryption times, high energy consumption, and suboptimal rather than optimal performance. Particularly, the burden of long encryption cycles strains the energy resources of typical low-power and compact IoT devices. These challenges render the devices vulnerable to unauthorized breaches, despite large storage capacities. The hallmark of the IoT ecosystem, characterized by its low-power compact devices, is the burgeoning volume of data they generate. This escalating data influx, while necessitating expansive storage, remains vulnerable to unauthorized access and breaches. Historically, encryption algorithms, with their multifaceted architectures, have been the bulwark against such intrusions. However, their inherently-complex nature, entailing multiple encryption cycles, strains the limited energy reserves of typical IoT devices. In response to this intricate dilemma, we present a hybrid lightweight encryption strategy. Our algorithm innovatively leverages both one-dimensional (1D) and two-dimensional (2D) chaotic key generators. Furthermore, it amalgamates a classical encryption philosophy, harmonizing the strengths of Feistel and substitution-permutation networks. The centerpiece of our strategy is achieving effective encryption in merely three rounds, tailored expressly for compressed Three-Dimensional Video (3DV) frames, ensuring their unwavering integrity. Our workflow commences with the H.264/MVC compression algorithm, setting the stage for the subsequent encryption phase. Through rigorous MATLAB simulations,
In recent years, reinforcement learning (RL) based quadrupedal locomotion control has emerged as an extensively researched field, driven by the potential advantages of autonomous learning and adaptation compared to tr...
详细信息
Air quality forecasting is critical for environmental monitoring and public health, and in this study, we propose a hybrid approach utilizing Gooseneck Barnacle Optimization (GBO) and Artificial Neural Networks (ANN) ...
详细信息
Compared to the successive cancellation(SC)-based decoding algorithms,the sphere decoding(SD)algorithm can achieve better performance with reduced computational complexity,especially for short polar *** this paper,we ...
详细信息
Compared to the successive cancellation(SC)-based decoding algorithms,the sphere decoding(SD)algorithm can achieve better performance with reduced computational complexity,especially for short polar *** this paper,we propose a new method to construct the binary polar codes with the modified multiplicative repetition(MR)-based *** from the original construction,we first design a 2x2q-ary kernel to guarantee the single-level polarization ***,by replacing the new-designed binary companion matrix,a novel strategy is further developed to enhance the polarization in the bit level,resulting in a better distance ***,the SD-based Monte-Carlo(SDMC)method is used to construct MR-based binary polar codes,while the resulting codes without the butterfly pattern are decoded by the SD *** results show that the proposed method with the SD algorithm can achieve a maximum performance gain of 0.27 dB compared to the original method with slightly lower complexity.
暂无评论