An eight-channel optical filter, based on a micro-ring-assisted Mach-Zehnder interferometer, is demonstrated. Reconfigurable channel selectivity and wide, multi-channel tunability are achieved by thermally tuning the ...
详细信息
A novel technique that manipulates tiny objects using electrostatic forces is proposed. This technique, which has grid-structure electrodes, potentially can drive multiple objects individually. One of the possible app...
详细信息
The reconfigurable intelligent surface (RIS) steering reflective beam directions toward a target mobile user equipment (UE) has been a promising technology for coverage enhancement and physical-layer (PHY) security to...
详细信息
This work presents the architecture and development of the Serious Game (SG) Memô which is aimed at exercising the Short-Term Memory (STM) of children with Autism Spectrum Disorder (ASD). This serious game propos...
详细信息
The optoacoustic effect is triggered by directing an optical signal in the air (using laser) to the surface of water, leading to the generation of a corresponding acoustic signal inside the water. Careful modulation o...
详细信息
Elliptic curve cryptography (ECC) is an important building block for providing us with digital security nowadays and likely also in the future. Being able to compute the elliptic curve scalar multiplication (ECSM) fas...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are vital in facilitating end-user communication ***,the security of Android systems has been challenged by the sensitive data involved,leading to vulnerabilities in mobile devices used in 5G *** vulnerabilities expose mobile devices to cyber-attacks,primarily resulting from security ***-permission apps in Android can exploit these channels to access sensitive information,including user identities,login credentials,and geolocation *** such attack leverages"zero-permission"sensors like accelerometers and gyroscopes,enabling attackers to gather information about the smartphone's *** underscores the importance of fortifying mobile devices against potential future *** research focuses on a new recurrent neural network prediction model,which has proved highly effective for detecting side-channel attacks in mobile devices in 5G *** conducted state-of-the-art comparative studies to validate our experimental *** results demonstrate that even a small amount of training data can accurately recognize 37.5%of previously unseen user-typed ***,our tap detection mechanism achieves a 92%accuracy rate,a crucial factor for text *** findings have significant practical implications,as they reinforce mobile device security in 5G networks,enhancing user privacy,and data protection.
作者:
Bourekouche, HadjerBelkacem, SamiaMessaoudi, NoureddineLIST Laboratory
Department Engineering of Electrical Systems Faculty of Technology University M’Hamed Bougara of Boumerdes Boumerdes35000 Algeria LIMOSE Laboratory
Department Engineering of Electrical Systems Faculty of Technology University M’Hamed Bougara of Boumerdes Boumerdes35000 Algeria
The quantity of medical image data accessible for analysis is increasing because of advancements in telehealth services. Therefore, effective cryptographic solutions must be developed to prevent data manipulation by u...
详细信息
The Ball and beam system(BBS)is an attractive laboratory experimental tool because of its inherent nonlinear and open-loop unstable *** an effective ball and beam system controller is a real challenge for researchers ...
详细信息
The Ball and beam system(BBS)is an attractive laboratory experimental tool because of its inherent nonlinear and open-loop unstable *** an effective ball and beam system controller is a real challenge for researchers and *** this paper,the control design technique is investigated by using Intelligent Dynamic Inversion(IDI)method for this nonlinear and unstable *** proposed control law is an enhanced version of conventional Dynamic Inversion control incorporating an intelligent control element in *** Moore-PenroseGeneralized Inverse(MPGI)is used to invert the prescribed constraint dynamics to realize the baseline control law.A sliding mode-based intelligent control element is further augmented with the baseline control to enhance the robustness against uncertainties,nonlinearities,and external *** semi-global asymptotic stability of IDI control is guaranteed in the sense of *** simulations and laboratory experiments are carried out on this ball and beam physical system to analyze the effectiveness of the *** addition to that,comparative analysis of RGDI control with classical Linear Quadratic Regulator and Fractional Order Controller are also presented on the experimental test bench.
Recently, legged robots have attracted considerable attention as highly mobile rovers for planetary exploration. However, the surfaces of celestial bodies such as Mars and the Moon are primarily loose, causing slippag...
详细信息
暂无评论