Mission critical Machine-type Communication(mcMTC),also referred to as Ultra-reliable Low Latency Communication(URLLC),has become a research *** is primarily characterized by communication that provides ultra-high rel...
详细信息
Mission critical Machine-type Communication(mcMTC),also referred to as Ultra-reliable Low Latency Communication(URLLC),has become a research *** is primarily characterized by communication that provides ultra-high reliability and very low latency to concurrently transmit short commands to a massive number of connected *** the reduction in physical(PHY)layer overhead and improvement in channel coding techniques are pivotal in reducing latency and improving reliability,the current wireless standards dedicated to support mcMTC rely heavily on adopting the bottom layers of general-purpose wireless standards and customizing only the upper *** mcMTC has a significant technical impact on the design of all layers of the communication protocol *** this paper,an innovative bottom-up approach has been proposed for mcMTC applications through PHY layer targeted at improving the transmission reliability by implementing ultra-reliable channel coding scheme in the PHY layer of IEEE 802.11a standard bearing in mind short packet transmission *** achieve this aim,we analyzed and compared the channel coding performance of convolutional codes(CCs),low-density parity-check(LDPC)codes,and polar codes in wireless network on the condition of short data packet *** Viterbi decoding algorithm(VA),logarithmic belief propagation(Log-BP)algorithm,and cyclic redundancy check(CRC)successive cancellation list(SCL)(CRC-SCL)decoding algorithm were adopted to CC,LDPC codes,and polar codes,***,a new PHY layer for mcMTC has been *** reliability of the proposed approach has been validated by simulation in terms of Bit error rate(BER)and packet error rate(PER)***-to-noise ratio(SNR).The simulation results demonstrate that the reliability of IEEE 802.11a standard has been significantly improved to be at PER=10−5 or even better with the implementation of polar *** results also show that the general-purpose wireless net
Kidney disease is a significant global health issue affecting millions, with various abnormalities, such as stones and cysts, that are often preventable or curable. However, these conditions can progress to more sever...
详细信息
Context: In the public health domain, there is no shortage of failed information Systems projects. In addition to overblown budgets and elapsed deadlines (ad nauseam), technical issues exist. These include poor usabil...
详细信息
Context: In the public health domain, there is no shortage of failed information Systems projects. In addition to overblown budgets and elapsed deadlines (ad nauseam), technical issues exist. These include poor usabil...
详细信息
The Causal Broadcast (CB) algorithms are presented for message passing between processes of distributed systems (DSs). These algorithms play an essential role in distributed computing. Therefore, the correctness of th...
详细信息
In this paper,a novel cancellable biometrics technique calledMulti-Biometric-Feature-Hashing(MBFH)is *** MBFH strategy is utilized to actualize a single direction(non-invertibility)biometric *** is a typical model sec...
详细信息
In this paper,a novel cancellable biometrics technique calledMulti-Biometric-Feature-Hashing(MBFH)is *** MBFH strategy is utilized to actualize a single direction(non-invertibility)biometric *** is a typical model security conspire that is distinguished in the utilization of this protection insurance framework in numerous sorts of biometric feature strategies(retina,palm print,Hand Dorsum,fingerprint).A more robust and accurate multilingual biological structure in expressing human loneliness requires a different format to record clients with inseparable comparisons from individual biographical *** may raise worries about their utilization and security when these spread out designs are subverted as everybody is acknowledged for another biometric *** proposed structure comprises of four sections:input multi-biometric acquisition,feature extraction,Multi-Exposure Fusion(MEF)and secure hashing calculation(SHA-3).Multimodal biometrics systems that are more powerful and precise in human-unmistakable evidence require various configurations to store a comparative customer that can be contrasted with biometric wellsprings of *** top words,biometrics graphs can’t be denied and change to another request for positive Identifications(IDs)while *** biometrics is may be the special procedure used to recognize this issue.
This paper investigated the predictive capabilities of three decision tree models for IoT botnet attack prediction using packet information while minimizing the number of predictors. The study employed three decision ...
详细信息
The aim of this paper is to analyze the implementation of intelligent lighting within the concept of smart energy based on the possibility of saving and efficient use of energy, which is largely based on non-renewable...
详细信息
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the priv...
详细信息
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the privacy of patients. As medical information becomes more widely available, security measures must be established to protect confidentiality, integrity, and availability. Image steganography was recently proposed as an extra data protection mechanism for medical records. This paper describes a data-hiding approach for DICOM medical pictures. To ensure secrecy, we use Adversarial Neural Cryptography with SHA-256 (ANC-SHA-256) to encrypt and conceal the RGB patient picture within the medical image's Region of Non-Interest (RONI). To ensure anonymity, we use ANC-SHA-256 to encrypt the RGB patient image before embedding. We employ a secure hash method with 256bit (SHA-256) to produce a digital signature from the information linked to the DICOM file to validate the authenticity and integrity of medical pictures. Many tests were conducted to assess visual quality using diverse medical datasets, including MRI, CT, X-ray, and ultrasound cover pictures. The LFW dataset was chosen as a patient hidden picture. The proposed method performs well in visual quality measures including the PSNR average of 67.55, the NCC average of 0.9959, the SSIM average of 0.9887, the UQI average of 0.9859, and the APE average of 3.83. It outperforms the most current techniques in these visual quality measures (PSNR, MSE, and SSIM) across six medical assessment categories. Furthermore, the proposed method offers great visual quality while being resilient to physical adjustments, histogram analysis, and other geometrical threats such as cropping, rotation, and scaling. Finally, it is particularly efficient in telemedicine applications with high achieving security with a ratio of 99% during remote transmission of Electronic Patient Records (EPR) over the Internet, which safeguards the patien
Graphene oxide(GO)is a 2D coating material used to improve fiber optics sensors’response to relative *** resonators(MBRs)have garnered more attention as sensing media *** MBR with a 190μm diameter was coated with **...
详细信息
Graphene oxide(GO)is a 2D coating material used to improve fiber optics sensors’response to relative *** resonators(MBRs)have garnered more attention as sensing media *** MBR with a 190μm diameter was coated with ***,tapered fiber light coupling was used to investigate the relative humidity sensing performance in the range of 35—70%RH at 25℃.The MBR showed a higher Q factor before and after GO *** sensitivity of 0.115 dB/%RH was recorded with the 190μm GO-coated MBR sample compared to a sensitivity of 0.022 dB/%RH for the uncoated MBR *** results show that the MBR can be used in fiber optic sensing applications for environmental sensing.
暂无评论