Entropy algorithms are crucial in fields where assessing randomness, uncertainty, or complexity is vital. As datasets grow, efficient entropy calculations become important. This work explores the parallelization of Sh...
详细信息
Nowadays, power quality issues are more and more frequent due to disturbances such as harmonics, flicker, swells/sags, interruptions, unbalanced voltage, etc. This paper presents a solution developed by the authors fo...
详细信息
Creating programming questions that are both meaningful and educationally relevant is a critical task in computerscience education. This paper introduces a fine-tuned GPT4o-mini model (C2Q). It is designed to generat...
详细信息
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure ***,the Op...
详细信息
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure ***,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional *** disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network ***,this openness introduces new security challenges compared to traditional *** existing studies overlook these security requirements of the O-RAN *** gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G *** then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities *** providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.
The latest advancements in blockchain technology have significantly influenced several sectors, such as banking, healthcare, and supply chain networks. Because of its distinct attributes, like decentralization, trustw...
详细信息
Millimeter wave (mm-Wave) multiple-input-multiple-output systems have the unique characteristics of high temporal resolution and high directivity, enabling very accurate localization. By utilizing the time delay, angl...
详细信息
Deep neural networks (DNN) have reached impressive performance in computer vision, making them a natural choice for object detection problems in automated driving. However, DNNs used for object detection are known to ...
详细信息
Tracing and tracking of the peripheral devices help in terms of manufacturing and providing services to the users. However, most of the current systems which are suggested by Food and Drug Administration (FDA) are loT...
详细信息
Prostate cancer(PCa)symptoms are commonly confused with benign prostate hyperplasia(BPH),particularly in the early stages due to similarities between symptoms,and in some instances,*** methods have been utilized to di...
详细信息
Prostate cancer(PCa)symptoms are commonly confused with benign prostate hyperplasia(BPH),particularly in the early stages due to similarities between symptoms,and in some instances,*** methods have been utilized to diagnose PCa;however,at the full-blown stage,clinical methods usually present high risks of complicated side ***,we proposed the use of support vector machine for early differential diagnosis of PCa(SVM-PCa-EDD).SVM was used to classify persons with and without *** used the PCa dataset from the Kaggle Healthcare repository to develop and validate SVM model for *** PCa dataset consisted of 250 features and one class of *** considered in this study were age,body mass index(BMI),race,family history,obesity,trouble urinating,urine stream force,blood in semen,bone pain,and erectile *** SVM-PCa-EDD was used for preprocessing the PCa dataset,specifically dealing with class imbalance,and for dimensionality *** eliminating class imbalance,the area under the receiver operating characteristic(ROC)curve(AUC)of the logistic regression(LR)model trained with the downsampled dataset was 58.4%,whereas that of the AUC-ROC of LR trained with the class imbalance dataset was 54.3%.The SVM-PCa-EDD achieved 90%accuracy,80%sensitivity,and 80%*** validation of SVM-PCa-EDD using random forest and LR showed that SVM-PCa-EDD performed better in early differential diagnosis of *** proposed model can assist medical experts in early diagnosis of PCa,particularly in resource-constrained healthcare settings and making further recommendations for PCa testing and treatment.
Videos represent the most prevailing form of digital media for communication,information dissemination,and ***,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant *** ...
详细信息
Videos represent the most prevailing form of digital media for communication,information dissemination,and ***,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant *** response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital *** study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be *** then investigates current developments in the field of video security by exploring two critical research ***,it examine the techniques used by adversaries to compromise video data and evaluate their *** these attack methodologies is crucial for developing effective defense ***,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and *** compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease ***,it identifies potential research opportunities to enhance video data protection in response to the evolving threat *** this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world.
暂无评论