Implicit neural networks based on point convolution and voxel convolution have been successfully used for point cloud surface reconstruction. This paper proposes an adaptive fusion dual-branch convolutional occupancy ...
详细信息
Stress in professional environments is a significant concern. Medical professionals are particularly vulnerable to stress, especially during emergencies. Nurses hold a vital position in delivering care within hospital...
详细信息
The number of businesses utilizing microservice architecture has grown rapidly in recent years. Due to its independence and scalability, one of the main challenges is designing a robust microservice architecture. A mi...
详细信息
This research study explores the impact of cloud computing on engineering education in India, focusing onhow it enhances educational outcomes. This study examines the potentialof strategic cloud implementation in high...
详细信息
This study addresses the critical aspect of data collection within Wireless Sensor Networks (WSNs), which consist of autonomous, compact sensor devices deployed to monitor environmental conditions. These networks have...
详细信息
Mission critical Machine-type Communication(mcMTC),also referred to as Ultra-reliable Low Latency Communication(URLLC),has become a research *** is primarily characterized by communication that provides ultra-high rel...
详细信息
Mission critical Machine-type Communication(mcMTC),also referred to as Ultra-reliable Low Latency Communication(URLLC),has become a research *** is primarily characterized by communication that provides ultra-high reliability and very low latency to concurrently transmit short commands to a massive number of connected *** the reduction in physical(PHY)layer overhead and improvement in channel coding techniques are pivotal in reducing latency and improving reliability,the current wireless standards dedicated to support mcMTC rely heavily on adopting the bottom layers of general-purpose wireless standards and customizing only the upper *** mcMTC has a significant technical impact on the design of all layers of the communication protocol *** this paper,an innovative bottom-up approach has been proposed for mcMTC applications through PHY layer targeted at improving the transmission reliability by implementing ultra-reliable channel coding scheme in the PHY layer of IEEE 802.11a standard bearing in mind short packet transmission *** achieve this aim,we analyzed and compared the channel coding performance of convolutional codes(CCs),low-density parity-check(LDPC)codes,and polar codes in wireless network on the condition of short data packet *** Viterbi decoding algorithm(VA),logarithmic belief propagation(Log-BP)algorithm,and cyclic redundancy check(CRC)successive cancellation list(SCL)(CRC-SCL)decoding algorithm were adopted to CC,LDPC codes,and polar codes,***,a new PHY layer for mcMTC has been *** reliability of the proposed approach has been validated by simulation in terms of Bit error rate(BER)and packet error rate(PER)***-to-noise ratio(SNR).The simulation results demonstrate that the reliability of IEEE 802.11a standard has been significantly improved to be at PER=10−5 or even better with the implementation of polar *** results also show that the general-purpose wireless net
Public cloud computing provides a variety of services to consumersvia high-speed internet. The consumer can access these services anytimeand anywhere on a balanced service cost. Many traditional authenticationprotocol...
详细信息
Public cloud computing provides a variety of services to consumersvia high-speed internet. The consumer can access these services anytimeand anywhere on a balanced service cost. Many traditional authenticationprotocols are proposed to secure public cloud computing. However, therapid development of high-speed internet and organizations’ race to developquantum computers is a nightmare for existing authentication schemes. Thesetraditional authentication protocols are based on factorization or discretelogarithm problems. As a result, traditional authentication protocols arevulnerable in the quantum computing era. Therefore, in this article, we haveproposed an authentication protocol based on the lattice technique for publiccloud computing to resist quantum attacks and prevent all known traditionalsecurity attacks. The proposed lattice-based authentication protocolis provably secure under the Real-Or-Random (ROR) model. At the sametime, the result obtained during the experiments proved that our protocol islightweight compared to the existing lattice-based authentication protocols,as listed in the performance analysis section. The comparative analysis showsthat the protocol is suitable for practical implementation in a quantum-basedenvironment.
CITA is a high-performance enterprise blockchain system with six microservices (RPC, Auth, Consensus, Chain, Executor, and Network) that exchange information through Message Bus. There is a dataset in the form of perf...
详细信息
Target speaker extraction aims to extract a target speaker's speech from a multi-talker environment with the help of the target speaker's reference speech. However, the simple fusion of different features and ...
详细信息
Online teaching and learning is seen by many as a way to not only improve the learning outcomes of traditional courses, but also to give participants the opportunity to learn anytime, anywhere. During the COVID-19 pan...
详细信息
暂无评论