In this paper we propose a novel algorithm based on the use of Principal Components Analysis for the determination of spherical coordinates of sampled cosmic ray flux distribution. We have also applied a deep neural n...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Securi...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Security (PLS). Ensuring data confidentiality and integrity during wireless communications poses a primary challenge in IoT environments. Additionally, within the constrained frequency bands available, Cognitive Radio Networks (CRNs) has emerged as an urgent necessity to optimize spectrum utilization. This technology enables intelligent management of radio frequencies, enhancing network efficiency and adaptability to dynamic environmental changes. In this research, we focus on examining the PLS for the primary channel within the underlying CRNs. Our proposed model involves a primary source-destination pair and a secondary transmitter-receiver pair sharing the same frequency band simultaneously. In the presence of a common eavesdropper, the primary concern lies in securing the primary link communication. The secondary user (SU) acts as cooperative jamming, strategically allocating a portion of its transmission power to transmit artificial interference, thus confusing the eavesdropper and protecting the primary user's (PU) communication. The transmit power of the SU is regulated by the maximum interference power tolerated by the primary network's receiver. To evaluate the effectiveness of our proposed protocol, we develop closed-form mathematical expressions for intercept probability ((Formula presented.)) and outage probability (OP) along the primary communication link. Additionally, we derive mathematical expressions for OP along the secondary communications network. Furthermore, we investigate the impact of transmit power allocation on intercept and outage probabilities across various links. Through both simulation and theoretical analysis, our protocol aims to enhance protection and outage efficiency for the primary link while ensuring appropriate secondary
The rapidly changing landscapes of modern optimization problems require algorithms that can be adapted in real-time. This paper introduces an Adaptive Metaheuristic Framework (AMF) designed for dynamic environments. I...
详细信息
Minimizing the energy consumption to increase the life span and performance of multiprocessor system on chip(MPSoC)has become an integral chip design issue for multiprocessor *** performance measurement of computation...
详细信息
Minimizing the energy consumption to increase the life span and performance of multiprocessor system on chip(MPSoC)has become an integral chip design issue for multiprocessor *** performance measurement of computational systems is changing with the advancement in *** to shrinking and smaller chip size power densities onchip are increasing rapidly that increasing chip temperature in multi-core embedded *** operating speed of the device decreases when power consumption reaches a threshold that causes a delay in complementary metal oxide semiconductor(CMOS)circuits because high on-chip temperature adversely affects the life span of the *** this paper an energy-aware dynamic power management technique based on energy aware earliest deadline first(EA-EDF)scheduling is proposed for improving the performance and reliability by reducing energy and power consumption in the system on chip(SOC).Dynamic power management(DPM)enables MPSOC to reduce power and energy consumption by adopting a suitable core configuration for task *** migration avoids peak temperature values in the multicore *** utilization factor(ui)on central processing unit(CPU)core consumes more energy and increases the temperature *** technique switches the core bymigrating such task to a core that has less temperature and is in a low power *** proposed EA-EDF scheduling technique migrates load on different cores to attain stability in temperature among multiple cores of the CPU and optimized the duration of the idle and sleep periods to enable the low-temperature *** effectiveness of the EA-EDF approach reduces the utilization and energy consumption compared to other existing methods and *** simulation results show the improvement in performance by optimizing 4.8%on u_(i) 9%,16%,23%and 25%at 520 MHz operating frequency as compared to other energy-aware techniques for MPSoCs when the least number of tasks is in running state and can
In the current landscape of intelligent transportation, vehicle platooning has become a key strategy for improving traffic efficiency and safety. However, as multiple platoons move at high speeds, the platoon encounte...
详细信息
This research examines the transmission dynamics of the Omicron variant of COVID-19 using SEIQIcRVW and SQIRV models,considering the delay in converting susceptible individuals into infected *** significant delays eve...
详细信息
This research examines the transmission dynamics of the Omicron variant of COVID-19 using SEIQIcRVW and SQIRV models,considering the delay in converting susceptible individuals into infected *** significant delays eventually resulted in the pandemic’s *** ensure the safety of the host population,this concept integrates quarantine and the COVID-19 *** investigate the stability of the proposed *** fundamental reproduction number influences stability *** to our findings,asymptomatic cases considerably impact the prevalence of Omicron infection in the *** real data of the Omicron variant from Chennai,Tamil Nadu,India,is used to validate the outputs.
Traditional image encryption algorithms transform a plain image into a noise-like *** lower the chances for the encrypted image being detected by the attacker during the image transmission,a visually meaningful image ...
详细信息
Traditional image encryption algorithms transform a plain image into a noise-like *** lower the chances for the encrypted image being detected by the attacker during the image transmission,a visually meaningful image encryption scheme is suggested to hide the encrypted image using another carrier *** paper proposes a visually meaningful encrypted image algorithm that hides a secret image and a digital signature which provides authenticity and *** recovered digital signature is used for the purpose of identity authentication while the secret image is encrypted to protect its *** Significant Bit(LSB)method to embed signature on the encrypted image and Lifting Wavelet Transform(LWT)to generate a visually meaningful encrypted image are *** proposed algorithm has a keyspace of 139.5-bit,a Normalized Correlation(NC)value of 0.9998 which is closer to 1 and a Peak Signal to Noise Ratio(PSNR)with a value greater than 50 *** analyses are also performed on the proposed algorithm using different *** experimental results show that the proposed scheme is with high key sensitivity and strong robustness against pepper and salt attack and cropping ***,the histogram analysis shows that the original carrier image and the final visual image are very similar.
The dynamic growth of the digital ecosystem presents evolving cybersecurity considerations, highlighting the constant change and emergence of new security concerns. While cloud providers offer robust security for the ...
详细信息
With the emergence of blind spot reconstruction networks in hyperspectral anomaly detection, a series of new challenges have arisen. The most significant issues include local anomaly identity mapping and inaccurate de...
详细信息
Electroencephalography (EEG) is a crucial tool for monitoring electrical brain activity and diagnosing neurological conditions. Manual analysis of EEG signals is time-consuming and prone to variability, necessitating ...
详细信息
暂无评论