Improvements in information technology bring new challenges in cyber security, especially on the Android platform which is the main target of malware attacks. The National Cyber and Crypto Agency (BSSN) as the nationa...
详细信息
The current machine learning algorithms classify human activities with inaccurate accuracy, poor generalization ability of the model, and poor classification effect. Proposing to use Random Forest classifier to classi...
详细信息
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile *** networks are sufficiently scaled to interconnect billions of users and *** i...
详细信息
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile *** networks are sufficiently scaled to interconnect billions of users and *** in academia and industry are focusing on technological advancements to achieve highspeed transmission,cell planning,and latency reduction to facilitate emerging applications such as virtual reality,the metaverse,smart cities,smart health,and autonomous *** continuously improves its network functionality to support these *** input multiple output(MIMO)technology offers spectral efficiency,dependability,and overall performance in *** article proposes a secure channel estimation technique in MIMO topology using a norm-estimation model to provide comprehensive insights into protecting NextG network components against adversarial *** technique aims to create long-lasting and secure NextG networks using this extended *** viability of MIMO applications and modern AI-driven methodologies to combat cybersecurity threats are explored in this ***,the proposed model demonstrates high performance in terms of reliability and accuracy,with a 20%reduction in the MalOut-RealOut-Diff metric compared to existing state-of-the-art techniques.
This paper presents evaluation results of a power- efficient JPEG compression circuit utilizing approximate computing. To achieve power efficiency, we replace summations in Discrete Cosine Transform (DCT) with approxi...
详细信息
In the realm of digital image manipulation, deep fakes, predominantly sourced from pornographic materials, present a significant challenge, especially prevalent in the form of face and body swapping techniques. This e...
详细信息
The proliferation of Internet of Things (IoT) networks has significantly increased the complexity of software architectures, leading to heightened vulnerabilities and system inefficiencies. AI-infused Predictive Digit...
详细信息
IQ is one of the indicators that has always been of interest to psychiatrists, doctors and cognitive science researchers. Since this index plays a key role in people's lives and also in the occurrence of brain abn...
详细信息
Human Activity Recognition (HAR) is crucial for the development of intelligent assistive technologies in Ambient Assisted Living (AAL) environments. This paper proposes an innovative method for Multi-View Human Activi...
详细信息
As cloud computing evolves, traditional resilience strategies must adapt to new challenges. This paper introduces CRISP, Cloud Resilient Infrastructure for Self-Healing Platforms, a pioneering framework designed to en...
详细信息
CITA is a high-performance enterprise blockchain system with six microservices (RPC, Auth, Consensus, Chain, Executor, and Network) that exchange information through Message Bus. There is a dataset in the form of perf...
详细信息
暂无评论