CONTEXT: Web applications are exposed to malicious accesses through the Internet. SQL injection (SQLi) attacks are still a typical threat to web application providers. Although recent studies proposed deep learning-ba...
详细信息
Ahstract- This study focuses on developing a gait asymmetry index and applying image processing techniques to cyclogram analysis. We evaluated gait asymmetry under different walking conditions, specifically examining ...
详细信息
Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)***,several security vulnerabilities and att...
详细信息
Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)***,several security vulnerabilities and attacks have plagued previous generations of communication systems;thus,physical layer security,especially against eavesdroppers,is vital,especially for upcoming 6G *** this regard,UAVs have appeared as a winning candidate to mitigate security *** this paper,we leverage UAVs to propose two *** first method utilizes a UAV as Decode-and-Forward(DF)relay,whereas the second method utilizes a UAV as a jammer to mitigate eavesdropping attacks for URLLC between transmitter and receiver ***,we present a low-complexity algorithm that outlines the two aforementioned methods of mitigating interception,*** secrecy rate,and we compare them with the benchmark null method in which there is a direct communication link between transmitter and receiver without the UAV DF ***,simulation results show the effectiveness of such methods by improving the secrecy rate and its dependency on UAV height,blocklength,decoding error probability and transmitter-receiver separation ***,we recommend the best method to enhance the secrecy rate in the presence of an eavesdropper based on our simulations.
The World Health Organization (WHO) reports that diabetic retinopathy affects one-third of diabetics, regardless of their stage of the disease. Several research efforts are focused on its automated detection and diagn...
详细信息
Base station 5G antennas in the 28 GHz frequency spectrum must have strong gain to account for severe propagation loss. Focusing high gain in one radiation direction increases coverage distance. Using CST Studio Suite...
详细信息
Software Defined Networking (SDN) promises to introduce flexibility and programmability into networks by offering developers a northbound interface (NBI) to create SDN applications. However, current designs and implem...
详细信息
The co-rotating vortex pair is a well-known test problem for validating aeroacoustic computational frameworks. Both the flow field and the radiated acoustic far-field can be determined analytically, which allows for t...
详细信息
PhraseFluent is a project to develop a complete web-based solution to help people who are suffering from speech disorders. This application is specifically designed for people who are suffering from articulation and s...
详细信息
Image segmentation for detecting illegal landfill waste in aerial images is essential for environmental crime monitoring. Despite advancements in segmentation models, the primary challenge in this domain is the lack o...
详细信息
correct understanding of the Holy Quran is an essential duty for all Muslims. Tajweed rules guide the reciter to perform Holy Quran reading exactly as it was uttered by Prophet Muhammad peace be upon him. This work fo...
详细信息
暂无评论