This study addresses the need for parsing tools in Ge'ez natural language processing (NLP) systems. Parsing breaks down sentences into their component parts (words and phrases) and assigns grammatical roles. This ...
详细信息
Phishing is a major threat to internet security, targeting human vulnerabilities instead of software vulnerabilities. It involves directing users to malicious websites where their sensitive information can be stolen. ...
详细信息
The publishing and using of big data brought unprecedented convenience to users. However, it also results in the disclosure of personal privacy information. In order to mitigate the privacy leakage risk of sensitive i...
详细信息
In this paper development and testing of an electronic controller for operation of a beverage cooling device is described. This development is a part of a project research that includes a cooling device with a water-s...
详细信息
In this paper,we propose a novel secure image communication system that integrates quantum key distribution and hyperchaotic encryption techniques to ensure enhanced security for both key distribution and plaintext **...
详细信息
In this paper,we propose a novel secure image communication system that integrates quantum key distribution and hyperchaotic encryption techniques to ensure enhanced security for both key distribution and plaintext ***,we leverage the B92 Quantum Key Distribution(QKD)protocol to secure the distribution of encryption keys,which are further processed through Galois Field(GF(28))operations for increased *** encrypted plaintext is secured using a newly developed Hyper 3D Logistic Map(H3LM),a chaotic system that generates complex and unpredictable sequences,thereby ensuring strong confusion and diffusion in the encryption *** hybrid approach offers a robust defense against quantum and classical cryptographic attacks,combining the advantages of quantum-level key distribution with the unpredictability of hyperchaos-based *** proposed method demonstrates high sensitivity to key changes and resilience to noise,compression,and cropping attacks,ensuring both secure key transmission and robust image encryption.
To achieve information security objectives at the physical layer, while requiring a minimal resource footprint, Physical Layer Security (PLS) is a promising approach. In a previous work, the Grain-128PLE, a lightweigh...
详细信息
The computational complexity of resource allocation processes,in cognitive radio networks(CRNs),is a major issue to be ***,the complicated solution of the optimal algorithm for handling resource allocation in CRNs mak...
详细信息
The computational complexity of resource allocation processes,in cognitive radio networks(CRNs),is a major issue to be ***,the complicated solution of the optimal algorithm for handling resource allocation in CRNs makes it unsuitable to adopt in real-world applications where both cognitive users,CRs,and primary users,PUs,exist in the identical geographical ***,this work offers a primarily price-based power algorithm to reduce computational complexity in uplink scenarioswhile limiting interference to PUs to allowable ***,this paper,compared to other frameworks proposed in the literature,proposes a two-step approach to reduce the complexity of the proposed mathematical *** the first step,the subcarriers are assigned to the users of the CRN,while the cost function includes a pricing scheme to provide better power control algorithm with improved reliability proposed in the second *** main contribution of this paper is to lessen the complexity of the proposed algorithm and to offer flexibility in controlling the interference produced to the users of the primary networks,which has been achieved by including a pricing function in the proposed cost ***,the performance of the proposed power and subcarrier algorithm is confirmed for orthogonal frequency-division multiplexing(OFDM).Simulation results prove that the performance of the proposed algorithm is better than other algorithms,albeit with a lesser complexity of O(NM)+O(Nlog(N)).
A significant risk to the longevity and intelligence of fundamental infrastructure, such bridges and pipelines, is corrosion. Easy finding and erosion monitoring are important for predicting additional setbacks and en...
详细信息
ISBN:
(纸本)9798350381887
A significant risk to the longevity and intelligence of fundamental infrastructure, such bridges and pipelines, is corrosion. Easy finding and erosion monitoring are important for predicting additional setbacks and ensuring transparency in security. This investigation offers a creative method of erosion discovery by utilizing the YOLOv8 question discovery computation. It also works in tandem with the WANDB stage to facilitate efficient show planning and organization. Said to offer a new method of managing videos by combining the powerful visualization powers of the W&B stage with YOLOv8, an enhanced version of the YOLO protest demonstration. YOLOv8 refers to a state-of-the-art development within the YOLO family, intended to surpass expectations in real-time protest finding tasks with increased productivity and accuracy. Additionally, considered looking into the use of cloud-based virtual machines as an affordable alternative to traditional setups like purplish blue for show organization and inspection, with a focus on the W&B Cloud advertising. One of YOLOv8's unique features is its single-pass localization method, which handles the entire video outline in a single forward pass over the neural network. This increases the pace of discovery and eliminates the need for intricate post-processing. Improved question localization and classification accuracy are encouraged by secured boundary boxes and network cell designs. The real-time position optimization of YOLOv8's engineering makes it particularly suitable for video feeds. Furthermore, by employing the Weights & Predispositions stage, analysts and experts can visualize and monitor the performance of the YOLOv8 demonstration during video preparation. W&B provides easily navigable dashboards and visualizations that enable real-time tracking of important metrics, demonstrate behavior, and pinpoint the site of protests. This integration provides a deeper comprehension of the model's features and potential areas of improv
Intent-driven networking propelled by new networking concepts as well as the introduction of achievements from machine learning and artificial intelligence domains in network management, has gained a significant momen...
详细信息
The paper deals with different industrial control system (ICS) cyber threats by investigating simple to implement and effective protection solution. The protection solution is a combination of software (hereinafter re...
详细信息
暂无评论