Biometric technologies have been widely adopted in various commercial products, ranging from security systems to personal devices, due to their exceptional reliability and user-friendliness. Among these, palmprint bio...
详细信息
Hardware Verification of Deep Learning Accelerators (DLAs) has become critically important for testing the reliability and trustworthiness of Learning Enabled Autonomous Systems (LEAS). In this paper, we introduce a s...
详细信息
We created a customize DNS operator to address the shortcoming of CoreDNS in Kubernetes. While Kubernetes is gaining popularity in orchestrating containers, many organizations with Virtual Machine (VM) based legacy ap...
详细信息
Requirements elicitation process is employed for the identification of stakeholders of an information system. A large number of stakeholders from different domains across the globe participate during the requirements ...
详细信息
Testing the reliability and trustworthiness of high-performance computing (HPC) applications has made Deep Learning Accelerators (DLAs) verification critically important. In this paper, we introduce a hardware verific...
详细信息
Due to a tremendous increase in mobile traffic,mobile operators have started to restructure their networks to offload their *** directions will lead to fundamental changes in the design of future Fifthgeneration(5G)ce...
详细信息
Due to a tremendous increase in mobile traffic,mobile operators have started to restructure their networks to offload their *** directions will lead to fundamental changes in the design of future Fifthgeneration(5G)cellular *** the formal reason,the study solves the physical network of the mobile base station for the prediction of the best characteristics to develop an enhanced network with the help of graph *** number that can be uniquely calculated by a graph is known as a graph *** the last two decades,innumerable numerical graph invariants have been portrayed and used for correlation *** any case,no efficient assessment has been embraced to choose,how much these invariants are connected with a network *** paper will talk about two unique variations of the hexagonal graph with great capability of forecasting in the field of optimized mobile base station topology in setting with physical *** K-banhatti sombor invariants(KBSO)and Contrharmonic-quadratic invariants(CQIs)are newly introduced and have various expectation characteristics for various variations of hexagonal graphs or *** the hexagonal networks are used in mobile base stations in layered,forms called *** review settled the topology of a hexagon of two distinct sorts with two invariants KBSO and CQIs and their reduced *** deduced outcomes can be utilized for the modeling of mobile cellular networks,multiprocessors interconnections,microchips,chemical compound synthesis and memory interconnection *** results find sharp upper bounds and lower bounds of the honeycomb network to utilize the Mobile base station network(MBSN)for the high load of traffic and minimal traffic also.
The paper proposes 'AdaptVR' a virtual reality (VR) system designed to enhance dental training through realistic real tile simulations and adaptive learning environment, to overcome traditional training challe...
详细信息
The accelerated advancement of consumer Internet of Things (CIoT) devices has resulted in their pervasive integration into the fabric of contemporary lifestyles. As these devices are capable of collecting vast quantit...
详细信息
Most large-scale systems including self-adaptive systems utilize feature models(FMs)to represent their complex architectures and benefit from the reuse of commonalities and variability ***-adaptive systems(SASs)are ca...
详细信息
Most large-scale systems including self-adaptive systems utilize feature models(FMs)to represent their complex architectures and benefit from the reuse of commonalities and variability ***-adaptive systems(SASs)are capable of reconfiguring themselves during the run time to satisfy the scenarios of the requisite ***,reconfiguration of SASs corresponding to each adaptation of the system requires significant computational time and *** process of configuration reuse can be a better alternative to some contexts to reduce computational time,effort and ***,systems’complexity can be reduced while the development process of systems by reusing elements or *** are considered one of the new ways of reuse process that are able to introduce new opportunities for the reuse process beyond the conventional system *** current FM-based modelling techniques represent,manage,and reuse elementary features to model SASs concepts,modeling and reusing configurations have not yet been *** this context,this study presents an extension to FMs by introducing and managing configuration features and their reuse *** results demonstrate that reusing configuration features reduces the effort and time required by a reconfiguration process during the run time to meet the required scenario according to the current context.
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure ***,there is a bad need for protecting and securing the color medical...
详细信息
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure ***,there is a bad need for protecting and securing the color medical images against impostors and *** this paper,an optical medical image security approach is *** is based on the optical bit-plane Jigsaw Transform(JT)and Fractional Fourier Transform(FFT).Different kernels with a lone lens and a single arbitrary phase code are exploited in this security approach.A preceding bit-plane scrambling process is conducted on the input color medical images prior to the JT and FFT processes to accomplish a tremendous level of robustness and *** confirm the efficiency of the suggested security approach for secure color medical image communication,various assessments on different color medical images are examined based on different statistical security ***,a comparative analysis is introduced between the suggested security approach and other conventional cryptography *** simulation outcomes acquired for performance assessment demonstrate that the suggested security approach is highly *** has excellent encryption/decryption performance and superior security results compared to conventional cryptography approaches with achieving recommended values of average entropy and correlation coefficient of 7.63 and 0.0103 for encrypted images.
暂无评论