Researchers and industry are working together to develop low carbon inventory models that comply with carbon pricing regulations while maintaining company profits. However, this task becomes more challenging when comp...
详细信息
Designing a robust active queue management(RAQM)is mandatory to avoid congestion in networks with wireless access links,because transmission control protocol(TCP)can detect con-gestion after its occurrence in a commun...
详细信息
Designing a robust active queue management(RAQM)is mandatory to avoid congestion in networks with wireless access links,because transmission control protocol(TCP)can detect con-gestion after its occurrence in a communication network and wireless links suffer from bottleneck capacity variations caused by fading and packet error rate(PER)in the acknowledgement ***,the average window size cannot be measured explicitly from the output signal and input and state delay are imposed to a network,which complicate theRAQMdesign problem in nonlinear ***,the main contribution of this study is to design a robust observer based control procedure based on integral sliding mode protocol to estimate the average window size,to control congestion in a TCP/RAQM network and to compensate input and state ***-ulation results via professional simulator NS-2 and SIMULINK confirm that the procedure can effectively estimate the window size and can robustly avoid congestion.
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ...
详细信息
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny *** it comes to deploying IoT,everyone agrees that security is the biggest *** is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square *** research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted *** lightweight cryptography,the information sent between these gadgets may be *** order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance *** also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.
Polarization sensitivity is a fundamental phenomenon observed in nature, and its application is vital for advancing scientific discoveries. Here, we present a microsphere-assisted polarized light microscopy method tha...
详细信息
The metaverse is a developing field that crosses several areas of multimedia research. In this paper, we introduce the 256-MetaverseRecords dataset, a novel and extensive collection of annotated screen recordings in t...
详细信息
Few previous Reversible Visible Watermarking(RVW)schemes have both good transparency and watermark *** adaptive RVW scheme that integrates Total Variation and visual perception in Block Truncation Coding(BTC)compresse...
详细信息
Few previous Reversible Visible Watermarking(RVW)schemes have both good transparency and watermark *** adaptive RVW scheme that integrates Total Variation and visual perception in Block Truncation Coding(BTC)compressed domain,called TVB-RVW is proposed in this paper.A new mean image estimation method for BTC-compressed images is first developed with the help of Total ***,a visual perception factor computation model is devised by fusing texture and luminance *** adaptive watermark embedding strategy is used to embed the visible watermark with the effect of the visual perception factor in the BTC ***,a lossless embedding method of the encrypted visible watermark is exploited to deter illegal watermark *** visible watermark can be removed since the visual perception factor and the estimated mean image remain unchanged before and after watermark *** experiments validate the superiority of the proposed algorithm over previous RVW schemes in BTC in terms of the visual quality of watermarked images and watermark visibility,and it can achieve a good balance between transparency and watermark visibility.
This article evaluates techniques for obtaining facial images from convolutional neural networks to identify emotion expressions. The primary goal of the paper is to discuss the most often used approaches to analyzing...
详细信息
This paper addresses the challenges in integrating Metaverse Recordings in Multimedia Information Retrieval as a new type of multimedia. Specifically, we describe the characteristics of video content and explain the k...
详细信息
In this paper, we study the impact of various eaves-dropping attacks on the secrecy performance in wireless power transfer (WPT)-based secure multi-hop transmission. Since each node has a limited power supply, each no...
详细信息
Data is the lifeblood of the modern world, forming a fundamental part of AI, decision-making, and research advances. With increase in interest in data, governments have taken important steps towards a regulated data w...
详细信息
Data is the lifeblood of the modern world, forming a fundamental part of AI, decision-making, and research advances. With increase in interest in data, governments have taken important steps towards a regulated data world, drastically impacting data sharing and data usability and resulting in massive amounts of data confined within the walls of organizations. While synthetic data generation (SDG) is an appealing solution to break down these walls and enable data sharing, the main drawback of existing solutions is the assumption of a trusted aggregator for generative model training. Given that many data holders may not want to, or be legally allowed to, entrust a central entity with their raw data, we propose a framework for collaborative and private generation of synthetic tabular data from distributed data holders. Our solution is general, applicable to any marginal-based SDG, and provides input privacy by replacing the trusted aggregator with secure multi-party computation (MPC) protocols and output privacy via differential privacy (DP). We demonstrate the applicability and scalability of our approach for the state-of-the-art select-measure-generate SDG algorithms MWEM+PGM and AIM. Copyright 2024 by the author(s)
暂无评论