Edge caching is a promising technique for effectively reducing backhaul pressure and content access latency in the Internet of Vehicles (IoV). However, the high mobility of vehicles and dynamic user requests often lea...
详细信息
The increasing demand for in-vehicle applications has raised the complexity and computational load, while the in-vehicle tasks exhibit a sensitivity to latency. Previous research has proposed utilizing the idle comput...
详细信息
The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent *** sensing layer of IIoT comprises the edge converge...
详细信息
The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent *** sensing layer of IIoT comprises the edge convergence layer and the end sensing layer,with the former using intelligent fusion terminals for real-time data collection and ***,the influx of multiple low-voltage in the smart grid raises higher demands for the performance,energy efficiency,and response speed of the substation fusion ***,it brings significant security risks to the entire distribution substation,posing a major challenge to the smart *** response to these challenges,a proposed dynamic and energy-efficient trust measurement scheme for smart grids aims to address these *** scheme begins by establishing a hierarchical trust measurement model,elucidating the trust relationships among smart IoT *** then incorporates multidimensional measurement factors,encompassing static environmental factors,dynamic behaviors,and energy *** comprehensive approach reduces the impact of subjective factors on trust ***,the scheme incorporates a detection process designed for identifying malicious low-voltage end sensing units,ensuring the prompt identification and elimination of any malicious ***,in turn,enhances the security and reliability of the smart grid *** effectiveness of the proposed scheme in pinpointing malicious nodes has been demonstrated through simulation ***,the scheme outperforms established trust metric models in terms of energy efficiency,showcasing its significant contribution to the field.
A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation *** MHNN is simulated and dynamicall...
详细信息
A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation *** MHNN is simulated and dynamically analyzed,and implemented on ***,a new pseudo-random number generator(PRNG)based on MHNN is *** post-processing unit of the PRNG is composed of nonlinear post-processor and XOR calculator,which effectively ensures the randomness of *** experiments in this paper comply with the IEEE 754-1985 high precision32-bit floating point standard and are done on the Vivado design tool using a Xilinx XC7 Z020 CLG400-2 FPGA chip and the Verilog-HDL hardware programming *** random sequence generated by the PRNG proposed in this paper has passed the NIST SP800-22 test suite and security analysis,proving its randomness and high ***,an image encryption system based on PRNG is proposed and implemented on FPGA,which proves the value of the image encryption system in the field of data encryption connected to the Internet of Things(Io T).
The rise of Multi-access Edge Computing (MEC) speeds up mobile user services and resolves service delays caused by long-distance transmission to cloud servers. However, in task-intensive scenarios, edge server process...
详细信息
The concept of Network Function Virtualization (NFV) enables the realization of services as a Service Function Chain (SFC) that is composed of multiple Virtual Network Functions (VNFs), allowing for flexible deploymen...
详细信息
Multi-access Edge Computing (MEC) can find its wide applications in various resource-constrained scenario where the user needs to pay a price to the server for meeting the latency requirements of their own tasks. Howe...
详细信息
In deep learning-based object detection, labeled data is crucial. However, annotating ship targets in Synthetic Aperture Radar (SAR) images is challenging because of the distinct characteristics of SAR images, especia...
详细信息
Deep learning(DL) systems exhibit multiple behavioral characteristics such as correctness, robustness, and fairness. Ensuring that these behavioral characteristics function properly is crucial for maintaining the accu...
详细信息
Open classification is the problem where there exist some unseen/unknown classes in the test set, i.e., these unknown/unseen classes don’t appear when the model is trained. Existing work often maps samples to high-di...
详细信息
暂无评论