Gas sensors targeted towards detection of low concentrations of hydrogen gas with fast response and recovery under room temperature (RT) conditions are essential for safe handling of this volatile compound. In this st...
详细信息
Automating trading decisions has been a pursuit of researchers and practitioners alike for decades. We contribute to the literature focusing on "pattern based" strategies. Dynamic time warping is used to gro...
详细信息
This paper investigates using cell networks (MANETs) for real-time automotive packages. The car industry increasingly seeks to benefit from the latest technology to improve its merchandise, and cellular ad hoc network...
详细信息
Switch getting to know has become increasingly famous in many aspects of pc vision, including picture segmentation. This paper explores switch-gaining knowledge for automated brain tumor segmentation using a deep gett...
详细信息
Parkinson's disease (PD) is an advanced neuro-degenerative condition where a large number of people around the world are profoundly affected. The scarcity of precise data regarding the typical circumstances faced ...
详细信息
Radio Dynamic Zones (RDZs) are being explored by the research community as an approach to safely test and evaluate spectrum sharing mechanisms and technologies. There is general consensus in the research community reg...
详细信息
This paper provides the development of green game idea procedures for spectrum sharing in upcoming 6G cellular networks. As dynamic spectrum get entry to keeps to advantage commercial interest, the want to broaden a s...
详细信息
Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneo...
详细信息
Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneous and dynamic distributed Internet of things environment between different Internet of *** is a wide demand for cooperation between equipment and management institutions in the smart ***,it is necessary to establish a trust mechanism to promote cooperation,and based on this,prevent data disorder caused by the interaction between honest terminals and malicious ***,most of the existing research on trust mechanism is divorced from the Internet of things environment,and does not consider the characteristics of limited computing and storage capacity and large differences of Internet of hings devices,resuling in the fact that the research on abstract trust trust mechanism cannot be directly applied to the Internet of things;On the other hand,various threats to the Internet of things caused by security vulnerabilities such as collision attacks are not *** at the security problems of cross domain trusted authentication of Intelligent City Internet of things terminals,a cross domain trust model(CDTM)based on self-authentication is *** most trust models,this model uses self-certified *** cross-domain process of internet of things(IoT)terminal can quickly establish a trust relationship with the current domain by providing its trust certificate stored in the previous domain *** the same time,in order to alleviate the collision attack and improve the accuracy of trust evaluation,the overall trust value is calculated by comprehensively considering the quantity weight,time attenuation weight and similarity ***,the simulation results show that CDTM has good anti collusion attack *** success rate of malicious interaction will not increase signifi*** with other model
The prevalence of social media and mobile computing has led to intensive user engagement in the emergent Cyber-Physical-Social-Thinking(CPST)***,the easy access,the lack of governance,and excessive use has generated a...
详细信息
The prevalence of social media and mobile computing has led to intensive user engagement in the emergent Cyber-Physical-Social-Thinking(CPST)***,the easy access,the lack of governance,and excessive use has generated a raft of new behaviors within CPST,which affects users’physical,social,and mental *** this paper,we conceive the Cyber-Syndrome concept to denote the collection of cyber disorders due to excessive or problematic Cyberspace interactions based on CPST *** we characterize the Cyber-Syndrome concept in terms of Maslow’s theory of Needs,from which we establish an in-depth theoretical understanding of Cyber-Syndrome from its etiology,formation,symptoms,and ***,we propose an entropy-based Cyber-Syndrome control mechanism for its computation and *** goal of this study is to give new insights into this rising phenomenon and offer guidance for further research and development.
The multiscale evaluation technique is a low-power facts aggregation method using numerous evaluation scales to mix data from several properties. The method is based on multiscale structures, in which more than one sc...
详细信息
暂无评论