Cross-Site Request Forgery (CSRF) remains a pervasive vulnerability in web applications, appearing regularly in the OWASP Top 10 lists, posing significant threats to user data and system integrity despite the existenc...
详细信息
This paper introduces a dual-band millimeter-wave flexible multi-input multi-output (MIMO) antenna for wearable applications, comprising four identical elements in a cross configuration on a flexible Rogers RT5880 sub...
详细信息
In this digital era, users frequently share their thoughts, preferences, and ideas through social media, which reflect their Basic Human Values. Basic Human Values (aka values) are the fundamental aspects of human beh...
详细信息
This research paper delves into the intersection of advanced technology and military strategies, specifically focusing on the imperative task of camouflaged object detection within the Indian Paramilitary forces. Leve...
详细信息
This paper investigates a security problem of simultaneously addressing two types of attacks:Eavesdropping and *** authors model the target system as a discrete-event system(DES)with subsets of concealable events and ...
详细信息
This paper investigates a security problem of simultaneously addressing two types of attacks:Eavesdropping and *** authors model the target system as a discrete-event system(DES)with subsets of concealable events and protectable events,in order to make the proposed methodology applicable to various practical systems and employ two existing works of DES security:Degree of opacity and state ***,the authors consider that all protectable events are observable,and some observable events are *** addition,protectable events cannot be protected once they are *** such a constraint,the goal is to figure out which events to conceal and which transitions to protect so that the prescribed requirements of degree of opacity and state protection are *** this work the authors decide which events to conceal as all transitions of a given event label are concealed or not *** proposed problem formulation also requires a solution to only involve absolutely necessary protectable events in order for the system to avoid superfluous protection *** authors first examine a general version of our security problem with an intuitive algorithm to compute acceptable solutions,and then present a special version which results in a reduced computation time compared to the general version.
The Internet of Things (IoT) involves complex, interconnected systems and devices that depend on context-sharing platforms for interoperability and information exchange. These platforms are, therefore, critical compon...
详细信息
This work investigates the use of Evolutionary Computation to generate fractal pattern structures representing the phenotype of an organism, using the Barnsley fern as an example. Genetic Algorithm is implemented as t...
详细信息
For precise illness diagnosis and therapy planning, medical imaging diagnostics are necessary. Nevertheless, diagnostic errors can occur due to noise and aberrations that are inherent to imaging modalities including C...
详细信息
In this paper,we present a comprehensive system model for Industrial Internet of Things(IIoT)networks empowered by Non-Orthogonal Multiple Access(NOMA)and Mobile Edge Computing(MEC)*** network comprises essential comp...
详细信息
In this paper,we present a comprehensive system model for Industrial Internet of Things(IIoT)networks empowered by Non-Orthogonal Multiple Access(NOMA)and Mobile Edge Computing(MEC)*** network comprises essential components such as base stations,edge servers,and numerous IIoT devices characterized by limited energy and computing *** central challenge addressed is the optimization of resource allocation and task distribution while adhering to stringent queueing delay constraints and minimizing overall energy *** system operates in discrete time slots and employs a quasi-static approach,with a specific focus on the complexities of task partitioning and the management of constrained resources within the IIoT *** study makes valuable contributions to the field by enhancing the understanding of resourceefficient management and task allocation,particularly relevant in real-time industrial *** results indicate that our proposed algorithmsignificantly outperforms existing approaches,reducing queue backlog by 45.32% and 17.25% compared to SMRA and ACRA while achieving a 27.31% and 74.12% improvement in Qn ***,the algorithmeffectively balances complexity and network performance,as demonstratedwhen reducing the number of devices in each group(Ng)from 200 to 50,resulting in a 97.21% reduction in complexity with only a 7.35% increase in energy *** research offers a practical solution for optimizing IIoT networks in real-time industrial settings.
E-learning can lead learners to achieve learning outcomes if it is designed based on several principles. One is applying assessments that motivate and inform ability levels. In Outcome-based Education (OBE), assessmen...
详细信息
暂无评论