作者:
Amala, K.J.Rajeswari, D.School of Computing
College of Engineering and Technology Srm Institute of Science and Technology Department of Data Science and Business Systems Kattankulathur India
Information retrieval systems commonly depend on ranking models to prioritize search results, which requires efficient feature selection to improve accuracy. Feature selection improves the model's query relevance ...
详细信息
CBDC-as-a-problem looks like a mania of interest from central banks and financial institutions all over the world. It may describe CBDC technology and CBDC technology development, the positive aspects of CBDC and its ...
详细信息
The future sixth-generation(6G) paradigm aims to seamlessly integrate communication and environmental sensing capabilities into a single radio signal, promising improved efficiency and cost-effectiveness through simul...
详细信息
The future sixth-generation(6G) paradigm aims to seamlessly integrate communication and environmental sensing capabilities into a single radio signal, promising improved efficiency and cost-effectiveness through simultaneous data communications and environmental perception. At the core of this evolution, orthogonal frequency division multiplexing(OFDM) and its advanced waveforms emerge as pivotal for integrated sensing and communications(ISAC). This study introduces a concise and unified ISAC waveform design framework based on orthogonal multicarriers. This framework supports versatile applications of OFDM and its derivative waveforms within a generalized ISAC system, marking a significant leap in integrating communication and sensing capabilities. A distinguishing feature of this framework is its adaptability,allowing users to intelligently select modulation strategies based on their specific environmental needs. This adaptability optimizes performance across diverse scenarios. Central to our innovations is the proposal of discrete Fourier transformspread OFDM with index modulation(DFT-S-OFDM-IM). This framework is paired with newly proposed signal processing methods for single-input single-output and multiple-input multiple-output(MIMO) systems. Extensive evaluations highlight DFT-S-OFDM-IM's superiority, including dramatically reduced peak-to-average power ratios(PAPRs), competitive communication performance, and exceptional sensing capabilities, striking an elegant balance between communication capacity and environmental sensing precision.
With the rapid evolution of Internet technology,fog computing has taken a major role in managing large amounts of *** major concerns in this domain are security and ***,attaining a reliable level of confidentiality in...
详细信息
With the rapid evolution of Internet technology,fog computing has taken a major role in managing large amounts of *** major concerns in this domain are security and ***,attaining a reliable level of confidentiality in the fog computing environment is a pivotal *** different types of data stored in the fog,the 3D point and mesh fog data are increasingly popular in recent days,due to the growth of 3D modelling and 3D printing ***,in this research,we propose a novel scheme for preserving the privacy of 3D point and mesh fog *** Cat mapbased data encryption is a recently trending research area due to its unique properties like pseudo-randomness,deterministic nature,sensitivity to initial conditions,ergodicity,*** boost encryption efficiency significantly,in this work,we propose a novel Chaotic Cat *** sequence generated by this map is used to transform the coordinates of the fog *** improved range of the proposed map is depicted using bifurcation *** quality of the proposed Chaotic Cat map is also analyzed using metrics like Lyapunov exponent and approximate *** also demonstrate the performance of the proposed encryption framework using attacks like brute-force attack and statistical *** experimental results clearly depict that the proposed framework produces the best results compared to the previous works in the literature.
We consider the problem of vertex recoloring: we are given n vertices with their initial coloring, and edges arrive in an online fashion. The algorithm is required to maintain a valid coloring by means of vertex recol...
详细信息
ISBN:
(纸本)9783959773652
We consider the problem of vertex recoloring: we are given n vertices with their initial coloring, and edges arrive in an online fashion. The algorithm is required to maintain a valid coloring by means of vertex recoloring, where recoloring a vertex incurs a cost. The problem abstracts a scenario of job placement in machines (possibly in the cloud), where vertices represent jobs, colors represent machines, and edges represent "anti affinity" (disengagement) constraints. Online coloring in this setting is a hard problem, and only a few cases were analyzed. One family of instances which is fairly well-understood is bipartite graphs, i.e., instances in which two colors are sufficient to satisfy all constraints. In this case it is known that the competitive ratio of vertex recoloring is Θ(log n). In this paper we propose a generalization of the problem, which allows using additional colors (possibly at a higher cost), to improve overall performance. Concretely, we analyze the simple case of bipartite graphs of bounded largest bond (a bond of a connected graph is an edge-cut that partitions the graph into two connected components). From the upper bound perspective, we propose two algorithms. One algorithm exhibits a trade-off for the uniform-cost case: given Ω(log β) ≤ c ≤ O(log n) colors, the algorithm guarantees that its cost is at most O(logcn ) times the optimal offline cost for two colors, where n is the number of vertices and β is the size of the largest bond of the graph. The other algorithm is designed for the case where the additional colors come at a higher cost, D > 1: given ∆ additional colors, where ∆ is the maximum degree in the graph, the algorithm guarantees a competitive ratio of O(log D). From the lower bounds viewpoint, we show that if the cost of the extra colors is D > 1, no algorithm (even randomized) can achieve a competitive ratio of o(log D). We also show that in the case of general bipartite graphs (i.e., of unbounded bond size), any determinist
The research on Variational Quantum Algorithms (VQAs) has gained significant momentum because of their promising practicality in the noisy intermediate-scale quantum (NISQ) era. Recent studies highlight the potential ...
详细信息
This project is a collaborative effort to understand and address productivity challenges in remote development teams, employing a multifaceted approach that integrates software engineering, psychology, and design thin...
Individuals tend to apply preferences and beliefs as heuristics to effectively sift through the sheer amount of information available online. Such tendencies, however, often result in cognitive biases, which can skew ...
详细信息
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial *** IIoT nodes operate confidential data(such as medical,tr...
详细信息
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial *** IIoT nodes operate confidential data(such as medical,transportation,military,etc.)which are reachable targets for hostile intruders due to their openness and varied *** Detection systems(IDS)based on Machine Learning(ML)and Deep Learning(DL)techniques have got significant ***,existing ML and DL-based IDS still face a number of obstacles that must be *** instance,the existing DL approaches necessitate a substantial quantity of data for effective performance,which is not feasible to run on low-power and low-memory *** and fewer data potentially lead to low performance on existing *** paper proposes a self-attention convolutional neural network(SACNN)architecture for the detection of malicious activity in IIoT networks and an appropriate feature extraction method to extract the most significant *** proposed architecture has a self-attention layer to calculate the input attention and convolutional neural network(CNN)layers to process the assigned attention features for *** performance evaluation of the proposed SACNN architecture has been done with the Edge-IIoTset and X-IIoTID *** datasets encompassed the behaviours of contemporary IIoT communication protocols,the operations of state-of-the-art devices,various attack types,and diverse attack scenarios.
Since the nonconforming finite elements(NFEs)play a significant role in approximating PDE eigenvalues from below,this paper develops a new and parallel two-level preconditioned Jacobi-Davidson(PJD)method for solving t...
详细信息
Since the nonconforming finite elements(NFEs)play a significant role in approximating PDE eigenvalues from below,this paper develops a new and parallel two-level preconditioned Jacobi-Davidson(PJD)method for solving the large scale discrete eigenvalue problems resulting from NFE discretization of 2mth(m=1.2)order elliptic eigenvalue *** a spectral projection on the coarse space and an overlapping domain decomposition(DD),a parallel preconditioned system can be solved in each iteration.A rigorous analysis reveals that the convergence rate of our two-level PJD method is optimal and *** results supporting our theory are given.
暂无评论