Intelligent transportation system (ITS) plays an important role in assisting drivers to master road information and optimize traffic flow. However, image degradation resulting from complicated environmental factors, s...
详细信息
In recent years,Mobile Edge Computing(MEC)has received extensive research attention due to its characteristics,such as real-time data processing and flexible application ***,traditional MEC server deployment relies on...
详细信息
In recent years,Mobile Edge Computing(MEC)has received extensive research attention due to its characteristics,such as real-time data processing and flexible application ***,traditional MEC server deployment relies on the terrestrial Base Stations(BSs),resulting in high deployment costs and limited coverage *** response to these challenges,air-ground coordination has emerged,which effectively combines the advantages of edge computing and Unmanned Aerial Vehicles(UAVs),providing an effective architecture for edge *** utilizing the flexibility of UAVs and empowering them into edge nodes with computing resources,the coverage range of MEC can be expanded,thereby reducing the reliance of edge devices on terrestrial ***,leveraging terrestrial BSs as supplements to the computing power compensates for relatively limited computational capabilities of *** extensive studies have been conducted on air-ground coordination,there are few related summaries of application technologies and ***,the key technologies of air-ground coordination and applications are comprehensively reviewed in this ***,to provide guidance for interested researchers,the development trends and potential applications of air-ground coordination are explored.
In this study, we explore the concept of cosmological inflation within the framework of the f(T, T)theory of gravity, where f is a general function of the torsion scalar T and the trace T of the energy-momentum *** is...
详细信息
In this study, we explore the concept of cosmological inflation within the framework of the f(T, T)theory of gravity, where f is a general function of the torsion scalar T and the trace T of the energy-momentum *** is assumed that the conditions of slow-roll inflation are applicable in f(T, T) gravity. To determine different observables related to inflation, such as the tensor-to-scalar ratio r, scalar spectral index ns, spectral index αs, and tensor spectral index nt, the Hubble slow-roll parameters are utilized for a particular model of f(T, T). Lastly, an assessment is carried out to determine the feasibility of the models by conducting a numerical analysis of the parameters. The findings indicate that it is feasible to achieve compatibility with the observational measurements of slow-roll parameters by utilizing different values of the free parameters.
To increase the power generated by solid oxide fuel cells(SOFCs),multiple cells have to be connected into a *** of cell performance is a worldwide concern in the practical application of stack,which is known to be una...
详细信息
To increase the power generated by solid oxide fuel cells(SOFCs),multiple cells have to be connected into a *** of cell performance is a worldwide concern in the practical application of stack,which is known to be unavoidable and caused by manufacturing and operating ***,the effect of such nonuniformity on SOFCs that are connected in parallel has not been discussed in detail so *** paper provides detailed experimental data on the current distribution within a stack with nonuniform cells in parallel connection,based on the basics of electricity and *** phenomena found in such a parallel system are the“self-discharge effect”in standby mode and the“capacity-proportional-load sharing effect”under normal operating *** is believed that the experimental method and results proposed in this paper can be applied to other types of fuel cell or even other energy systems.
Face recognition is the most extensively utilized verification method for security and public safety. In many nations, the Automatic Border Control system uses face recognition to confirm the identification of travele...
详细信息
Face recognition is the most extensively utilized verification method for security and public safety. In many nations, the Automatic Border Control system uses face recognition to confirm the identification of travelers. The ABC system is vulnerable to Face morphing attacks;the face recognition systems give acceptance to the traveler, even though the passport photo does not represent the actual image of the person but is a result of the merger of two images. Therefore, it is vital to determine whether the passport image is altered (morph) or actual. This research proposes an improved method to extract features from facial images. The proposed method consists of four phases: in the first stage, morph images were generated using a set of databases of images of real people, used every two images that were similar in general shape or landmarks in producing the morphed image using three types of techniques used in this field (Automatic selection landmark, StyleGAN, and Manual selection landmark). StyleGAN has been relied upon to achieve the best results in producing artifact-free images. In the second phase, a Faster Region Convolution neural network is utilized for determining and cutting important landmarks area (eyes, nose, mouth, skin) in the face, where we leave the hair, ears, and image background for every image in the database. In the second phase, feature extraction uses two way: wavelet scatter that represent frequency features based on a low pass filter the second way using CNN to provide the best features, which are then classified as morphed or real. The classification process relied on a multi-classifier, the Deep Neural Network (DNN) classifier, and the second classifier, the Support Vector Machine (SVM), which achieved the highest result compared to the rest of the classifiers (K-nearest neighbor, Naïve Bayes, Decision Tree, generalized additive model). The DNN classifier achieved an average accuracy of accuracy 99.69% compared with SVM, with an accuracy
With the rapid advancement of Voice over Internet Protocol(VoIP)technology,speech steganography techniques such as Quantization Index Modulation(QIM)and Pitch Modulation Steganography(PMS)have emerged as significant c...
详细信息
With the rapid advancement of Voice over Internet Protocol(VoIP)technology,speech steganography techniques such as Quantization Index Modulation(QIM)and Pitch Modulation Steganography(PMS)have emerged as significant challenges to information *** techniques embed hidden information into speech streams,making detection increasingly difficult,particularly under conditions of low embedding rates and short speech *** steganalysis methods often struggle to balance detection accuracy and computational efficiency due to their limited ability to effectively capture both temporal and spatial features of speech *** address these challenges,this paper proposes an Efficient Sliding Window Analysis Network(E-SWAN),a novel deep learning model specifically designed for real-time speech steganalysis.E-SWAN integrates two core modules:the LSTM Temporal Feature Miner(LTFM)and the Convolutional Key Feature Miner(CKFM).LTFM captures long-range temporal dependencies using Long Short-Term Memory networks,while CKFM identifies local spatial variations caused by steganographic embedding through convolutional *** modules operate within a sliding window framework,enabling efficient extraction of temporal and spatial *** results on the Chinese CNV and PMS datasets demonstrate the superior performance of *** conditions of a ten-second sample duration and an embedding rate of 10%,E-SWAN achieves a detection accuracy of 62.09%on the PMS dataset,surpassing existing methods by 4.57%,and an accuracy of 82.28%on the CNV dataset,outperforming state-of-the-art methods by 7.29%.These findings validate the robustness and efficiency of E-SWAN under low embedding rates and short durations,offering a promising solution for real-time VoIP *** work provides significant contributions to enhancing information security in digital communications.
This article presents a mathematical model addressing a scenario involving a hybrid nanofluid flow between two infinite parallel *** plate remains stationary,while the other moves downward at a squeezing *** space bet...
详细信息
This article presents a mathematical model addressing a scenario involving a hybrid nanofluid flow between two infinite parallel *** plate remains stationary,while the other moves downward at a squeezing *** space between these plates contains a Darcy-Forchheimer porous medium.A mixture of water-based fluid with gold(Au)and silicon dioxide(Si O2)nanoparticles is *** contrast to the conventional Fourier's heat flux equation,this study employs the Cattaneo-Christov heat flux equation.A uniform magnetic field is applied perpendicular to the flow direction,invoking magnetohydrodynamic(MHD)***,the model accounts for Joule heating,which is the heat generated when an electric current passes through the *** problem is solved via NDSolve in *** and statistical analyses are conducted to provide insights into the behavior of the nanomaterials between the parallel plates with respect to the flow,energy transport,and skin *** findings of this study have potential applications in enhancing cooling systems and optimizing thermal management *** is observed that the squeezing motion generates additional pressure gradients within the fluid,which enhances the flow rate but reduces the frictional ***,the fluid is pushed more vigorously between the plates,increasing the flow *** the fluid experiences higher flow rates due to the increased squeezing effect,it spends less time in the region between the *** thermal relaxation,however,abruptly changes the temperature,leading to a decrease in the temperature fluctuations.
In this study, we focus into the non-relativistic wave equation described by the Schrodinger equation, specifically considering angular-dependent potentials within the context of a topological defect background genera...
详细信息
In this study, we focus into the non-relativistic wave equation described by the Schrodinger equation, specifically considering angular-dependent potentials within the context of a topological defect background generated by a cosmic string. Our primary goal is to explore quasi-exactly solvable problems by introducing an extended ring-shaped potential. We utilize the Bethe ansatz method to determine the angular solutions, while the radial solutions are obtained using special functions. Our findings demonstrate that the eigenvalue solutions of quantum particles are intricately influenced by the presence of the topological defect of the cosmic string,resulting in significant modifications compared to those in a flat space background. The existence of the topological defect induces alterations in the energy spectra, disrupting ***, we extend our analysis to study the same problem in the presence of a ring-shaped potential against the background of another topological defect geometry known as a point-like global monopole. Following a similar procedure, we obtain the eigenvalue solutions and analyze the results. Remarkably, we observe that the presence of a global monopole leads to a decrease in the energy levels compared to the flat space results. In both cases, we conduct a thorough numerical analysis to validate our findings.
Link prediction stands as a crucial network challenge, garnering attention over the past decade, with its significance heightened by the escalating volume of network data. In response to the pressing need for swift re...
详细信息
Link prediction stands as a crucial network challenge, garnering attention over the past decade, with its significance heightened by the escalating volume of network data. In response to the pressing need for swift research focus, this study introduces an innovative approach—the Anchor-aware Graph Autoencoder integrated with the Gini Index (AGA-GI)—aimed at gathering data on the global placements of link nodes within the link prediction framework. The proposed methodology encompasses three key components: anchor points, node-to-anchor paths, and node embedding. Anchor points within the network are identified by leveraging the graph structure as an input. The determination of anchor positions involves computing the Gini indexes (GI) of nodes, leading to the generation of a candidate set of anchors. Typically, these anchor points are distributed across the network structure, facilitating substantial informational exchanges with other nodes. The location-based similarity approach computes the paths between anchor points and nodes. It identifies the shortest path, creating a node path information function that incorporates feature details and location similarity. The ultimate embedding representation of the node is then formed by amalgamating attributes, global location data, and neighbourhood structure through an auto-encoder learning methodology. The Residual Capsule Network (RCN) model acquires these node embeddings as input to learn the feature representation of nodes and transforms the link prediction problem into a classification task. The suggested (AGA-GI) model undergoes comparison with various existing models in the realm of link prediction. These models include Attributes for Link Prediction (SEAL), Embeddings, Subgraphs, Dual-Encoder graph embedding with Alignment (DEAL), Embeddings and Spectral Clustering (SC), Deep Walk (DW), Graph Auto-encoder (GAE), Variational Graph Autoencoders (VGAE), Graph Attention Network (GAT), and Graph Conversion Capsule Link (G
Distributed storage systems often use locally recoverable codes for easy repair of node failure and batch codes for load balancing. In this survey, we give an expository overview of the service aspects of these two fa...
详细信息
暂无评论