Channel state information (CSI) serves as a critical indicator of wireless signal conditions and is widely regarded by researchers for its sensitivity in detecting changes within the channel. However, traditional sens...
详细信息
The problem of high-precision indoor positioning in the 5G era has attracted more and more attention.A fingerprint location method based on matrix completion(MC-FPL)is proposed for 5G ultradense networks to overcome t...
详细信息
The problem of high-precision indoor positioning in the 5G era has attracted more and more attention.A fingerprint location method based on matrix completion(MC-FPL)is proposed for 5G ultradense networks to overcome the high costs of traditional fingerprint database construction and matching ***,a partial fingerprint database constructed and the accelerated proximal gradient algorithm is used to fill the partial fingerprint database to construct a full fingerprint ***,a fingerprint database division method based on the strongest received signal strength indicator is proposed,which divides the original fingerprint database into several sub-fingerprint ***,a classification weighted K-nearest neighbor fingerprint matching algorithm is *** estimated coordinates of the point to be located can be obtained by fingerprint matching in a sub-fingerprint *** simulation results show that the MC-FPL algorithm can reduce the complexity of database construction and fingerprint matching and has higher positioning accuracy compared with the traditional fingerprint algorithm.
This article presents a comparative study, from a multi-stakeholder perspective, aimed at defining future scenarios that safeguard human autonomy in the context of IoT technologies. The research utilizes a systematic ...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software *** feeds potentially syntactically or semantically malformed test data to a target program to mi...
详细信息
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software *** feeds potentially syntactically or semantically malformed test data to a target program to mine vulnerabilities and crash the *** recent years,considerable efforts have been dedicated by researchers and practitioners towards improving fuzzing,so there aremore and more methods and forms,whichmake it difficult to have a comprehensive understanding of the *** paper conducts a thorough survey of fuzzing,focusing on its general process,classification,common application scenarios,and some state-of-the-art techniques that have been introduced to improve its ***,this paper puts forward key research challenges and proposes possible future research directions that may provide new insights for researchers.
In this Letter, a delayed interference (DI)-based chaos generation scheme in a mutually coupled system consisting of a reflective semiconductor optical amplifier (RSOA) and a distributed feedback (DFB) semiconductor l...
详细信息
The computational complexity of privacy information retrieval protocols is often linearly related to database *** the database size is large,the efficiency of privacy information retrieval protocols is relatively *** ...
详细信息
The computational complexity of privacy information retrieval protocols is often linearly related to database *** the database size is large,the efficiency of privacy information retrieval protocols is relatively *** paper designs an effective privacy information retrieval model based on hybrid fully homomorphic *** assignment method is cleverly used to replace a large number of homomorphic encryption *** the same time,the multiplicative homomorphic encryption scheme is first used to deal with the large-scale serialization in the search,and then the fully homomorphic encryption scheme is used to deal with the remaining simple *** depth of operations supported by the fully homomorphic scheme no longer depends on the size of the database,but only needs to support the single homomorphic encryption scheme to decrypt the circuit *** on this hybrid homomorphic encryption retrieval model,the efficiency of homomorphic privacy information retrieval model can be greatly improved.
In recent years,blockchain technologies have expanded from the finance field to other areas that rely on trustbased *** healthcare industry represents one such area,as digital transformation disrupts relationships bet...
详细信息
In recent years,blockchain technologies have expanded from the finance field to other areas that rely on trustbased *** healthcare industry represents one such area,as digital transformation disrupts relationships between patients,healthcare professionals,and healthcare *** and healthcare institutes lack a proficient tool to verify the credentials of medical professionals in a digital ***,healthcare professionals lack a tool where they are in control over their *** first contribution of this paper is a proposal of a solution that leverages the private permissioned Hyperledger Fabric blockchain and smart contracts to provide a source of transparent trust for relationships within the healthcare ***,we pave the ground for GDPR compliance by storing only the hash values on the ***,we solve the problem of patient authentication by utilizing cryptographic ***,we prove the usability of the proposed solution by implementing a user interface and creating a live deployment.
The escalating frequency of cyber attacks against industrial installations over the past decade underscores the growing imperative to fortify cybersecurity in organizations. The advent of Industry 4.0 has interconnect...
详细信息
Digital technologies have a strong influence in our entertainment choices. Streaming services stand out in this aspect. Due to competition and environmental reasons, they may improve the efficiency of their services, ...
详细信息
暂无评论