Traditional smoke sensors are limited by the measurement principle and generally can only measure the smoke concentration in a local area. With the development of image processing technology, spatial non-contact smoke...
详细信息
Assessing the action quality of cyborg animals helps to adjust control strategies, guide the development of control algorithm, and enhance the efficiency of navigation and military applications. However, existing rese...
详细信息
Complexity science is an interdisciplinary scientific field that analyzes systems as holistic entities consisting of characteristics beyond the sum of a system’s individual *** paper presents current research across ...
详细信息
Complexity science is an interdisciplinary scientific field that analyzes systems as holistic entities consisting of characteristics beyond the sum of a system’s individual *** paper presents current research across the literature promoting cyber security as a complex adaptive *** introduce complex systems concepts and fields of study,and deliver historical context,main themes,and current research relevant to cyber *** of cyber operations research leveraging agent-based modeling demonstrate the power of computational modeling grounded in complex systems *** discuss cyber operations as a scientific field,define current shortfalls for scientific rigor,and provide examples of how a complexity science foundation can further research and practice across a variety of cyber-based *** propose standard definitions applicable to complex systems for cyber professionals and conclude with recommendations for future cyber operations research.
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication *** this paper,a text zero...
详细信息
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication *** this paper,a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking(SFASCDW)is proposed for content authentication and tampering detection of English text.A first-level order of alphanumeric mechanism,based on hidden Markov model,is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed *** researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique to analyze English ***,he extracts the features of the interrelationship among the contexts of the text,utilizes the extracted features as watermark information,and validates it later with the studied English text to detect any *** has been implemented using PHP with VS code *** robustness,effectiveness,and applicability of SFASCDW are proved with experiments involving four datasets of various lengths in random locations using the three common attacks,namely insertion,reorder,and *** SFASCDW was found to be effective and could be applicable in detecting any possible tampering.
Network acceleration is very important for Magnetic Resonance Imaging (MRI) reconstruction, as the device-specific retraining of a given network is usually necessary to overcome the scanner transfer problem. We propos...
详细信息
The Intelligent Transportation System (ITS) plays a critical role in the development of smart cities, and the traffic control capability of ITS requires accurate traffic flow prediction as the footstone. Due to the ne...
详细信息
With the exponential growth of mercantile 5G installation, experimentation into B5G and 6G has kicked off solemnly. However, it is too ahead of time to say what will 6G resemble to, it is assured that 6G systems will ...
详细信息
The phenomenon of distraction is very common, and its adverse effects are seen among people. The major cause underlying this issue is the ease with which adversarial web sites and web pages can be accessed. It is of u...
详细信息
The farming is one concerning the indispensable assets due to the fact of advent of ingredients but assumes sizeable portion about the economic regulation about each and every United States on America via which includ...
详细信息
New IoT devices generate massive real-time data. Fast, real-time stream processing is needed for IoT data insight extraction. There are pros and downsides to real-time stream processing for the Internet of Things (IoT...
详细信息
暂无评论