In this paper, we performed an analysis of the outage probability (Pout) at the output of the receiver with selection combination (SC) with L branches of the wireless communication system in the presence of Beaulieu-X...
详细信息
This paper presents a MATLAB Graphical User Interface (GUI) based tool that determines the performance evaluation metrics of the physically unclonable functions (PUFs). The PUFs are hardware security primitives which ...
详细信息
Spam has turned into a big predicament these days,due to the increase in the number of spam emails,as the recipient regularly receives piles of *** only is spam wasting users’time and *** addition,it limits the stora...
详细信息
Spam has turned into a big predicament these days,due to the increase in the number of spam emails,as the recipient regularly receives piles of *** only is spam wasting users’time and *** addition,it limits the storage space of the email box as well as the disk ***,spam detection is a challenge for individuals and organizations *** advance spam email detection,this work proposes a new spam detection approach,using the grasshopper optimization algorithm(GOA)in training a multilayer perceptron(MLP)classifier for categorizing emails as ham and ***,MLP and GOA produce an artificial neural network(ANN)model,referred to(GOAMLP).Two corpora are applied Spam Base and UK-2011Web spam for this ***,the finding represents evidence that the proposed spam detection approach has achieved a better level in spam detection than the status of the art.
The Named Data Networking (NDN) paradigm has been used as a promising vehicle communication model, namely the Vehicular Named Data Networking (V-NDN) model. In NDN, delivery of interest in the NDN network is done by s...
详细信息
In this paper, we propose a novel dual-mode Q-learning hardware accelerator (DMQ) for shortest path and coverage area problems. The hardware accelerator design uses only an agent to tackle multiple modes, in this case...
详细信息
The existence of IT services in supporting business processes is a must in today's modern organizations. The main goal to be achieved is to maintain the existence of the organization in accordance with the times. ...
详细信息
The reconfigurable intelligent surface(RIS) has been recognized as an essential enabling technology for sixth-generation(6G) mobile communication networks. An RIS comprises a large number of small and low-cost reflect...
详细信息
The reconfigurable intelligent surface(RIS) has been recognized as an essential enabling technology for sixth-generation(6G) mobile communication networks. An RIS comprises a large number of small and low-cost reflecting elements whose parameters can be dynamically adjusted with a programmable *** of these elements can effectively reflect a phase-shifted version of the incident electromagnetic wave. By configuring the wave phases in real time, the propagation environment of the information-bearing signals can be dynamically manipulated to enhance communication reliability, boost transmission rate, expand cellular coverage, and strengthen communication security. In this study, we provide an overview on RIS-assisted wireless communications. Specifically, we elaborate on the state-of-the-art enabling techniques for the RIS technology as well as their corresponding substantial benefits from the perspectives of RIS reflection and RIS modulation. With these benefits, we envision the integration of RISs into emerging applications for6G. In addition, communication security is of unprecedented importance in future 6G networks with ubiquitous wireless services in multifarious verticals and areas. We highlight potential contributions of RISs to physical-layer security, in terms of secrecy rate and secrecy outage probability, exemplified by a typical case study from both theoretical and numerical aspects. Finally, we discuss challenges and opportunities on the deployment of RISs in practice to motivate future research.
Biometric verification especially faces recognition has been widely applied in daily life, including in immigration. Face recognition is used for identification verification in passport identities. But there is a secu...
详细信息
With the expansion of information and communication technology, human vulnerability to security threats is increasing. One of those threats is phone call-based fraud. Numerous studies on phone scam detection have been...
详细信息
In biosensing, label-free detection techniques have the advantage of a shorter analysis time and can be more cost-effective. In this paper a localized surface plasmon resonance (LSPR) sensor based on hexagonally arran...
详细信息
暂无评论