|
|
|
Mohammad Javad Salariseddigh, Ons Dabbabi, Christian Deppe and Holger Boche
Numerous applications of the Internet of Things (IoT) feature an event recognition behavior where the established Shannon capacity is not authorized to be the central performance measure. Instead, the identification capacity for such systems is considere...
ver más
|
|
|
|
|
|
|
Saad Said Alqahtany, Ahmad B. Alkhodre, Abdulwahid Al Abdulwahid and Manar Alohaly
Steganography is a widely used technique for concealing confidential data within images, videos, and audio. However, using text for steganography has not been sufficiently explored. Text-based steganography has the advantage of a low bandwidth overhead, ...
ver más
|
|
|
|
|
|
|
Yongli Tang, Deng Pan, Panke Qin and Liping Lv
Federal learning and privacy protection are inseparable. The participants in federated learning need to be the targets of privacy protection. On the other hand, federated learning can also be used as a tool for privacy attacks. Group signature is regarde...
ver más
|
|
|
|
|
|
|
A. F. M. Shahen Shah
Unmanned aerial vehicles (UAVs) are valued in 5G and 6G networks due to their communication capabilities, low cost, and flexible deployment. Recently, UAV-aided emergency networks in disasters have been designed where one single large UAV is used. Compar...
ver más
|
|
|
|
|
|
|
Abidemi Emmanuel Adeniyi, Sanjay Misra, Eniola Daniel and Anthony Bokolo, Jr.
Background: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer technologies. However, in a world where third parties are capable of collecting, stealin...
ver más
|
|
|
|
|
|
|
Vasileios Nikolopoulos, Mara Nikolaidou, Maria Voreakou and Dimosthenis Anagnostopoulos
In Fog Computing, fog colonies are formed by nodes cooperating to provide services to end-users. To enable efficient operation and seamless scalability of fog colonies, decentralized control over participating nodes should be promoted. In such cases, aut...
ver más
|
|
|
|
|
|
|
Sonya Leech, Jonathan Dunne and David Malone
Within a supply chain organisation, where millions of messages are processed, reliability and performance of message throughput are important. Problems can occur with the ingestion of messages; if they arrive more quickly than they can be processed, they...
ver más
|
|
|
|
|
|
|
R.A. Elchenkov,M.E. Dunaev,K.S. Zaytsev
Pág. 62 - 69
The purpose of this work is to study methods for predicting the values of time series when processing streaming data in distributed systems in real time. To do this, the authors propose a modification of the autoregressive model with a given AR order by ...
ver más
|
|
|
|
|
|
|
Sandip Dutta
With the rapid development of the autonomous world, local decision making between devices is becoming important. This article provides a new paradigm (Rock-Paper-Scissors-Hammer: RPSH) that can reduce the number of conflicts or decision draws and thus in...
ver más
|
|
|
|
|
|
|
Bo Yang, Ruwei Huang and Jianan Zhao
Key-dependent message (KDM) security is of great research significance, to better analyse and solve the potential security problems in complex application scenarios. Most of the current KDM security schemes are based on traditional hard mathematical prob...
ver más
|
|
|
|