by Saifullah Khan, Onel Luis Alcaraz López, Abdul Basit Khattak
ABSTRACT: Pre-processing is a key stage in the Machine Learning (ML) pipeline. In such a stage, data is prepared and organized for feeding it to the ML models for a prediction task. One of the problems that...
by Nanmin Wang, Haiyan Kang
ABSTRACT: The security issues caused by the insertion of hardware Trojans seriously threaten the security and reliability of the entire hardware device. This article constructs a detection model that...
by Pratibha Rani, Arti M. K., Pradeep Kumar Dimri
ABSTRACT: In this article, the space-time transmit technique (STTT) is examined in a massive MIMO environment with Rayleigh fading. The article characterizes the instantaneous signal-to-noise ratio (SNR)...
by Tawo Godwin A, Ayansi Francis E, Faith Praise O, Osahon Okoro O, Vincent N Ogar
ABSTRACT: In the contemporary digital landscape, network security is paramount to safeguard data integrity and prevent unauthorized access as data have been structured in the network through protocols. In...
by Shahid Naseem, Salbia Sidrat, Muhammad Mueed Hussain
ABSTRACT: Every day, cloud computing—which stores user data online—becomes more and more popular. Instead of being aware of security risks, the main goal of a cloud-based system is to use the internet as a...
by Lithungo K Murry, R. Kumar
ABSTRACT: Cellular networks can overcome their bandwidth bottleneck problem through the use of device-to-device communication paradigm. In instances of traffic congestion and natural calamities, these...
by Pranati Mishra, Ranjan Kumar Dash
ABSTRACT: Wireless sensor networks (WSNs) offer advantages in deployment flexibility and affordability due to their compact size and low cost. However, real-world WSN implementations face challenges,...
by Vladimir Rocha, Daniel Czeresnia, Carlo Kleber da Silva Rodrigues
ABSTRACT: Chord is a Distributed Hash Table widely used for its efficiency in searching for information. The efficiency of this structure relies on creating short paths of O(log 2 n) between two nodes, in...
by Arash Mazidi
ABSTRACT: Cloud computing enables users to access required resources, with the invention of high-end devices leading to exponential increases in cloud resource requests. This poses significant challenges...
by Phillipe Austria, Yoohwan Kim, Ju-Yeon Jo
ABSTRACT: The sharing of private information is a daunting, multifaceted, and expensive undertaking. Furthermore, identity management is an additional challenge that poses significant technological,...