Over the past few decades, wireless communications have advanced tremendously and have become an indispensable part of our lives. Wireless networks have become more and more pervasive in order to guarantee global digi...Over the past few decades, wireless communications have advanced tremendously and have become an indispensable part of our lives. Wireless networks have become more and more pervasive in order to guarantee global digital connectivity. Wireless devices have quickly evolved into multimedia smartphones running applications that demand high-speed and high-quality data connections.展开更多
5G mobile cellular networks are required to provide the significant increase in network throughput,cell-edge data rate,massive connectivity,superior spectrum efficiency,currently deploying long-term evolution(LTE)and ...5G mobile cellular networks are required to provide the significant increase in network throughput,cell-edge data rate,massive connectivity,superior spectrum efficiency,currently deploying long-term evolution(LTE)and LTE-advanced networks.To meet these challenges of 5G networks,展开更多
5G mobile cellular networks are required to provide the significant increase in network throughput, cell-edge data rate, massive connectivity, superior spectrum efficiency, high energy efficiency and low latency, comp...5G mobile cellular networks are required to provide the significant increase in network throughput, cell-edge data rate, massive connectivity, superior spectrum efficiency, high energy efficiency and low latency, compared with the currently deploying long-term evolution (LTE) and LTE-advanced networks. To meet these challenges of 5G networks, innovative technologies on radio air-interface and radio access network (RAN) are important in PHY design. Recently,展开更多
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control sy...Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources.This paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN method.This technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access decision-making.The proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy rate.Additionally,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern organizations.Furthermore,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management.展开更多
This paper provides a review on the diversity techniques of IDMA (Interleave Division Multiple Access) technology in underwater wireless IDMA employs interleavers as the only means in order to distinguish the users. T...This paper provides a review on the diversity techniques of IDMA (Interleave Division Multiple Access) technology in underwater wireless IDMA employs interleavers as the only means in order to distinguish the users. This paper provides a comprehensive study of diversity techniques in IDMA scheme to mitigate the fading issue. In this paper, we compare the different generation diversity techniques in IDMA scheme on computational complexity, bit error rate and memory requirement. Recent advancement in underwater communication is modulation techniques, multiplexing techniques and multiple access techniques. Underwater communication channel is characterized.展开更多
在开发基于网络的数据库信息系统当中,经常会遇到要求向数据库信息系统当中存入或取出图片的问题,讨论了向数据库信息系统中存取图片的实现方法。考虑到Delphi编程语言和SQL Server数据库的强大功能和优越性,重点研究了运用Delphi7.0对S...在开发基于网络的数据库信息系统当中,经常会遇到要求向数据库信息系统当中存入或取出图片的问题,讨论了向数据库信息系统中存取图片的实现方法。考虑到Delphi编程语言和SQL Server数据库的强大功能和优越性,重点研究了运用Delphi7.0对SQL Server 2000数据库中的image数据类型进行存取的Web实现方法,并给出部分程序代码,这些技巧在开发基于ASP、ASP.NET的网上数据库应用中具有很高的实用价值。展开更多
本文阐述了高速铁路(以下简称高铁)宽带无线接入系统的需求,研究了高铁宽带无线接入系统的特点,分析了现有无线接入技术的优势与不足,探讨了一种新型的高铁宽带无线接入结构High Speed Mobile Cell(Himocell),最后讨论了高铁宽带无线接...本文阐述了高速铁路(以下简称高铁)宽带无线接入系统的需求,研究了高铁宽带无线接入系统的特点,分析了现有无线接入技术的优势与不足,探讨了一种新型的高铁宽带无线接入结构High Speed Mobile Cell(Himocell),最后讨论了高铁宽带无线接入中的几个关键技术。展开更多
文摘Over the past few decades, wireless communications have advanced tremendously and have become an indispensable part of our lives. Wireless networks have become more and more pervasive in order to guarantee global digital connectivity. Wireless devices have quickly evolved into multimedia smartphones running applications that demand high-speed and high-quality data connections.
文摘5G mobile cellular networks are required to provide the significant increase in network throughput,cell-edge data rate,massive connectivity,superior spectrum efficiency,currently deploying long-term evolution(LTE)and LTE-advanced networks.To meet these challenges of 5G networks,
文摘5G mobile cellular networks are required to provide the significant increase in network throughput, cell-edge data rate, massive connectivity, superior spectrum efficiency, high energy efficiency and low latency, compared with the currently deploying long-term evolution (LTE) and LTE-advanced networks. To meet these challenges of 5G networks, innovative technologies on radio air-interface and radio access network (RAN) are important in PHY design. Recently,
基金partly supported by the University of Malaya Impact Oriented Interdisci-plinary Research Grant under Grant IIRG008(A,B,C)-19IISS.
文摘Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources.This paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN method.This technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access decision-making.The proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy rate.Additionally,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern organizations.Furthermore,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management.
文摘This paper provides a review on the diversity techniques of IDMA (Interleave Division Multiple Access) technology in underwater wireless IDMA employs interleavers as the only means in order to distinguish the users. This paper provides a comprehensive study of diversity techniques in IDMA scheme to mitigate the fading issue. In this paper, we compare the different generation diversity techniques in IDMA scheme on computational complexity, bit error rate and memory requirement. Recent advancement in underwater communication is modulation techniques, multiplexing techniques and multiple access techniques. Underwater communication channel is characterized.
文摘在开发基于网络的数据库信息系统当中,经常会遇到要求向数据库信息系统当中存入或取出图片的问题,讨论了向数据库信息系统中存取图片的实现方法。考虑到Delphi编程语言和SQL Server数据库的强大功能和优越性,重点研究了运用Delphi7.0对SQL Server 2000数据库中的image数据类型进行存取的Web实现方法,并给出部分程序代码,这些技巧在开发基于ASP、ASP.NET的网上数据库应用中具有很高的实用价值。