the security of the color images is challenged by the illegal copying and distribution over various communication networks. this work proposed a novel color image encryption scheme based on the chaos and Deoxyribonucl...
详细信息
ISBN:
(纸本)9798350350920
the security of the color images is challenged by the illegal copying and distribution over various communication networks. this work proposed a novel color image encryption scheme based on the chaos and Deoxyribonucleic acid (DNA). Firstly, A novel four dimensions chaotic system is constructed and analyzed. Secondly, the DNA coding rules are controlled by the chaos-based pseudorandom sequence to substitute the image pixels. the column and row rotation are designed to disturb the image pixels. Finally, the DNA matrix coded from the color image is divided into blocks to implement the XOR and addition operation withthe pseudorandom sequence. Its security is simulated and compared with other schemes. the comparison show that the proposed scheme has a higher key sensitivity, lower correlation of adjacent pixels, and higher NPCR and information entropy. therefore, the proposed image encryption scheme is more capable against statical attacks and efficiency while keeping high robustness.
the workshop explores how interactive technologies based on biophysical sensing and analysis can help create deeper connections withthe surrounding world and one another, by combining the latest affect-indicating bio...
详细信息
ISBN:
(纸本)9798400709944
the workshop explores how interactive technologies based on biophysical sensing and analysis can help create deeper connections withthe surrounding world and one another, by combining the latest affect-indicating biosensors with somatic practices and creative expression. the workshop incorporates cutting edge biophysical sensing measurement technologies to explore new modes of artistic expression that directly gauge human affect as an integral component in the creation of an art work or performance. the goal is to explore how real-time tracking of a participant's affective state can be used as an interactive modality in performance and computational art. Human affect data is gathered from a custom biophysical sensing acquisition and analysis system called, the Source. Data is accessed in real-time using custom software tools built on popular platforms such as Arduino, Max/MSP, SuperCollider, Ableton Live, TouchDesigner, and Processing. Physiological measures, including Electrocardiography (ECG, heart rate), Electrodermal Activity (EDA), Electromyography (EMG, muscle), Electroencephalography (EEG, brain waves), Electrooculography (EOG, eye movement), and Respiratory effort (RSP, breathing) can be incorporated. During the workshop, we will explore the potential for creative uses, as well as more applied contexts to support physical therapy, group training and experiences.
the continuous trend of raising traffic volumes in urban areas causes waiting times and exhaust emissions. As one promising response to these challenges, increasingly intelligent and adaptive traffic management system...
详细信息
ISBN:
(纸本)9789897586521
the continuous trend of raising traffic volumes in urban areas causes waiting times and exhaust emissions. As one promising response to these challenges, increasingly intelligent and adaptive traffic management systems are being developed. For instance, self-organised approaches such as the Organic Traffic Control offer advantages in terms of scalability and robustness compared to traditional systems. this can be increased by taking locally detected incidents into account. To improve the accuracy of automatically detected incidents and to allow for integration in the traffic control strategies, this paper proposes algorithms for the validation of potential incidents. this is done by incorporating respective insights of varying levels from neighbouring intersections and consequently determining a neighbour-supported view of local incident information.
Next generation networks and the strength of the distributedcomputing paradigm (edge/cloud) are transforming how services are provisioned, mainly when solutions focus on collaboration and aggregation of resources pro...
详细信息
ISBN:
(纸本)9798350399806
Next generation networks and the strength of the distributedcomputing paradigm (edge/cloud) are transforming how services are provisioned, mainly when solutions focus on collaboration and aggregation of resources provided by different entities or organisations, that becomes essential to satisfy the most demanding computation and storage service requirements. However, it also entails challenges such as infrastructure and technologies heterogeneity, which directly impacts infrastructure management and especially security, that usually tends to be relegated to a second place. this paper provides a by-default security orchestrator approach to mitigate the above mentioned challenges in distributed edge/cloud computing frameworks. We use an Intent-based/policy-based orchestration paradigm for dealing with heterogeneity, allowing users to request service deployments securely without requiring knowledge about the underlying distributed infrastructure. By-default security orchestration will decide how to provide the requested services, ensuring that they are compliant withthe security requirements provided by the user and the ones gathered by the system, locally and from reliable external sources (1). We provide design and use-cases based workflows for managing by-default security orchestration in proactive and reactive ways. In the future, it is expected to perform the implementation and validation of the proposed approach inside the scope of the FLUIDOS EU project.
In recent years, withthe continuous increase of the installed capacity of distributed PV systems, the issue of county-level power grids lacking of technical management and control methods of distributed energy source...
详细信息
ISBN:
(纸本)9798350377477;9798350377460
In recent years, withthe continuous increase of the installed capacity of distributed PV systems, the issue of county-level power grids lacking of technical management and control methods of distributed energy sources has been acquired more and more attentions. It has also been noticed that a large number of scattered small hydro-power stations do not play an important role during peaking operation. Aiming at the coordinated management and control of distributed small hydro-power stations, PV systems, demand-side flexible resources, a coordinated regulation system for distributed hydro-PV complementation combined with load resources has been developed. the system includes three major functional modules: a resources aggregation module, an output forecast module, and a coordinated optimization regulation module. therefore the system has capability of coordinated optimizing and making full, efficient utilization of various resources, inclusive of small hydro-power stations, PV systems, energy storage systems, and user-side flexible loads. the system was demonstrated in Hunan Province, and the demonstration results showed that the system can effectively improve the peaking capability of the power grid, promote the consumption level of clean energy, and lower the energy cost for users, and also provide a new resolution to enhance the grid's flexibility and reliability.
the proceedings contain 11 papers. the topics discussed include: the impact of digital analysis and large language models in digital humanity;solar trees: harnessing renewable energy for portable charging of low-capac...
the proceedings contain 11 papers. the topics discussed include: the impact of digital analysis and large language models in digital humanity;solar trees: harnessing renewable energy for portable charging of low-capacity devices;speech and language impairment detection by means of AI-driven audio-based techniques;simulation and analysis of dual unbalanced rotor effects on natural frequency in a digital twin shaft model;an analysis of the state of art of the metaverse and its disruptive impact on services;efficient methods for time synchronization in distributed radar systems;a real-time machine learning based solution for privacy enforcement in video recordings and live streaming;high-performance computing for the optimization of double-pipe heat exchanger operations;and understanding parental characteristics of child adoption candidates using MMPI-2 and evolutionary clustering.
Fog computing, an extension of cloud computing, places computational resources closer to data sources, enhancing network efficiency and security. this paper addresses the challenges posed by cybersecurity threats with...
详细信息
ISBN:
(纸本)9798350366495;9798350366488
Fog computing, an extension of cloud computing, places computational resources closer to data sources, enhancing network efficiency and security. this paper addresses the challenges posed by cybersecurity threats within fog computing environments, specifically in managing vast volumes of network traffic from IoT devices which are vulnerable to cyberattacks. We propose a novel architecture for real-time anomaly detection that integrates fog and cloud computing layers. this two-tiered system utilizes machine learning and deep learning models for dynamic and adaptive threat detection. By leveraging the computational power of modern GPUs, the system analyzes network traffic at speeds up to 10 Gbps, enabling the detection of anomalies before they can cause significant damage. We introduce a distributed anomaly supervisor that operates at the fog level to provide real-time analysis and immediate response to potential threats, while cloud-level operations facilitate a comprehensive overview and coordination. the effectiveness of this architecture is demonstrated through extensive experimentation, proving its capability to manage high-speed data transfers and improve security measures across fog networks.
Photovoltaic energy generation and prediction are crucial for the integration between solar plants and smart grid. Accurate solar radiation prediction is one of the most important research topics for solar energy gene...
详细信息
As Industrial Internet of things (IIoT) technologies and edge computing continue to evolve, the volume of data processed in real-time to optimize manufacturing processes has increased. However, this increase in connec...
详细信息
this paper presents a movie recommendation system utilizing the DBSCAN(Density Based Spatial Clustering of Applications with Noise) algorithm. Traditional recommendation system mostly rely on collaborative filtering o...
详细信息
暂无评论