CAN bus is highly respected in embedded systems for its high-speed communication, excellent error correction capability, ease of control, flexible expansion and cost-effectiveness. Ethernet, as a mainstream LAN protoc...
详细信息
Aiming at the problem that the iForest algorithm is not sensitive enough to local anomalies and produces a large number of false alarms in the detection results on some low sea state datasets, this paper proposes the ...
详细信息
This study addresses the prevalent issues with new energy vehicle batteries, including failure and other complications. It focuses on lithium-ion batteries in pure electric vehicles and proposes a diagnostic approach ...
详细信息
This paper introduces a novel chaotic-based pseudo-random number generator (PRNG) architecture utilizing the Lorenz system. We examine an enhanced model, employing techniques such as Euler integration, bifurcation ana...
详细信息
The portable electrochemical analysis system has high integration and low cost, which solves the problem of large size and high price of traditional instruments on the market. Based on the existing research, this pape...
详细信息
The management of electronic Health Records (EHRs) from IoT devices has become essential with the integration of cloud computing and IoT technology in healthcare sector. Existing research works adopt cloud-based acces...
详细信息
ISBN:
(纸本)9798350381771;9798350381764
The management of electronic Health Records (EHRs) from IoT devices has become essential with the integration of cloud computing and IoT technology in healthcare sector. Existing research works adopt cloud-based access control with the encryption solution to secure the outsourced EHRs. However, when it comes to the IoT cloud data sharing environment, where data originated from numerous devices and the authorization status of users is subject to frequent changes, there remains a gap in achieving secure and lightweight IoT data encryption and fine -grained sharing with efficient user revocation procedures. This paper proposes a cloud-based access control scheme with efficient and scalable revocation to support fine -grained, secure, and efficient revocation for IoT based EHRs based on Ciphertext policy Attribute-based encryption (CP-ABE) and fog-assisted computing. The scheme introduces IoT data encryption and secure aggregation algorithm. In this scheme, the concept of outsourced encryption and decryption is leveraged to enable secure and lightweight access control in fog-cloud computing. Additionally, a novel revocation protocol is devised along with the use of graph database to enable efficient user revocation in a highly evolvable access control system. Finally, comparative analysis is conducted to demonstrate the security and efficiency of the proposed scheme.
This paper investigates the three-dimensional reconstruction technique of unmanned aerial vehicle (UAV) images under multiscale scenarios based on neural radiance fields. The approach combines the concept of residual ...
详细信息
Adaptive filtering technology has been widely used in fields such as electronic communication and sonar detection, especially in the detection of weak signals, such as high-precision acquisition of microvolt level vol...
详细信息
This study introduces TransConvNet, a hybrid model combining Transformer and Convolutional Neural Networks (CNNs) for detecting kidney abnormalities in CT images. The model leverages CNNs for local feature extraction ...
详细信息
In this paper, we design a cooperative UAV maneuver decision-making task and use multi-agent reinforcement learning to solve it. In this task, two UAVs must learn cooperating with each other to defeat a stronger enemy...
详细信息
暂无评论