The DAG task model has gained significant attention and widespread usage for modeling complex real-time applications, particularly in domains like autonomous driving. To effectively utilize these models, research on t...
详细信息
The advancements in technology have substantially grown the size of image *** image encryption algorithms have limited capabilities to deal with the emerging challenges in big data,including compression and noise *** ...
详细信息
The advancements in technology have substantially grown the size of image *** image encryption algorithms have limited capabilities to deal with the emerging challenges in big data,including compression and noise *** image encryption method that is based on chaotic maps and orthogonal matrix is proposed in this *** proposed scheme is built on the intriguing characteristics of an orthogonal *** Schmidt disperses the values of pixels in a plaintext image by generating a random orthogonal matrix using logistic chaotic *** the diffusion process,a block-wise random permutation of the data is performed using *** proposed scheme provides sufficient security and resilience to JPEG compression and channel noise through a series of experiments and security *** enables Partial Encryption(PE)for faster processing as well as complete encryption for increased *** higher values of the number of pixels change rates and unified average change intensity confirm the security of the encryption *** contrast to other schemes,the proposed approach can perform full and partial encryption depending on security requirements.
This paper proposes a systematic analysis of using deep mastering methodologies in statistics technology practices for the cause of leveraging the strength of deep mastering algorithms. It presents an overview of the ...
详细信息
Automatic modulation recognition (AMR) utilizing deep learning has received considerable attention, demonstrating remarkable potential in extracting complex signal features. However, deep learning-based methods often ...
详细信息
3D human pose estimation is pivotal in the domains of computer vision and kinematic analysis. However, the majority of existing 3D datasets focus on indoor environments, resulting in a significant gap in extensive res...
详细信息
Low-energy pacing is a modern way of treatment dangerous heart rhythm disturbances such as paroxysmal tachy-cardia and fibrillation. The pacing is applied directly to the heart muscle from a small implanted device. Th...
详细信息
This paper reports the lesson design of theory and technology of computer networks and information security, designed for the informatics course for non-CS major university students. The lesson unit consists of two le...
详细信息
ISBN:
(纸本)9781665453318
This paper reports the lesson design of theory and technology of computer networks and information security, designed for the informatics course for non-CS major university students. The lesson unit consists of two lessons applied by flipped learning style, in which students first watch on-demand video lectures to acquire basic knowledge of network theory and technology, then they do hands-on activities using some web tools that we developed to consolidate the knowledge. The questionnaire results after the CS0 course where the lesson design was applied suggested that the hands-on activity was effective in improving the understanding of network and security.
This paper studies a permutation flow shop scheduling problem (PFSSP) considering maintenance activities and energy consumption, in which machine failures obey Weibull distribution. In case of an unexpected failure, a...
详细信息
Coordination of multi-agent systems has received significant attention during the past few years owing to its wide real-world applications, such as cooperative exploration, aircraft formation, and autonomous vehicle p...
详细信息
Paddy (rice) is the main food for the Indonesian people so that stable production is needed to meet domestic needs. However, data in 2023 showed a decline in rice production in Indonesia. The decline was due to pests ...
详细信息
暂无评论