1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information ***,distributed methods ...
详细信息
1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information ***,distributed methods also exist,such as peer-to-peer networks and distributed hash *** technology,which is decentralized,anonymous,non-tamperable and anti-attack,can be applied to covert communication to solve the problems of traditional methods and improve the quality of communication.
The NBS Data Encryption Standard may be integrated into computer networks to protect personal (nonshared) files, to communicate securely both on- and off-line with local and remote users, to protect against key substi...
详细信息
The NBS Data Encryption Standard may be integrated into computer networks to protect personal (nonshared) files, to communicate securely both on- and off-line with local and remote users, to protect against key substitution, to authenticate system users, to authenticate data, and to provide digital signatures using a nonpublic key encryption algorithm. Key notarization facilities give users the capability of exercising a set of commands for key management as well as for data encryption functions. The facilities perform notarization which, upon encryption, seals a key or password with the identities of the transmitter and intended receiver. Thus, in order to decrypt a message, the receiver must authenticate himself and supply the correct identity of the transmitter. This feature eliminates the threat of key substitution which must be protected against to attain a high level of security.
This publication provides a technical overview of the computer software specifications for an Information Resource Dictionary System (IRDS). It summarizes the data architecture and the software functions and processes...
详细信息
The report considers the peculiarities of the distribution of computing resources in cloud systems. The most used classification of existing technologies of cloud services is considered. The advantages and disadvantag...
详细信息
According to the Greek mythology, Typhon was a gigantic monster with one hundred dragon heads, bigger than all mountains. His open hands were extending from East to West, his head could reach the sky and flames were c...
详细信息
For several years, traffic congestion has been a major problem in big cities where the number of cars and different means of transportation has been increasing significantly. The problem of congestion is becoming more...
详细信息
Over the past decade,the power conversion efficiency of halide perovskite solar cells has shown a rapid increase to 26.1%.The significant efficiency growth and the relative simplification of the technology for o...
详细信息
Over the past decade,the power conversion efficiency of halide perovskite solar cells has shown a rapid increase to 26.1%.The significant efficiency growth and the relative simplification of the technology for obtaining thin-film solar cells due to liquid printing methods determine the high potential for the low-cost perovskite solar cells ***,efficient use of cell geometry is comparable to the size of standard crystalline-Si wafers(156:156 mm and more).Therefore,modular geometry similar to amorphous-Si solar cell approaches is used to scale perovskite solar *** electrical connection of thin-film cells requires precise processing of the conductive layers that form the device p-i-n *** subject of research is the development of a full pulsed laser scribing cycle for inverted perovskite solar *** this work,we propose a study of a laser-patterning technology In_(2)O_(3):SnO_(2)(ITO)conductive layer and a photoactive perovskite layer Cs0,2(CH(NH_(2))_(2))_(0,8)PbI_(3).Process regimes of transparent conducting electrodes based on ITO and halide perovskite layer Cs_(0,2)(CH(NH_(2))_(2))_(0,8)PbI_(3)laser patterning were *** optimal parameters for the multipass mode processing of ITO and perovskite layer were *** cell was electrically isolated at a scribe line width of 30μm.
The causes of sudden cardiac death (SCD) have not yet been completely studied. At the same time, their share of mortality from heart disease is constantly growing. The use of artificial intelligence (AI) technology fo...
详细信息
ISBN:
(数字)9798350376968
ISBN:
(纸本)9798350376975
The causes of sudden cardiac death (SCD) have not yet been completely studied. At the same time, their share of mortality from heart disease is constantly growing. The use of artificial intelligence (AI) technology for timely diagnosis of the risk of sudden cardiac death, in particular for ECG analysis, is showing impressive and promising results. Of course, simple ECG analysis is not enough for an accurate prediction. Therefore, AI can be a powerful tool for testing hypotheses about additional medical factors that can improve diagnostic accuracy. In practice, the primary issue is the absence of established standards for AI use, coupled with the technical challenge of promptly transmitting ECG readings to the diagnostic center and receiving a real-time diagnosis from the AI system.
Formal methods (in a broad sense) have been around almost since the beginning of computer science. Nonetheless, there is a perception in the formal methods community that take-up by industry is low considering the pot...
详细信息
暂无评论