The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized *** study provides an approach to color image encryption that could find practical use in various *** proposed method,which combines four chaotic systems,employs singular value decomposition and a chaotic sequence,making it both secure and *** unified average change intensity,the number of pixels’change rate,information entropy analysis,correlation coefficient analysis,compression friendliness,and security against brute force,statistical analysis and differential attacks are all used to evaluate the algorithm’s *** a thorough investigation of the experimental data,it is concluded that the proposed image encryption approach is secure against a wide range of attacks and provides superior compression friendliness when compared to chaos-based alternatives.
Suicide represents a poignant societal issue deeply entwined with mental well-being. While existing research primarily focuses on identifying suicide-related texts, there is a gap in the advanced detection of mental h...
详细信息
In the era of big data, with the increase in volume and complexity of data, the main challenge is how to use big data while preserving the privacy of users. This study was conducted with the aim of finding a solution ...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and ***,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial *** examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong ***,the security of AI models for the digital communication signals identification is the premise of its efficient and credible *** this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial *** we present more detailed adversarial indicators to evaluate attack and defense ***,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research.
In the data retrieval process of the Data recommendation system,the matching prediction and similarity identification take place a major role in the *** that,there are several methods to improve the retrieving process...
详细信息
In the data retrieval process of the Data recommendation system,the matching prediction and similarity identification take place a major role in the *** that,there are several methods to improve the retrieving process with improved accuracy and to reduce the searching ***,in the data recommendation system,this type of data searching becomes complex to search for the best matching for given query data and fails in the accuracy of the query recommendation *** improve the performance of data validation,this paper proposed a novel model of data similarity estimation and clustering method to retrieve the relevant data with the best matching in the big data *** this paper advanced model of the Logarithmic Directionality Texture Pattern(LDTP)method with a Metaheuristic Pattern Searching(MPS)system was used to estimate the similarity between the query data in the entire *** overall work was implemented for the application of the data recommendation *** are all indexed and grouped as a cluster to form a paged format of database structure which can reduce the computation time while at the searching ***,with the help of a neural network,the relevancies of feature attributes in the database are predicted,and the matching index was sorted to provide the recommended data for given query *** was achieved by using the Distributional Recurrent Neural Network(DRNN).This is an enhanced model of Neural Network technology to find the relevancy based on the correlation factor of the feature *** training process of the DRNN classifier was carried out by estimating the correlation factor of the attributes of the *** are formed as clusters and paged with proper indexing based on the MPS parameter of similarity *** overall performance of the proposed work can be evaluated by varying the size of the training database by 60%,70%,and 80%.The parameters that are considered for performance analysis are Precision
The cellular automaton (CA), a discrete model, is gaining popularity in simulations and scientific exploration across various domains, including cryptography, error-correcting codes, VLSI design and test pattern gener...
详细信息
Link prediction in complex networks is a fundamental problem with applications in diverse domains, from social networks to biological systems. Traditional approaches often struggle to capture intricate relationships i...
详细信息
The outbreak of COVID-19 (also known as Coronavirus) has put the entire world at risk. The disease first appears in Wuhan, China, and later spread to other countries, taking a form of a pandemic. In this paper, we try...
详细信息
Background: Epilepsy is a neurological disorder that leads to seizures. This occurs due to excessive electrical discharge by the brain cells. An effective seizure prediction model can aid in improving the lifestyle of...
详细信息
Federated Learning (FL) has emerged as a promising approach to address the challenges of data privacy, security, and scalability in Internet of Things (IoT) environments. This paper provides a comprehensive survey of ...
详细信息
暂无评论