Accurate traffic sign recognition is crucial for driver assistance systems, yet challenges persist due to environmental factors and camera distortions. This study introduces a novel framework for real-time traffic sig...
详细信息
The advent of sensor data extracted from the smartphone offers opportunities to accurately model the human’s physical activities for context-aware scenarios or maybe for human-centered computing, e.g., human-in-loop,...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
The Internet of Things (IoT) has experienced significant growth in data traffic, resulting in increased complexity and dimensionality. Intrusion Detection Systems (IDS) play a vital role in protecting against various ...
详细信息
Open Information Extraction (OIE) is a structured prediction (SP) task in Natural Language Processing (NLP) that aims to extract structured n-ary tuples - usually subject-relation-object triples - from free text. The ...
详细信息
Utilizing delay tolerant networks (DTN) via smartphones is a practical approach, especially when traditional networks are compromised. The use of short-range communication technologies like Bluetooth or WiFi ensures c...
详细信息
Very recent attacks like ladder leaks demonstrated the feasibility of recovering private keys with side-channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways. Some attacks ...
详细信息
Purpose-The paper aims to introduce an efficient routing algorithm for wireless sensor networks(WSNs).It proposes an improved evaporation rate water cycle(improved ER-WC)algorithm and outlining the systems performance...
详细信息
Purpose-The paper aims to introduce an efficient routing algorithm for wireless sensor networks(WSNs).It proposes an improved evaporation rate water cycle(improved ER-WC)algorithm and outlining the systems performance in improving the energy efficiency of *** proposed technique mainly analyzes the clustering problem of WSNs when huge tasks are ***/methodology/approach-This proposed improved ER-WC algorithm is used for analyzing various factors such as network cluster-head(CH)energy,CH location and CH density in improved *** proposed study will solve the energy efficiency and improve network throughput in ***-This proposed work provides optimal clustering method for Fuzzy C-means(FCM)where efficiency is improved in *** evaluations are conducted to find network lifespan,network throughput,total network residual energy and network *** limitations/implications-The proposed improved ER-WC algorithm has some implications when different energy levels of node are used in *** implications-This research work analyzes the nodes’energy and throughput by selecting correct CHs in intra-cluster *** can possibly analyze the factors such as CH location,network CH energy and CH ***/value-This proposed research work proves to be performing better for improving the network throughput and increases energy efficiency for WSNs.
Image inpainting has made great achievements recently, but it is often tough to generate a semantically consistent image when faced with large missing areas in complex scenes. To address semantic and structural alignm...
详细信息
Recommender systems for social networking have recently used machine learning (ML) methods. This paper describes a multi-agent system that simulates a Twitter recommender system to give users a list of helpful suggest...
详细信息
暂无评论