This work focuses on the problem of distributed optimization in multi-agent cyberphysical systems, where a legitimate agent's iterates are influenced both by the values it receives from potentially malicious neigh...
详细信息
In an era characterized by the increasing digitization of assets, the demand for secure, efficient, and user-friendly platforms to facilitate the exchange of digital assets has surged. This project focuses on addressi...
详细信息
In logistics and industrial operations, optimizing crane scheduling is crucial for efficiency and resource allocation. Given the dynamic nature of crane scheduling environments, influenced by factors such as fluctuati...
详细信息
In response to the urgent need for coronavirus treatments, this research focuses on leveraging bioactivity data collection and processing for efficient drug discovery, employing computational methods to predict potent...
详细信息
The increasing complexity of video games and development costs have necessitated innovative approaches to content creation. Procedural Content Generation (PCG) and AI tools like ChatGPT offer promising solutions. This...
详细信息
Managing large volumes of data poses significant challenges due to the variety of formats, distribution across departments, and different governance structures within organizations. In research and industry environmen...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
Highway asset management and tracking is a critical aspect of transportation infrastructure maintenance and planning. It is a visionary approach to Precise Road Asset Detection and Enumeration is an innovative solutio...
详细信息
Camera traps play a crucial role in wildlife research and conservation, as they provide invaluable insights into animal behavior and population dynamics. However, the manual analysis of the extensive image data genera...
详细信息
Accurate diagnosis of acute lymphoblastic leukemia (ALL) often relies on invasive and costly procedures. This paper explores the use of convolutional neural networks (CNNs) to classify ALL subtypes from peripheral blo...
详细信息
暂无评论