With Industry 4.0's technological advancements, the convenience and affordability of Artificial Intelligence (AI) and IoT have increased. However, customers still face long waiting times in payment queues during t...
详细信息
In this modern world, we are naturally dependent on technology, which is constantly evolving. At the same time, our fear of data fraud is increasing every day. The ever-increasing number of attacks on our servers indi...
详细信息
In view of the shortcomings that particle swarm optimization is easy to fall into local optima and difficult to solve complex problems, the combination of Gaussian distribution and Cauchy distribution was used in the ...
详细信息
This paper focuses on addressing the challenge of estimating multiple-input multiple-output (MIMO) channels for wireless communication between a ground base-station and a moving vehicle. One recently recognised model ...
详细信息
As in the existing opinion summary data set, more than 70% are positive texts, the current opinion summarization approaches are reluctant to generate the negative opinion summary given the input of negative opinions. ...
详细信息
Indonesia is currently in the final stages of the COVID-19 pandemic, which has changed the world of the online learning. Online learning has many benefits, one of which students can learn anywhere and anytime. SMK Neg...
详细信息
A Zero-Knowledge Proof (ZKP) protocol allows a participant to prove the knowledge of some secret without revealing any information about it. While such protocols are typically executed by computers, there exists a lin...
详细信息
A Zero-Knowledge Proof (ZKP) protocol allows a participant to prove the knowledge of some secret without revealing any information about it. While such protocols are typically executed by computers, there exists a line of research proposing physical instances of ZKP protocols. Up to now, many card-based ZKP protocols for pen-and-pencil puzzles, like Sudoku, have been designed. Those games, mostly edited by Nikoli, have simple rules, yet designing them in card-based ZKP protocols is non-trivial. In this work, we propose a card-based ZKP protocol for Usowan, a Nikoli game. In Usowan, for each room of a puzzle instance, there is exactly one piece of false information. The goal of the game is to detect this wrong data amongst the correct data and also to satisfy the other rules. Designing a card-based ZKP protocol to deal with the property of detecting a liar has never been done. In some sense, we propose a physical ZKP for hiding of a liar. This work extends a previous paper appearing in Ref. [1]. In this extension, we propose two other protocols, for Herugolf and Five Cells. The puzzles are specifically chosen because each of those three puzzles shares a common constraint, connectivity. However, showing the connected configuration cannot be done with generic approach and brings new construction to the existing connectivity ZKP protocol. Indeed, in Herugolf, the connectivity is handled with a given length of cell which is decremental (i.e., the length of each connected cell decreases by one at each step). For Five Cells, there is an additional step in the setup allowing to encode all the information needed to ensure a valid ZKP protocol.
Risk analysis is a key activity for organisations that are looking to protect their valuable information assets against threats, such as malicious actors. It is one of the essential parts of risk management and is use...
详细信息
Drug-drug interactions pose a significant challenge in healthcare, directly impacting patient safety and treatment efficacy. Although recent advances in computational methods have improved drug-drug interaction (DDI) ...
详细信息
Fake or fraudulent accounts are a significant problem in social networking that is often addressed by the users of various social networking platforms involving Linkedin. Fraudulent accounts generally try to convince ...
详细信息
暂无评论