Kidney failure is a silent chronic disease, without symptoms, and develops into an acute stage quickly. Unfortunately, the majority of patients discover this disease in its advanced stages where hemodialysis or transp...
详细信息
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in...
详细信息
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information *** enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover *** this paper,a novel encrypted communication scheme for image SWE is *** reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer *** employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be *** receiver can restore the secretmessage fromthe received image using only the list header position *** scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover *** boasts high concealment and security,along with a complete message restoration rate,making it resistant to ***,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of *** validate the proposed framework,practical tests and comparisons are conducted using multiple *** results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks.
We introduce a method for enhancing the resolution of Structured Illumination Microscopy images. It uses a deep prior network, unrolled with a model-based analytical process to improve performance, maintain structural...
详细信息
In recent years, the embedded machine learning topic has become very popular in AI. With the help of different techniques, it is possible to run pre-trained models or training neural networks directly on embedded mach...
详细信息
Nowadays, we are faced with a huge amount of private data generated in different ecosystems, including the Internet of Things, social networks, peer-to-peer networks, and e-commerce, to mention a few. The performance ...
详细信息
With the continual deployment of power-electronics-interfaced renewable energy resources,increasing privacy concerns due to deregulation of electricity markets,and the diversification of demand-side activities,traditi...
详细信息
With the continual deployment of power-electronics-interfaced renewable energy resources,increasing privacy concerns due to deregulation of electricity markets,and the diversification of demand-side activities,traditional knowledge-based power system dynamic modeling methods are faced with unprecedented ***-driven modeling has been increasingly studied in recent years because of its lesser need for prior knowledge,higher capability of handling large-scale systems,and better adaptability to variations of system operating *** paper discusses about the motivations and the generalized process of datadriven modeling,and provides a comprehensive overview of various state-of-the-art techniques and *** also comparatively presents the advantages and disadvantages of these methods and provides insight into outstanding challenges and possible research directions for the future.
In the realm of IoT-enabled surveillance systems, drones play a pivotal role in detecting and tracking suspects within defined areas. However, a significant challenge arises when a single drone identifies multiple sus...
详细信息
Traditional auto-scaling approaches are conceived as reactive automations,typically triggered when predefined thresholds are breached by resource consumption *** such rules at scale is cumbersome,especially when resou...
详细信息
Traditional auto-scaling approaches are conceived as reactive automations,typically triggered when predefined thresholds are breached by resource consumption *** such rules at scale is cumbersome,especially when resources require non-negligible time to be *** paper introduces an architecture for predictive cloud operations,which enables orchestrators to apply time-series forecasting techniques to estimate the evolution of relevant metrics and take decisions based on the predicted state of the *** this way,they can anticipate load peaks and trigger appropriate scaling actions in advance,such that new resources are available when *** proposed architecture is implemented in OpenStack,extending the monitoring capabilities of Monasca by injecting short-term forecasts of standard *** use our architecture to implement predictive scaling policies leveraging on linear regression,autoregressive integrated moving average,feed-forward,and recurrent neural networks(RNN).Then,we evaluate their performance on a synthetic workload,comparing them to those of a traditional *** assess the ability of the different models to generalize to unseen patterns,we also evaluate them on traces from a real content delivery network(CDN)*** particular,the RNN model exhibites the best overall performance in terms of prediction error,observed client-side response latency,and forecasting *** implementation of our architecture is open-source.
Smishing is a type of social engineering attack that involves sending fraudulent SMS messages to trick recipients into revealing sensitive information. In recent years, it has become a significant threat to mobile com...
详细信息
The security of ad hoc networks continues to pose a major challenge in today's digital age. Threatened by unscrupulous users, especially in decentralized and open architectures, ad-hoc vehicular networks make prot...
详细信息
暂无评论