Recently, pathological diagnosis plays a crucial role in many areas of medicine, and some researchers have proposed many models and algorithms for improving classification accuracy by extracting excellent feature or m...
详细信息
software architects have techniques to deal with many quality attributes such as performance, reliability, and maintainability. Usability, however, has traditionally been concerned primarily with presentation and not ...
详细信息
This paper focuses on the development of mathematical methods for diagnosing the operability of complex structured information and control systems with arbitrary topology in real time. We describe a model based on gra...
详细信息
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation ***,the exchange of beacons and messages over public c...
详细信息
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation ***,the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy *** address these challenges,several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed ***,most of these schemes are limited by a long execution time and massive communication costs,which make them inefficient for on-board units(OBUs).Additionally,some of them are still susceptible to many *** such,this study presents a novel protocol based on the fusion of elliptic curve cryptography(ECC)and bilinear pairing(BP)*** formal security analysis is accomplished using the Burrows–Abadi–Needham(BAN)logic,demonstrating that our scheme is verifiably *** proposed scheme’s informal security assessment also shows that it provides salient security features,such as non-repudiation,anonymity,and ***,the scheme is shown to be resilient against attacks,such as packet replays,forgeries,message falsifications,and *** the performance perspective,this protocol yields a 37.88%reduction in communication overheads and a 44.44%improvement in the supported security ***,the proposed scheme can be deployed in VANETs to provide robust security at low overheads.
This paper is an algorithmic engineering study of cache-oblivious sorting. We investigate by empirical methods a number of implementation issues and parameter choices for the cache-oblivious sorting algorithm Lazy Fun...
详细信息
Security and privacy issues have attracted the attention of researchers in the field of IoT as the information processing scale grows in sensor *** computing,theoretically known as an absolutely secure way to store an...
详细信息
Security and privacy issues have attracted the attention of researchers in the field of IoT as the information processing scale grows in sensor *** computing,theoretically known as an absolutely secure way to store and transmit information as well as a speed-up way to accelerate local or distributed classical algorithms that are hard to solve with polynomial complexity in computation or *** this paper,we focus on the phase estimation method that is crucial to the realization of a general multi-party computing model,which is able to be accelerated by quantum algorithms.A novel multi-party phase estimation algorithm and the related quantum circuit are proposed by using a distributed Oracle operator with *** proved theoretical communication complexity of this algorithm shows it can give the phase estimation before applying multi-party computing efficiently without increasing any additional ***,a practical problem of multi-party dating investigated shows it can make a successful estimation of the number of solution in advance with zero communication complexity by utilizing its special statistic *** simulations present the correctness,validity and efficiency of the proposed estimation method.
Radio communication systems play a major role in supporting wildfire suppression crews in firegrounds. In this paper, we consider the effect of fire upon 2.4 GHz IEEE 802.15.4 radio link and propagation characteristic...
详细信息
In medical sensor networks, sensor nodes on a body of the patient sense the vital data and deliver them to the server system through mobile devices or gateways in the middle. However, when these linking devices do not...
详细信息
Jackal is a fine-grained distributed shared memory implementation of the Java programming language. It aims to implement Java's memory model and allows multithreaded Java programs to run unmodified on a distribute...
详细信息
暂无评论