Human Activity Recognition (HAR) is a research area that involves wearable devices integrating inertial and/or physiological sensors to classify human actions and status across various application domains, such as hea...
详细信息
This work details the mathematical modeling of a nonlinear multi-input multiple-output (MIMO) quadruple tank system (QTS) using the linearization principle and forming a Jacobean matrix to represent the system in a st...
详细信息
Combined cooling, heating, and power (CCHP) systems have garnered significant attention as a cost-effective solution for reducing energy consumption in buildings due to their ability to provide higher thermal efficien...
详细信息
Grid-connected inverters play a pivotal role in integrating renewable energy sources into modern power systems. However, the presence of unbalanced grid conditions poses significant challenges to the stable operation ...
详细信息
The field of risk-constrained reinforcement learning (RCRL) has been developed to effectively reduce the likelihood of worst-case scenarios by explicitly handling risk-measure-based constraints. However, the nonlinear...
This study provides an innovative architectural model for e-Health systems that aims to improve cyber resilience while maintaining high availability under fluctuating traffic loads. We examined typical cybersecurity i...
详细信息
In the era of pervasive digital data, ensuring secure file storage has become a paramount concern. This paper explores the significance of hybrid cryptography for design of an advanced tools and techniques for secure ...
详细信息
ISBN:
(纸本)9798350374865
In the era of pervasive digital data, ensuring secure file storage has become a paramount concern. This paper explores the significance of hybrid cryptography for design of an advanced tools and techniques for secure file storage. Hybrid cryptography, combining symmetric and asymmetric encryption, offers robust protection against unauthorized access, tampering, and data loss. The article reviews recent cryptography literature, highlighting the importance of secure file storage in today's interconnected world and examining the benefits of hybrid cryptography. The analysis of articles on cryptography reveals emerging trends and challenges. Post-quantum cryptography addresses concerns about quantum threats, while blockchain-based cryptography enhances security in IoT data sharing. Homomorphic encryption enables computations on encrypted data, and cryptographic protocols that protect privacy enable safe multi-party computation. Machine learning's intersection with cryptanalysis introduces efficiency but raises ethical considerations. The paper further discusses advancements and trends in cryptography techniques, including post-quantum cryptography, homomorphic encryption, zero-knowledge proofs, post-quantum key exchange, secure multi-party computation, and post-quantum signature schemes. These developments aim to ensure long-term security against quantum attacks, enable privacy-preserving computations, and enhance the confidentiality, integrity, and authentication of digital communication and data storage. In conclusion, the paper advocates for the adoption of hybrid cryptography in secure file storage systems. Its combination of symmetric and asymmetric encryption, along with its adaptability to evolving security landscapes, positions hybrid cryptography as a formidable approach to data protection. By embracing hybrid cryptography and staying informed about the latest advancements, organizations can navigate the digital age with confidence, ensuring the confidentiality
Deep neural operators have seen much attention in the scientific machine learning community over the last couple of years due to their capability of efficiently learning the nonlinear operators mapping from input func...
详细信息
In this paper, there will be presented the design and implementation of the Remote Laboratory (RL) of the Hellenic Mediterranean University (HMU). It will be also presented the hardware which is used and the software ...
详细信息
Accelerometers are inertial sensors that detect acceleration and forces along three orthogonal axes, then the readings are produced as a digital or analog signal and used in various applications. Microelectromechanica...
详细信息
暂无评论