Agriculture plays a vital role in providing food to a growing world population. However, plant diseases and pests result in 50% reductions in crop yields, which exacerbates poverty and threatens a sustainable food sys...
详细信息
Earthquakes have the potential to cause catastrophic structural and economic damage. This research explores the application of machine learning for earthquake prediction using LANL (Los Alamos National Laboratory) dat...
详细信息
The sensitive data stored in the public cloud by privileged users,such as corporate companies and government agencies are highly vulnerable in the hands of cloud providers and *** proposed Virtual Cloud Storage Archi-...
详细信息
The sensitive data stored in the public cloud by privileged users,such as corporate companies and government agencies are highly vulnerable in the hands of cloud providers and *** proposed Virtual Cloud Storage Archi-tecture is primarily concerned with data integrity and confidentiality,as well as *** provide confidentiality and availability,thefile to be stored in cloud storage should be encrypted using an auto-generated key and then encoded into distinct *** the encoded chunks ensured thefile integrity,and a newly proposed Circular Shift Chunk Allocation technique was used to determine the order of chunk ***file could be retrieved by performing the opera-tions in *** the regenerating code,the model could regenerate the missing and corrupted chunks from the *** proposed architecture adds an extra layer of security while maintaining a reasonable response time and sto-rage *** results analysis show that the proposed model has been tested with storage space and response time for storage and *** VCSA model consumes 1.5x(150%)storage *** was found that total storage required for the VCSA model is very low when compared with 2x Replication and completely satisfies the CIA *** response time VCSA model was tested with different sizedfiles starting from 2 to 16 *** response time for storing and retrieving a 2 MBfile is 4.96 and 3.77 s respectively,and for a 16 MBfile,the response times are 11.06 s for storage and 5.6 s for retrieval.
Malware represents the greatest threat to cybersecurity and serves as the weapon of choice for carrying out nefarious activities in the digital realm. The proliferation of malware poses significant risks to individual...
详细信息
Mehta and Panigrahi (FOCS 2012, IEEE, Piscataway, NJ, 2012, pp. 728-737) introduce the problem of online matching with stochastic rewards, where edges are associated with success probabilities and a match succeeds wit...
详细信息
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world ***...
详细信息
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world *** existing analysis of software security vulnerabilities often focuses on specific features or *** partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the *** key novelty lies in overcoming the constraints of partial *** proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security *** guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each *** guidelines are not only practical but also applicable in real-world software,allowing for prioritized security *** proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related *** analysis resulted in the identification of a total of 121 *** successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules.
Herein, we propose high-performance Ti/STO/n+-Si and Ag/STO/n+-Si write-once-read-many-times devices, where the resistance transition mechanisms are controlled by oxygen vacancies in the STO layer and metal atoms from...
详细信息
The advancements in sensors, processing, storage and networking technologies have turned smartphone into de facto lifelogging device. Realizing the lifelogging potential of smartphone, researchers have postulated with...
详细信息
Robotics is an amalgamation of mechanical engineering and computerscience. Mechanical engineering helps to design and develop mechanical parts and devices for control systems in robots. Space robots and robotics are ...
详细信息
In the majority of Western nations including America, Australia and Europe, skin cancer is badly-behaved. Skin concealing, inadequacy of Sun-lights, climate, age, and inherited are major risk factors. Early identifica...
详细信息
暂无评论