Accurately removing eyeglasses from facial images is crucial for improving the performance of various face-related tasks such as verification, identification, and reconstruction. This paper presents a novel approach t...
详细信息
Population-based tree seed algorithm (TSA), a popular optimization algorithm, was used in this study. The purpose of this study is to develop a TSA via improving its exploitation and exploration capability which is th...
详细信息
Non-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to *** ensures with high probability that decoded message is either completely unrela...
详细信息
Non-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to *** ensures with high probability that decoded message is either completely unrelated or the original one,when tampering has no ***,standard version of non-malleable codes provide security against one time tampering *** ciphers are successfully employed in the construction of non-malleable *** construction fails to provide security when an adversary tampers the codeword more than *** non-malleable codes further allow an attacker to tamper the message for polynomial number of *** this work,we propose continuous version of non-malleable codes from block ciphers in split-state *** construction provides security against polynomial number of tampering attacks and it preserves *** the tam-pering experiment triggers self-destruct,the security of continuously non-malleable code reduces to security of the underlying leakage resilient storage.
Efficient real-time traffic prediction is crucial for reducing transportation time. To predict traffic conditions, we employ a spatio-temporal graph neural network (ST-GNN) to model our real-time traffic data as tempo...
详细信息
Wireless Sensor Network(WSNs)is an infrastructure-less wireless net-work deployed in an increasing number of wireless sensors in an ad-hoc *** the sensor nodes could be powered using batteries,the development of WSN e...
详细信息
Wireless Sensor Network(WSNs)is an infrastructure-less wireless net-work deployed in an increasing number of wireless sensors in an ad-hoc *** the sensor nodes could be powered using batteries,the development of WSN energy constraints is considered to be a key *** wireless sensor networks(WSNs),wireless mobile chargers(MCs)conquer such issues mainly,energy *** proposed work is to produce an energy-efficient recharge method for Wireless Rechargeable Sensor Network(WRSN),which results in a longer lifespan of the network by reducing charging delay and maintaining the residual energy of the *** this algorithm,each node gets sorted using the K-means technique,in which the data gets distributed into various *** mobile charges execute a Short Hamiltonian cycle opposite direction to reach each cluster’s anchor *** position of the anchor points is calculated based on the energy distribution using the base *** this case,the network will act as a spare MC,so that one of the two MCs will run out of energy before reaching the *** the current tours of the two MCs terminate,regression analysis for energy prediction initiates,enabling the updating of anchor points in the upcoming *** on thefindings of the regression-based energy prediction model,the recommended algorithm could effectively refill network energy.
We studied the weekly number and the growth/decline rates of COVID-19 deaths of the period from October 31, 2022, to February 9, 2023, in Italy. We found that the COVID-19 winter wave reached its peak during the three...
详细信息
Dear Editor,The distributed constraint optimization problems(DCOPs) [1]-[3]provide an efficient model for solving the cooperative problems of multi-agent systems, which has been successfully applied to model the real-...
Dear Editor,The distributed constraint optimization problems(DCOPs) [1]-[3]provide an efficient model for solving the cooperative problems of multi-agent systems, which has been successfully applied to model the real-world problems like the distributed scheduling [4], sensor network management [5], [6], multi-robot coordination [7], and smart grid [8]. However, DCOPs were not well suited to solve the problems with continuous variables and constraint cost in functional form, such as the target tracking sensor orientation [9], the air and ground cooperative surveillance [10], and the sensor network coverage [11].
End-node internet-of-things devices are not very intelligent and resource-constrained;thus, they are vulnerable to cyber threats. They have their IP address, and once the hacker traces the IP, it becomes easy to get i...
详细信息
Deep learning methods have played a prominent role in the development of computer visualization in recent years. Hyperspectral imaging (HSI) is a popular analytical technique based on spectroscopy and visible imaging ...
详细信息
Intrusion detection systems (IDS) are crucial in the identification of unauthorized activities on a digital network, enabling cybersecurity measures to initiate prevention protocols to protect the security of their ne...
详细信息
暂无评论