This study provides an innovative architectural model for e-Health systems that aims to improve cyber resilience while maintaining high availability under fluctuating traffic loads. We examined typical cybersecurity i...
详细信息
This paper presents Secure Orchestration, a novel framework meticulously planned to uphold rigorous security measures over the profound security concerns that lie within the container orchestration platforms, especial...
详细信息
In recent years, the proliferation of LEO (Low-Earth Orbit) satellites and the accumulation of space debris have made Near-Earth space more and more crowded, and hence significantly increased the risk of collisions in...
详细信息
Mental health disorders profoundly affect intellectual ability, emotional resilience, and social stability, leading to lasting effects on both individuals and society. Increasing global concern over mental health call...
详细信息
The procedure of segmenting a brain tumour is an essential step in the field of medical image processing. In order to improve the efficacy of disease treatment choices and the likelihood of patient survival, the timel...
详细信息
In this paper, we propose a deep learning-based model, called Weight and Attention Network (WANet), for video summarization. The network comprises a simple multi-head attention mechanism, followed by a feed-forward ne...
详细信息
Effective data management is crucial in navigating any health crisis. With proper data management protocols in place, stakeholders can swiftly adapt to evolving circumstances during challenging times. A recent event l...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized *** study provides an approach to color image encryption that could find practical use in various *** proposed method,which combines four chaotic systems,employs singular value decomposition and a chaotic sequence,making it both secure and *** unified average change intensity,the number of pixels’change rate,information entropy analysis,correlation coefficient analysis,compression friendliness,and security against brute force,statistical analysis and differential attacks are all used to evaluate the algorithm’s *** a thorough investigation of the experimental data,it is concluded that the proposed image encryption approach is secure against a wide range of attacks and provides superior compression friendliness when compared to chaos-based alternatives.
Suicide represents a poignant societal issue deeply entwined with mental well-being. While existing research primarily focuses on identifying suicide-related texts, there is a gap in the advanced detection of mental h...
详细信息
In the era of big data, with the increase in volume and complexity of data, the main challenge is how to use big data while preserving the privacy of users. This study was conducted with the aim of finding a solution ...
详细信息
暂无评论