With the widespread use of digital media, amount of visual content on the internet and the incidence of image plagiarism has also increased. In various domains including academia, journalism and creative industries, u...
详细信息
In the era of rapid advancements in technology, the efficient digitization of paper-based documents remains a crucial challenge across various domains. The traditional approach to document scanning often struggles wit...
详细信息
CycleGAN, a significant deep learning model, has transformed medical imaging by providing a remedy for translating MRI images between different modalities. Its ability to transform T1-weighted to T2-weighted images is...
详细信息
Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple...
详细信息
Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple data owners/users,and even return the top-k most relevant search results when *** refer to a model that satisfies all of the conditions a 3-multi ranked search ***,SE schemes that have been proposed to date use fully trusted trapdoor generation centers,and several methods assume a secure connection between the data users and a trapdoor generation *** is,they assume the trapdoor generation center is the only entity that can learn the information regarding queried keywords,but it will never attempt to use it in any other manner than that requested,which is impractical in real *** this study,to enhance the security,we propose a new 3-multi ranked SE scheme that satisfies all conditions without these security *** proposed scheme uses randomized keywords to protect the interested keywords of users from both outside adversaries and the honest-but-curious trapdoor generation center,thereby preventing attackers from determining whether two different queries include the same ***,we develop a method for managing multiple encrypted keywords from every data owner,each encrypted with a different *** evaluation demonstrates that,despite the trade-off overhead that results from the weaker security assumption,the proposed scheme achieves reasonable performance compared to extant schemes,which implies that our scheme is practical and closest to real life.
Electroencephalogram (EEG) signals, inherently non-stationary and non-linear, present significant challenges in their processing and interpretation. This paper presents a hybrid mode selection approach using two advan...
详细信息
To detect Parkinson's disease, we compare the effectiveness of K-Nearest Neighbors (KNN), Logistic Regression (LR), Support Vector Machines (SVM), and Random Forest (RF) algorithms. Utilizing a dataset with clinic...
详细信息
This study explores the application of machine learning techniques to predict rainfall in Australia, addressing the challenges posed by the country’s highly variable climate. Utilizing a comprehensive dataset spannin...
详细信息
Sentiment analysis which involves identifying emotions in the text is a widely studied topic of natural language processing. Many researchers focus on social media content like posts, tweets and reviews for their stud...
详细信息
Telexistence refers to various technologies that enable a high sense of embodiment and interaction capabilities with remote environments. Although numerous telexistence systems have been explored in previous works of ...
详细信息
Cybersecurity is one of the global issues because of the extensive dependence on cyber systems of individuals, industries, and organizations. Among the cyber attacks, phishing is increasing tremendously and affecting ...
详细信息
暂无评论