Autonomous Underwater Gliders (AUGs) are extensively developed vehicles capable of prolonged exploration and observation in complex marine environments. Control of the AUG is challenging due to its slow response syste...
详细信息
Alzheimer’s disease is a progressive neurodegenerative disorder that gradually deprives the patient of cognitive function and can end in death. With the advancement of technology today, it is possible to detect Alzhe...
详细信息
Various unwelcome conditions have existed since the introduction of the novel coronavirus illness (COVID-19). COVID-19 can cause fever, muscle soreness, shortness of breath, cough, headache, and other symptoms. Diagno...
详细信息
The tailoring business involves services where tailors create or repair clothing. Currently, the number of tailors with various skill sets is on the rise. However, customers often struggle to find tailors who meet the...
详细信息
Breast cancer is among the most prevalent cancers, and early detection is crucial to successful treatment. One of the most crucial phases of breast cancer treatment is a correct diagnosis. Numerous studies exist about...
详细信息
Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of ...
详细信息
Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of *** the work is done offshore,these agreements or images must be shared through the Internet or stored over the *** breach of privacy,on the other hand,is a potential threat for the image owners as both the Internet and cloud servers are not void of *** article proposes a novel algorithm for securing the NDAs in the form of *** an agreement is signed between the two parties,it will be encrypted before sending to the cloud server or travelling through the public network,the *** the image is input to the algorithm,its pixels would be scrambled through the set of randomly generated rectangles for an arbitrary amount of *** confusion effects have been realized through an XOR operation between the confused image,and chaotic ***,5D multi-wing hyperchaotic system has been employed to spawn the chaotic vectors due to good properties of chaoticity it *** machine experimentation and the security analysis through a comprehensive set of validation metric vividly demonstrate the robustness,defiance to the multifarious threats and the prospects for some real-world application of the proposed encryption algorithm for the NDA images.
The conventional approach to manual inspection can be described by its considerable time and labor demands and the unavoidable occurrence of human error when faced with the inspection of a large number of products. Th...
详细信息
Numerical P systems are compuational models which are inspired by cellular processes and use numerical values inside the membrane structure. In this paper we will present the variants of numerical P systems that have ...
详细信息
The simulation of robots behavior and the use of robust models are very important for building controllers. Testing is an important aspect in this process. In this paper, a test-driven approach for designing robot con...
详细信息
In the dynamic landscape of energy efficiency, a domain garnering ever increasing attention and urgency, the cornerstone of informed decision-making resides in the acquisition of reliable data. This paper summarizes t...
详细信息
暂无评论