Requirements elicitation is one of the fundamental sub-processes of requirements engineering which is used to find the needs of stakeholders. There are several activities in this sub-process, i.e., identification of s...
详细信息
Graph Neural Networks (GNNs) have emerged as a widely used and effective method across various domains for learning from graph data. Despite the abundance of GNN variants, many struggle with effectively propagating me...
详细信息
Blockchain technology provides transparency and reliability by sharing transactions and maintaining the same information through consensus among all ***,single-signature applications in transactions can lead to user i...
详细信息
Blockchain technology provides transparency and reliability by sharing transactions and maintaining the same information through consensus among all ***,single-signature applications in transactions can lead to user identification issues due to the reuse of public *** address this issue,group signatures can be used,where the same group public key is used to verify signatures from group members to provide anonymity to ***,in dynamic groups where membership may change,an attack can occur where a user who has left the group can disguise themselves as a group member by leaking a partial *** problem cannot be traced back to the partial key *** this paper,we propose assigning different partial keys to group members to trace partial key leakers and partially alleviate the damage caused by partial key *** schemes have shown that arbitrary tracing issues occurred when a single administrator had exclusive key generation and tracing *** paper proposes a group signature scheme that solves the synchronization problem by involving a threshold number of TMs while preventing arbitrary tracing by distributing authority among multiple TMs.
The brain tumor is considered a deadly cancer disease that can be seen among people of almost all ages. Early diagnosis and treatment by radiologists are very important in terms of diagnosing an average of 14,000 peop...
详细信息
Subject of research. Evaluation of the impact of priority data transmission in multi-channel systems of high load, presented as a queuing system with prioritization of applications. Method. The impact of priorities on...
详细信息
A chatbot is an intelligent agent that developed based on Natural language processing (NLP) to interact with people in a natural language. The development of multiple deep NLP models has allowed for the creation ...
详细信息
Most of the research conducted in action recognition is mainly focused on general human action recognition, and most of the available datasets support studies in general human action recognition. In more specific cont...
详细信息
Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological *** provide a mechanism for collecting,storing,and transmitting physiological data to healthcare ***,the open ...
详细信息
Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological *** provide a mechanism for collecting,storing,and transmitting physiological data to healthcare ***,the open wireless channel and limited resources of sensors bring security *** ensure physiological data security,this paper provides an efficient Certificateless Public Key Infrastructure Heterogeneous Ring Signcryption(CP-HRSC)scheme,in which sensors are in a certificateless cryptosystem(CLC)environment,and the server is in a public key infrastructure(PKI)*** could solve the limitations of key escrow in identity-based cryptography(IBC)and certificate management for public keys in *** PKI is suited for the server because it is widely used on the ***,this paper designs a ring signcryption method that allows the controller to anonymously encrypt physiological data on behalf of a set of sensors,but the server does not exactly know who the sensor *** construction of this paper can achieve anonymity,confidentiality,authentication,non-repudiation,and integrity in a logically single *** the computational Diffie-Hellman(CDH)problem,the formal security proof is provided in the random oracle model(ROM).This paper demonstrates that this scheme has indistinguishability against adaptive chosen ciphertext attacks(IND-CCA2)and existential unforgeability against adaptive chosen message attacks(EUF-CMA).In terms of computational cost and energy usage,a comprehensive performance analysis demonstrates that the proposed scheme is the most *** to the three existing schemes,the computational cost of this paper’s scheme is reduced by about 49.5%,4.1%,and 8.4%,and the energy usage of our scheme is reduced by about 49.4%,3.7%,and 14.2%,respectively.
The extreme learning machine is a fast neural network with outstanding performance. However, the selection of an appropriate number of hidden nodes is time-consuming, because training must be run for several values, a...
详细信息
Synthetic aperture radar (SAR) images are used extensively in agricultural applications, coastal boundary detection and object recognition. This imaging technology provides desired results in many challenging applicat...
详细信息
暂无评论