Cloud computing is an emerging field in information technology, enabling users to access a shared pool of computing resources. Despite its potential, cloud technology presents various challenges, with one of the most ...
详细信息
In this article, a neuroadaptive event-triggered containment control strategy combined with the dynamic surface control (DSC) approach is proposed for nonlinear multiagent systems (MASs) with input saturation. Based o...
详细信息
This paper examines a fluid antenna (FA)-assisted simultaneous wireless information and power transfer (SWIPT) system. Unlike traditional SWIPT systems with fixed-position antennas (FPAs), our FA-assisted system enabl...
详细信息
The efforts for data transparency and open government initiatives have resulted in a large amount of data being published on open data portals. These portals are organized to enhance published data accessibility by pr...
详细信息
Fine-Tuning of large language models is often demanding in terms of computational resources and memory. Consequently, there is a need to explore new methods that can effectively fine-Tune these models without compromi...
详细信息
Earth observation (EO) data have seen a constant surge in volume, necessitating efficient storage, retrieval, and sharing mechanisms. Cartographic projections play a vital role in transforming spheroidal surface data ...
详细信息
Open data initiatives have resulted in a large amount of data being published on open data portals. In order to make published data more accessible these portals provide search mechanisms based on metadata like catego...
详细信息
This paper presents a hybrid search based retrieval-augmented generation (RAG) system in the domain of history, in Serbian language. The system was implemented in Python programming language, and is based on Google BE...
详细信息
Visual information decoding aims to infer the visual content perceived by a subject based on their brain responses, representing a cutting-edge area of neuroscience research. Functional magnetic resonance imaging (fMR...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web o...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web of challenges, prominently centered around potential threats and data security implications. Recent cryptography techniques, such as DNA-based cryptography, 3D chaos-based cryptography, and optical cryptography, face challenges including large encryption times, high energy consumption, and suboptimal rather than optimal performance. Particularly, the burden of long encryption cycles strains the energy resources of typical low-power and compact IoT devices. These challenges render the devices vulnerable to unauthorized breaches, despite large storage capacities. The hallmark of the IoT ecosystem, characterized by its low-power compact devices, is the burgeoning volume of data they generate. This escalating data influx, while necessitating expansive storage, remains vulnerable to unauthorized access and breaches. Historically, encryption algorithms, with their multifaceted architectures, have been the bulwark against such intrusions. However, their inherently-complex nature, entailing multiple encryption cycles, strains the limited energy reserves of typical IoT devices. In response to this intricate dilemma, we present a hybrid lightweight encryption strategy. Our algorithm innovatively leverages both one-dimensional (1D) and two-dimensional (2D) chaotic key generators. Furthermore, it amalgamates a classical encryption philosophy, harmonizing the strengths of Feistel and substitution-permutation networks. The centerpiece of our strategy is achieving effective encryption in merely three rounds, tailored expressly for compressed Three-Dimensional Video (3DV) frames, ensuring their unwavering integrity. Our workflow commences with the H.264/MVC compression algorithm, setting the stage for the subsequent encryption phase. Through rigorous MATLAB simulations,
暂无评论