An IoT (Internet of Things) system is a multi-machine system composed of a master controller and multiple slave controllers. In some automatic control systems such as petroleum and electric power, the main control use...
详细信息
This paper proposes a method to color black & white portrait images with gender recognition model and condition generation network (cGan). As a cGan model essentially, a method named pix2pix interprets image style...
详细信息
information hiding-based visual secret sharing (IH-VSS) uses the information hiding techniques to embed secret data into images. In the IH-VSS scheme, hidden images are divided into n shadows under the guidance and co...
详细信息
GIFT is a new lightweight block cipher with smaller area and higher efficiency, which is very suitable for the Internet of Things (IoT) devices with constrained resources. The power analysis attack is an efficient met...
详细信息
In this study, we propose an ALOHA anti-collision algorithm for frame idle slot removal and collision reduction—called the Cancel Idle and Reduce Collision Framed Slotted Aloha (CIRC-FSA) algorithm—to address the co...
详细信息
With the development of the social economy, the amount of currency circulation has increased and become more frequent, but the customer gathering often occurs in many bank’s business. In this paper, with some framewo...
详细信息
Given an integer m ≥ 1. Let Σ(m) = {1, 2, · · ·, m}N be a symbolic space, and let {(bk, Dk)}mk=1 := {(bk, {0, 1, · · ·, pk−1}tk)}mk=1 be a finite sequence pairs, where integers |bk|, pk...
详细信息
Multiple-set membership query problem plays a very important role in many network systems, including packet forwarding architectures in big data centers, routing switching devices and internet firewall systems. Many s...
详细信息
Network threats caused by system vulnerabilities is increasing gradually, the distributed vulnerability scanning system can scan large-scale and complex networks and report the vulnerability information. Task scheduli...
详细信息
Digital image has the characteristics of high redundancy and convenient processing, which is the ideal carrier of information hiding application. Therefore, digital image steganography has become a hot research direct...
详细信息
暂无评论