A new meaningful image encryption algorithm based on compressive sensing(CS)and integer wavelet transformation(IWT)is proposed in this *** of all,the initial values of chaotic system are encrypted by RSA algorithm,and...
详细信息
A new meaningful image encryption algorithm based on compressive sensing(CS)and integer wavelet transformation(IWT)is proposed in this *** of all,the initial values of chaotic system are encrypted by RSA algorithm,and then they are open as public *** make the chaotic sequence more random,a mathematical model is constructed to improve the random ***,the plain image is compressed and encrypted to obtain the secret ***,the secret image is inserted with numbers zero to extend its size same to the plain *** applying IWT to the carrier image and discrete wavelet transformation(DWT)to the inserted image,the secret image is embedded into the carrier ***,a meaningful carrier image embedded with secret plain image can be obtained by inverse ***,the measurement matrix is built by both chaotic system and Hadamard matrix,which not only retains the characteristics of Hadamard matrix,but also has the property of control and synchronization of chaotic ***,information entropy of the plain image is employed to produce the initial conditions of chaotic *** a result,the proposed algorithm can resist known-plaintext attack(KPA)and chosen-plaintext attack(CPA).By the help of asymmetric cipher algorithm RSA,no extra transmission is needed in the *** simulations show that the normalized correlation(NC)values between the host image and the cipher image are *** is to say,the proposed encryption algorithm is imperceptible and has good hiding effect.
With the increasing complexity of graph query processing tasks, it is difficult for users to obtain the accurate cardinality before or during the execution of query tasks. Accurate estimate query cardinality is crucia...
详细信息
To solve the problem of grid coarse-grained reconfigurable array task mapping under multiple constraints,we propose a Loop Subgraph-Level Greedy Mapping(LSLGM)algorithm using parallelism and processing element *** the...
详细信息
To solve the problem of grid coarse-grained reconfigurable array task mapping under multiple constraints,we propose a Loop Subgraph-Level Greedy Mapping(LSLGM)algorithm using parallelism and processing element *** the constraint of a reconfigurable array,the LSLGM algorithm schedules node from a ready queue to the current reconfigurable cell array *** mapping a node,its successor’s indegree value will be dynamically *** its successor’s indegree is zero,it will be directly scheduled to the ready queue;otherwise,the predecessor must be dynamically *** the predecessor cannot be mapped,it will be scheduled to a blocking *** dynamically adjust the ready node scheduling order,the scheduling function is constructed by exploiting factors,such as node number,node level,and node *** with the loop subgraph-level mapping algorithm,experimental results show that the total cycles of the LSLGM algorithm decreases by an average of 33.0%(PEA44)and 33.9%(PEA_(7×7)).Compared with the epimorphism map algorithm,the total cycles of the LSLGM algorithm decrease by an average of 38.1%(PEA_(4×4))and 39.0%(PEA_(7×7)).The feasibility of LSLGM is verified.
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy conce...
详细信息
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy *** research emphasizes data security and user privacy concerns within smart ***,existing methods struggle with efficiency and security when processing large-scale *** efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent *** paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data *** approach optimizes data preprocessing,integrates Long Short-Term Memory(LSTM)networks for handling time-series data,and employs homomorphic encryption to safeguard user *** also explores the application of Boneh Lynn Shacham(BLS)signatures for user *** proposed scheme’s efficiency,security,and privacy protection capabilities are validated through rigorous security proofs and experimental analysis.
Recommender systems aim to filter information effectively and recommend useful sources to match users' requirements. However, the exponential growth of information in recent social networks may cause low predictio...
详细信息
Area has become one of the main bottlenecks restricting the development of integrated circuits. The area optimization approaches of existing XNOR/OR-based mixed polarity Reed-Muller(MPRM) circuits have poor optimizati...
详细信息
Area has become one of the main bottlenecks restricting the development of integrated circuits. The area optimization approaches of existing XNOR/OR-based mixed polarity Reed-Muller(MPRM) circuits have poor optimization effect and efficiency. Given that the area optimization of MPRM logic circuits is a combinatorial optimization problem, we propose a whole annealing adaptive bacterial foraging algorithm(WAA-BFA), which includes individual evolution based on Markov chain and Metropolis acceptance criteria, and individual mutation based on adaptive probability. To address the issue of low conversion efficiency in existing polarity conversion approaches, we introduce a fast polarity conversion algorithm(FPCA). Moreover, we present an MPRM circuits area optimization approach that uses the FPCA and WAA-BFA to search for the best polarity corresponding to the minimum circuits area. Experimental results demonstrate that the proposed MPRM circuits area optimization approach is effective and can be used as a promising EDA tool.
The growing computing power,easy acquisition of large-scale data,and constantly improved algorithms have led to a new wave of artificial intelligence(AI)applications,which change the ways we live,manufacture,and do **...
详细信息
The growing computing power,easy acquisition of large-scale data,and constantly improved algorithms have led to a new wave of artificial intelligence(AI)applications,which change the ways we live,manufacture,and do *** with this development,a rising concern is the relationship between AI and human intelligence,namely,whether AI systems may one day overtake,manipulate,or replace *** this paper,we introduce a novel concept named hybrid human-artificial intelligence(H-AI),which fuses human abilities and AI capabilities into a unified *** presents a challenging yet promising research direction that prompts secure and trusted AI innovations while keeping humans in the loop for effective *** scientifically define the concept of H-AI and propose an evolution road map for the development of AI toward *** then examine the key underpinning techniques of H-AI,such as user profile modeling,cognitive computing,and human-in-the-loop machine ***,we discuss H-AI’s potential applications in the area of smart homes,intelligent medicine,smart transportation,and smart ***,we conduct a critical analysis of current challenges and open gaps in H-AI,upon which we elaborate on future research issues and directions.
As a key communication technology in IEEE 802.15.4, Time Slot Channel Hopping (TSCH) enhances transmission reliability and interference immunity by scheduling of time slots and channel assignments. This paper presents...
详细信息
The post-processing rendered sequences improves the quality of the sequences and shortens the time of the rendering phase. However, most of the current post-processing methods for sequences are suitable for video. Dir...
详细信息
With the rising popularity of online social interactions, emojis play a pivotal role in communication, effectively conveying people's emotions. Hence, accurately converting facial micro-expressions into correspond...
详细信息
暂无评论