Quantization index modulation (QIM) based VoIP steganography can conceal secret information in VoIP streams. Malicious users could use this technology to conduct illegal activities, threatening network and public secu...
详细信息
Kernels are scheduled on Graphics Processing Units (GPUs) in the granularity of GPU warp, which is a bunch of threads that must be scheduled together. When executing kernels with conditional branches, the threads with...
详细信息
Distributed storage can store data in multiple devices or servers to improve data ***,in today’s explosive growth of network data,traditional distributed storage scheme is faced with some severe challenges such as in...
详细信息
Distributed storage can store data in multiple devices or servers to improve data ***,in today’s explosive growth of network data,traditional distributed storage scheme is faced with some severe challenges such as insufficient performance,data tampering,and data lose.A distributed storage scheme based on blockchain has been proposed to improve security and efficiency of traditional distributed *** this scheme,the following improvements have been made in this *** paper first analyzes the problems faced by distributed *** proposed to build a new distributed storage blockchain scheme with sharding *** proposed scheme realizes the partitioning of the network and nodes by means of blockchain sharding technology,which can improve the efficiency of data verification between *** addition,this paper uses polynomial commitment to construct a new verifiable secret share scheme called *** new scheme is one of the foundations for building our improved distributed storage blockchain *** with the previous scheme,our new scheme does not require a trusted third party and has some new features such as homomorphic and batch *** security of VSS can be further *** comparisons show that the proposed scheme significantly reduces storage and communication costs.
In this paper, we introduce an image restoration network that is based on the High-Efficiency Transformer (HET). The model utilizes fast Fourier convolution for image enhancement, incorporates self-attention mechanism...
详细信息
This study proposes an end-to-end method aimed at achieving intelligent colorization of images. This approach enables automatic colorization of grayscale images by taking in a grayscale image and a colored reference i...
详细信息
In an era where Intelligent Decision Support Systems (IDSS) are integral to managing the vast data from Internet of Everything (IoE) systems, this study introduces IDSDeep-CCD, a novel IDSS approach for detecting conc...
详细信息
Accurately and promptly identifying harmful gases in the environment can effectively prevent many accidents. Most existing pattern recognition methods are focused on addressing gas classification problems in static sc...
详细信息
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built...
详细信息
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data.
High-fidelity(HiFi)sequencing has facilitated the assembly and analysis of the most repetitive region of the genome,the ***,our current understanding of human centromeres is based on a relatively small number of telom...
详细信息
High-fidelity(HiFi)sequencing has facilitated the assembly and analysis of the most repetitive region of the genome,the ***,our current understanding of human centromeres is based on a relatively small number of telomere-to-telomere assemblies,which have not yet captured its full *** this study,we investigated the genomic diversity of human centromere higher order repeats(HORs)via both HiFi reads and haplotype-resolved assemblies from hundreds of samples drawn from ongoing pangenome-sequencing projects and reprocessed them via a novel HOR annotation pipeline,*** used this wealth of data to provide a global survey of the centromeric HOR landscape;in particular,we found that 23 HORs presented significant copy number variability between *** detected three centromere genotypes with unbalanced population frequencies on chromosomes 5,8,and *** inter-assembly comparison of HOR loci further revealed that while HOR array structures are diverse,they nevertheless tend to form a number of specific landscapes,each exhibiting different levels of HOR subunit expansion and possibly reflecting a cyclical evolutionary transition from homogeneous to nested structures and back.
Brain-computer interfaces (BCIs) offer promising solutions for upper limb rehabilitation. Despite advancements in deep learning, traditional models for motor rehabilitation using electroencephalography (EEG) or electr...
详细信息
暂无评论