The design simulation and manufacturing of an x-band frequency uneven amplitude 90° hybrid coupler are described in this paper. This hybrid coupler is used to create a feeder network with eight output ports opera...
详细信息
The surge in online activities has led to the increasing popularity of sharing video data across diverse applications, including online education tutorials, social networking, video calling, and OTT platforms. Encrypt...
详细信息
Next-generation technologies aim to achieve highly efficient communication systems in the evolving wireless communication landscape. Among these, intelligent reflective surfaces (IRS) are expected to play a pivotal ro...
详细信息
With its untameable and traceable properties,blockchain technology has been widely used in the field of data *** to preserve individual privacy while enabling efficient data queries is one of the primary issues with s...
详细信息
With its untameable and traceable properties,blockchain technology has been widely used in the field of data *** to preserve individual privacy while enabling efficient data queries is one of the primary issues with secure data *** this paper,we study verifiable keyword frequency(KF)queries with local differential privacy in *** the numerical and the keyword attributes are present in data objects;the latter are sensitive and require privacy ***,prior studies in blockchain have the problem of trilemma in privacy protection and are unable to handle KF *** propose an efficient framework that protects data owners’privacy on keyword attributes while enabling quick and verifiable query processing for KF *** framework computes an estimate of a keyword’s frequency and is efficient in query time and verification object(VO)size.A utility-optimized local differential privacy technique is used for privacy *** data owner adds noise locally into data based on local differential privacy so that the attacker cannot infer the owner of the keywords while keeping the difference in the probability distribution of the KF within the privacy *** propose the VB-cm tree as the authenticated data structure(ADS).The VB-cm tree combines the Verkle tree and the Count-Min sketch(CM-sketch)to lower the VO size and query *** VB-cm tree uses the vector commitment to verify the query *** fixed-size CM-sketch,which summarizes the frequency of multiple keywords,is used to estimate the KF via hashing *** conduct an extensive evaluation of the proposed *** experimental results show that compared to theMerkle B+tree,the query time is reduced by 52.38%,and the VO size is reduced by more than one order of magnitude.
Due to the vast development of medical image technologies the orientation, dimension, and format of the medical images are changing drastically. The volume of these data is also changing drastically in the current sce...
详细信息
This paper discusses the design and analysis of circular shaped reconfigurable multiple-input and multiple-output (MIMO) antenna having inverted ohm-shaped slots with enhanced performance in wireless applications. Thi...
详细信息
A secure IoT system can provide end-to-end encryption, secure communication protocols, mechanisms for access control, and intrusion detection and prevention systems to protect against various cyber threats. This paper...
详细信息
The histopathological analysis is the benchmark in the diagnosis of breast cancer. During the formation of microscopic images, it may be corrupted due to Poisson noise, artifacts, and deficient poor contrast. The pres...
详细信息
Information contained in digital medical images is beneficial for patient’s diagnosis. Medical Image Watermarking (MIW) provides precise patient identification and reduces the possibility of errors during diagnosis. ...
详细信息
The inclusion of Bit Manipulation Instructions (BMIs) has become more and more important as embedded systems continue to demand optimum performance together with a good energy economy. Although BMIs have been adopted ...
详细信息
暂无评论