In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as freque...
详细信息
With the expansion of IoT application scenarios, the demand for edge IoT devices with integrated video analysis capabilities is gradually increasing. In remote areas where cellular base stations cannot reach, a low-co...
详细信息
The number of Internet of Things (IoT) devices in the world has grown to 43 billion in 2023. With the expansion of the IoT industry, the types and communication protocols of IoT devices are also increasing. In the act...
详细信息
Deformation monitoring data can most intuitively reflect the current movement process of the landslide and is likewise the most essential and effective warning feature of the landslide warning model. To solve the curr...
详细信息
The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data *** speaking,EHRs are widely used in blockchain-based medical data *** are valuable private assets of patients,and th...
详细信息
The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data *** speaking,EHRs are widely used in blockchain-based medical data *** are valuable private assets of patients,and the ownership belongs to *** recent research has shown that patients can freely and effectively delete the EHRs stored in hospitals,it does not address the challenge of record sharing when patients revisit *** order to solve this problem,this paper proposes a deletion and recovery scheme of EHRs based on Medical Certificate *** paper uses cross-chain technology to connect the Medical Certificate Blockchain and the Hospital Blockchain to real-ize the recovery of deleted *** the same time,this paper uses the Medical Certificate Blockchain and the InterPlanetary File System(IPFS)to store Personal Health Records,which are generated by patients visiting different medical *** addition,this paper also combines digital watermarking technology to ensure the authenticity of the restored electronic medical *** the combined effect of blockchain technology and digital watermarking,our proposal will not be affected by any other rights throughout the *** analysis and security analysis illustrate the completeness and feasibility of the scheme.
Whereas the traditional forest fire spread model cannot clearly and dynamically display the fire spread process, this paper optimizes the cell structure and evolution rules of cellular automata (CA) in the traditional...
详细信息
Hartmann wavefront sensor is applied widely in adaptive optics systems. Considering the real-time performance requirements and processing amount of Hartmann sensors in computing the centroids of points, this article p...
详细信息
Reconstructing urban traffic dynamics in three dimensions is crucial for effective traffic management. However, current research often neglects the posture and shape reconstruction of vehicles within traffic scenes. T...
详细信息
Most of the current existing style transfer methods are based on photographs or Western paintings. Due to the inherent differences between Chinese and Western paintings, direct application of existing algorithms canno...
详细信息
Assessing data quality through Functional Depen-dencies (FDs) is a crucial aspect of data governance. However, with the diverse range of data sources and the exponential growth in data volume, exact FDs can sometimes ...
详细信息
暂无评论