-
221
Trusted access scheme for intranet mobile terminal based on encrypted SD card
Published 2019-08-01Get full text
Article -
222
Simulations of large-scale zero boiloff, densification, and solidification of hydrogen
Published 2025-03-01“…The simulations were performed using a commercially available Computational Fluid Dynamics (CFD) pressure-based mass and momentum flow model and an enthalpy-porosity energy model. …”
Get full text
Article -
223
Multilayer magnetic skyrmion devices for spiking neural networks
Published 2025-01-01“…Spintronic devices -based on magnetic solitons, such as the domain wall motion and the skyrmions, have shown a significant potential for applications in energy-efficient data storage and beyond CMOS computing architectures. …”
Get full text
Article -
224
-
225
-
226
Unimodal‐Bio‐GAN: Keyless biometric salting scheme based on generative adversarial network
Published 2021-11-01Get full text
Article -
227
Secure and verifiable multi-keyword searchable encryption scheme in cloud
Published 2021-04-01“…Due to the advantages of cloud computing, such as virtualization and high scalability, individuals and enterprises are willing to outsource local data storage and computing to cloud servers.However, encryption breaks the linkability between the data.Although searchable encryption (SE) enables cloud servers to provide retrieval services of the encrypted data for data owners, cloud servers who are untrusted, may tamper and delete data, or learn information of the newly added encrypted files with previous trapdoors.Besides, single-keyword search inevitably incurs many unrelated results, resulting in a waste of bandwidth and computing resources.To address the problems above, an efficient and verifiable multi-keyword search encryption scheme was proposed, which could not only supported multiple-keyword search, but also realized the privacy of search pattern and forward security of the outsourced files.In the meanwhile, it also ensured the integrity check of the outsourced data.Through rigorous security verification, the proposed scheme was proved to be secure under the standard mode, and could resist offline keyword guesswork attack (KGA) on untrusted cloud servers.Finally, by comparing the efficiency and performance with the recent three searchable encryption schemes, the experimental results show that the proposed scheme has the best comprehensive performance in terms of function and efficiency among the four schemes.…”
Get full text
Article -
228
Manufacturing execution system of mineral processing based on Internet of things
Published 2018-03-01Get full text
Article -
229
Innovations at Ukrainian enterprises: use of information and communication technologies
Published 2024-06-01“…Only about 10% of all enterprises in Ukraine use cloud computing services. The article presents a subjective assessment, namely, the results of a survey of Ukraini-an companies based on 2023 data regarding using the new technologies, including: ChatGPT and Artificial Intelligence, cloud services and data storage, online services and platforms for remote work organization, QES for personal identification, CRM sys-tems for working with clients, creation of mobile applications and chatbots in messen-gers. …”
Get full text
Article -
230
ICGenomics: A PROGRAM COMPLEX FOR ANALYSIS OF SYMBOL SEQUENCES IN GENOMICS
Published 2014-12-01Get full text
Article -
231
-
232
MQTT in Action: Building Reliable and Scalable Home Automation Systems
Published 2024-12-01Get full text
Article -
233
Towards accurate anomaly detection for cloud system via graph-enhanced contrastive learning
Published 2024-11-01“…Moreover, complicated topological associations existed between cloud servers (e.g., computation, storage, and communication). While acquiring resource information, correlating the system topology is challenging. …”
Get full text
Article -
234
Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping
Published 2024-12-01“…Multi-key fully homomorphic encryption (MK-FHE) technology supports homomorphic operations on ciphertexts encrypted with different keys, and can be directly applied to real-world multi-user data fusion computing scenarios, such as multi-party collaborative computing and federated learning. …”
Get full text
Article -
235
Cloud-Integrated Meteorological Parameter Prediction by Leveraging Multivariate Statistical Time Series and GANs
Published 2025-01-01“…Using cloud-based services ensures scalability and computational efficiency for data storage, processing, and model deployment in weather parameters. …”
Get full text
Article -
236
Research on the lightweight detection method of rail internal damage based on improved YOLOv8
Published 2025-01-01“…Abstract To address the challenges of high computational costs, large storage demands, and low detection accuracy in internal rail damage identification, we propose a lightweight detection model, GhostMicroNet-YOLOv8n, as an enhancement of YOLOv8n. …”
Get full text
Article -
237
Global Research Priorities for Holistic Integration of Water and Power Systems
Published 2024-01-01Get full text
Article -
238
Research on Spaceborne Neural Network Accelerator and Its Fault Tolerance Design
Published 2024-12-01“…This fault-tolerant architecture analyzes the hardware accelerator, parameter storage, and actual computation, employing data validation to reinforce model parameters and spatial and temporal TMR to reinforce accelerator computations. …”
Get full text
Article -
239
Ferroelectric capacitive memories: devices, arrays, and applications
Published 2025-01-01“…Abstract Ferroelectric capacitive memories (FCMs) utilize ferroelectric polarization to modulate device capacitance for data storage, providing a new technological pathway to achieve two-terminal non-destructive-read ferroelectric memory. …”
Get full text
Article -
240
Gene Selection Based Cancer Classification With Adaptive Optimization Using Deep Learning Architecture
Published 2024-01-01“…In the existing works, certain limitations, such as reduced performance due to degraded data quality, high storage space requirements, overfitting issues, and lack of robustness, can compromise overall classification accuracy. …”
Get full text
Article