Abstract: The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across ...
Abstract: Automated guided vehicles are widely utilized in the real production environment for tasks such as job transfer and inter-factory collaboration, yet they remain relatively underexplored in ...
Abstract: The spatio-temporal fusion technology can effectively solve the problem of missing time series data. However, existing algorithms often struggle to accurately capture surface feature changes ...
Abstract: This article analyzes the security performance of an image encryption algorithm based on a 3-D Boolean convolutional neural network (CNN). The algorithm utilizes the convolutional layers of ...
Abstract: This paper focuses on various encryption approaches to cope with different network attacks on IoT devices and a quality analysis of them has been performed. Currently network attacks such as ...
Abstract: This research study proposes a secure application framework by utilizing encryption technology appropriate to the sensitive content of the journalistic work. It employs multi-roles of ...
Abstract: This work presents an efficient and secure video encryption algorithm that utilizes a newly designed one-dimensional sine-cubic chaotic map. The 1D sine-cubic chaotic map (SCCM) is developed ...
Abstract: Power-split hybrid transmissions have been widely used in the automotive industry. Among them, two-mode powersplit hybrid transmissions can be adapted to a more variety of vehicles. Its ...
THE PROMISE at the heart of the artificial-intelligence (AI) boom is that programming a computer is no longer an arcane skill: a chatbot or large language model (LLM) can be instructed in simple ...
VeraCrypt is a free and open-source disk encryption software used to secure sensitive data on Windows, macOS, and Linux systems. It builds on the legacy of TrueCrypt, introducing enhanced security ...