Abstract: The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across ...
Abstract: Automated guided vehicles are widely utilized in the real production environment for tasks such as job transfer and inter-factory collaboration, yet they remain relatively underexplored in ...
Abstract: The spatio-temporal fusion technology can effectively solve the problem of missing time series data. However, existing algorithms often struggle to accurately capture surface feature changes ...
Cryptanalyzing an Image Encryption Algorithm Underpinned by a 3-D Boolean Convolution Neural Network
Abstract: This article analyzes the security performance of an image encryption algorithm based on a 3-D Boolean convolutional neural network (CNN). The algorithm utilizes the convolutional layers of ...
Abstract: This paper focuses on various encryption approaches to cope with different network attacks on IoT devices and a quality analysis of them has been performed. Currently network attacks such as ...
Abstract: This research study proposes a secure application framework by utilizing encryption technology appropriate to the sensitive content of the journalistic work. It employs multi-roles of ...
Abstract: This work presents an efficient and secure video encryption algorithm that utilizes a newly designed one-dimensional sine-cubic chaotic map. The 1D sine-cubic chaotic map (SCCM) is developed ...
Abstract: Power-split hybrid transmissions have been widely used in the automotive industry. Among them, two-mode powersplit hybrid transmissions can be adapted to a more variety of vehicles. Its ...
THE PROMISE at the heart of the artificial-intelligence (AI) boom is that programming a computer is no longer an arcane skill: a chatbot or large language model (LLM) can be instructed in simple ...
VeraCrypt is a free and open-source disk encryption software used to secure sensitive data on Windows, macOS, and Linux systems. It builds on the legacy of TrueCrypt, introducing enhanced security ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results