Results 101 to 110 of about 1,500,333 (340)

A Novel Plaintext-Related Image Encryption Algorithm Based on Stochastic Signal Insertion and Block Swapping

open access: yesIEEE Access, 2019
Image encryption is an important method for protecting private data during communication. This paper proposes a novel hyperchaotic image encryption algorithm based on stochastic signal insertion and block permutation. First, the 5D hyperchaotic system is
Shuliang Sun, Yongning Guo, Ruikun Wu
doaj   +1 more source

Stealth distributed hash table [PDF]

open access: green, 2005
Andrew Brampton   +4 more
openalex   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Longest-First Search Using Bloom Filter: Algorithm and FPGA Implementation

open access: yesIEEE Access
Due to the surge in Internet traffic and the rapid increase in forwarding table entries, achieving wire-speed packet forwarding in Internet routers demands both algorithmic enhancements and hardware innovations.
Jinsol Lee, Hyesook Lim
doaj   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Multi-stage hashing network storage structure for intelligent routing

open access: yesDianxin kexue, 2020
Network data collection and storage are fundamental for intelligent routing control,providing massive flow data for model training and decision-making.However,as the key device in network storage system,switches have very limited memory size and design ...
Feng ZHU, Qun HUANG
doaj   +2 more sources

Stealth distributed hash table [PDF]

open access: green, 2006
Andrew Brampton   +4 more
openalex   +1 more source

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

Probabilistic behavior of hash tables

open access: yes, 2003
We extend a result of Goldreich and Ron about estimating the collision probability of a hash function. Their estimate has a polynomial tail. We prove that when the load factor is greater than a certain constant, the estimator has a gaussian tail.
Hong, Dawei   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy