A Lock-Free Hash Trie Design for Concurrent Tabled Logic Programs
Miguel Areias, Ricardo Rocha
openalex +2 more sources
Localization With Approximate Nearest Neighbour Search
Localization and place recognition are crucial in fields like autonomous driving and robotics, but real‐time performance is challenging with exact nearest neighbour search methods in large‐scale scenarios. The authors propose using an approximate nearest neighbour search method, specifically the hierarchical navigable small world (HNSW) structure ...
Roland Kotroczó +4 more
wiley +1 more source
An Efficient Clinical Decision Support Framework Using IoMT Based on Explainable and Trustworthy Artificial Intelligence with Transformer Model and Blockchain-Integrated Chunking. [PDF]
Arslanoğlu K, Karaköse M.
europepmc +1 more source
The Bathroom Model: A Realistic Approach to Hash Table Algorithm Optimization [PDF]
Qiantong Wang
openalex +1 more source
This paper presents a robust reversible watermarking algorithm based on Chebyshev moments, employing a two‐stage embedding mechanism. The proposed method leverages image block partitioning to embed the copyright watermark and the reversible watermark into non‐overlapping regions located inside and outside the inscribed circle of the image, respectively.
Wenjing Sun, Ling Zhang, Hongjun Zhang
wiley +1 more source
Comparative evaluation and simulation of blockchain consensus mechanisms for secure and scalable peer to peer energy trading in microgrids. [PDF]
Bhavana GB +5 more
europepmc +1 more source
Hyperchaos‐Driven 3D RGB Image Scrambling and Encryption for Multi‐Image Security
The proposed encryption scheme scrambles N colour images by stacking them into a three‐dimensional red, green, blue image, generating a secure 256‐bit key using SHA‐256 and a user‐provided salt, and applying a five‐dimensional multi‐wing hyperchaotic system to produce random key streams.
Muhammad Hanif +6 more
wiley +1 more source
Lightweight three-factor authentication protocol for 6G-enabled healthcare systems using Chebyshev chaotic maps and BioHashing. [PDF]
Abbas AM, Nasr ME, Abdelfatah RI.
europepmc +1 more source
Mixed Shared-Distributed Hash Tables Approaches for Parallel State Space Construction
Rodrigo T. Saad +2 more
openalex +1 more source
Revisiting the Security of the Lightweight Stream Cipher Draco: New Observation and TMDTO Attacks
Draco is a lightweight small‐state stream cipher proposed in 2022. It is designed to provide a 128‐bit security level and be provably secure against time‐memory‐data trade‐off (TMDTO) attacks. In this paper, we revisit the security of Draco against TMDTO attacks.
Ziyu Guan +5 more
wiley +1 more source

