-
281
Robust Image Steganography Approach Based on Edge Detection Combined With CNN Algorithm
Published 2025-01-01“…The developed model also provides a higher capacity of 8 bits per pixel (BPP) and have ensured the robustness of the system against common image processing attacks (e.g., JPEG compression, Gaussian noise, salt-and-pepper, speckle, and filtering) which is validated with PSNR values up to 76.2 dB and error rates (Re) ranging between 0.32 and 0.47. …”
Get full text
Article -
282
Eel and Grouper Optimization-Based Fuzzy FOPI-TID<sup>μ</sup>-PIDA Controller for Frequency Management of Smart Microgrids Under the Impact of Communication Delays and Cyberattacks...
Published 2025-06-01“…The Integral Time Squared Error (ITSE) of the frequency fluctuation (ΔF) around the nominal value is used as an objective function for the optimization process. …”
Get full text
Article -
283
ECDSA-based tamper detection in medical data using a watermarking technique
Published 2024-01-01“…Key metrics such as the Peak Signal-to-Noise Ratio (PSNR), Mean Squared Error (MSE), and Structural Similarity Index (SSIM) were used to evaluate performance. …”
Get full text
Article -
284
Lightweight AES Design for IoT Applications: Optimizations in FPGA and ASIC With DFA Countermeasure Strategies
Published 2025-01-01“…In addition, this study addresses vulnerabilities in lightweight AES cryptographic hardware to side-channel attacks (SCA), specifically focusing on Differential Fault Analysis (DFA). …”
Get full text
Article -
285
Cyber security Enhancements with reinforcement learning: A zero-day vulnerabilityu identification perspective.
Published 2025-01-01“…These vulnerabilities may be taken advantage of by malicious people to execute cyber-attacks leading to severe effects on organizations and individuals. …”
Get full text
Article -
286
A deep learning-orchestrated garlic routing architecture for secure telesurgery operations in healthcare 4.0
Published 2025-06-01“…Since these surgical instructions use conventional wireless networks, they can leveraged by the attackers to manipulate them and manoeuvre the entire telesurgery application. …”
Get full text
Article -
287
El set cerrado en voleibol. Diferencias y poder discriminatorio de las acciones finales en etapas de formación (Close set in volleyball. Differences and discriminatory power of fin...
Published 2012-01-01“…Statistics analysis shows differences between the condition of both the winner and the loser teams in sets in the positive attack in infantile category and in positive block and error in cadet category. …”
Get full text
Article -
288
NTRU-MCF: A Chaos-Enhanced Multidimensional Lattice Signature Scheme for Post-Quantum Cryptography
Published 2025-05-01“…Theoretical analysis shows that NTRU-MCF’s security reduces to the Ring Learning with Errors (RLWE) problem, offering superior quantum resistance compared to existing NTRU variants. …”
Get full text
Article -
289
Cancer as a result of genetic mosaicism
Published 2017-07-01“…Contrary to the generally accepted opinion about stable DNA as the carrier of hereditary information, in a normal (not just cancer) cell, this molecule is subject to the continuous changes as a result of copying errors (in the course of replication), defects of chromosome segregation (in mitosis) and direct chemical attacks (by reactive oxygen species). …”
Get full text
Article -
290
A new RS steganalysis algorithm of detecting UnderMP3Cover
Published 2018-04-01“…A new RS steganalysis algorithm to attack UnderMP3Cover was proposed.By analyzing the error caused by the RS algorithm,the choice of resolution function,the initial bias and the fitting method were modified,the flip operator was also selected in the experiment.Experimental results demonstrate that the proposed method can estimate the length of embedded message effectively and the average error reduces to 2%,which is better than the existing algorithms.…”
Get full text
Article -
291
Lightweight image encryption using integer reversible discrete Dual-Hahn transform on embedded systems
Published 2025-09-01“…The IRDDHT ensures lossless encryption by eliminating rounding errors common in floating-point transforms, maintaining image fidelity during encryption and decryption. …”
Get full text
Article -
292
Quand l’état critique est salutaire. Du procès du « décolonialisme » à l’urgence du décentrement
“…For some years now, the French social sciences –sociology in particular– have been undergoing a period of great tension that was essentially characterised by attacks on the “ideological” –and therefore unscientific– character of the discipline and its vulnerability to the invasion of “decolonialism” from the United States. …”
Get full text
Article -
293
Resilience in the Internet of Medical Things: A Review and Case Study
Published 2024-11-01“…Numerous forms of cyber-attacks pose threats to IoMT networks, making the reliable and secure transmission of critical medical data a challenging task. …”
Get full text
Article -
294
Hospitalization, mortality, and health service delivery pattern among Iranian Hajj pilgrims by age, sex, and province in 2013–22
Published 2025-03-01“…With the exception of heart attacks, other factors significantly impacted the average number of pilgrim hospitalizations at a 5% error level. …”
Get full text
Article -
295
Intelligent aerodynamic modelling method for steady/unsteady flow fields of airfoils driven by flow field images based on modified U-Net neural network
Published 2025-12-01“…Typical NACA aerofoils results show that, the prediction error for steady flow is less than 1.98%, while the prediction error for unsteady flow is less than 2.56%. …”
Get full text
Article -
296
Dual-Frequency Multi-Constellation Global Navigation Satellite System/Inertial Measurements Unit Tight Hybridization for Urban Air Mobility Applications
Published 2024-11-01“…In detail, the navigation solution, compared with a real-time kinematic GPS receiver used as the reference centimetre-level position sensor, demonstrated good accuracy, with position errors below 15 m horizontally and 10 m vertically under nominal conditions (i.e., urban scenarios characterized by satellite low visibility and multipath). …”
Get full text
Article -
297
Physical-Layer Security of a Binary Data Sequence Transmitted With Bessel–Gaussian Beams Over an Optical Wiretap Channel
Published 2018-01-01“…We found that the bit-error rate curves for the eavesdropper were consistently worse than those of the intended receiver under several turbulence conditions and that further evidence of an error floor even when the eavesdropper uses an optical amplifier is promising for secure communications.…”
Get full text
Article -
298
Do rating agencies consider the social capital of the firm in their ratings?
Published 2024-12-01“…Methodologically, our use of the 9/11 attacks as an exogenous shock to measure changes in social capital introduces a novel approach to study similar phenomena. …”
Get full text
Article -
299
Quantum secure communication algorithm based on cyclic code and information compression
Published 2020-03-01“…For the problem that the classical secure communication was challenging to transmit information,a quantum secure communication algorithm based on cyclic code and information compression was proposed.First,the data was encoded into two sets of data with different lengths by the sender,one set of data was used for cycling coding and the other one was used to compress coding.Second,single-photon sequence was transmitted to the receiver on the quantum channel by the sender.The error number was used as the basis of channel security detection.If the channel was secure,quantum states were encoded for the data,and segment transmitted by quantum stabilizer codes.The error caused by the environment can be overcome according to characteristic of the stable code.Finally,the information was decoded after receiving the quantum information,then recirculated and decompressed to obtain data.The security analysis shows that the quantum secure communication algorithm can resist the attack of jamming and spoofing attacked.The simulation results show that good results can be obtained to 5 segments for data compression.…”
Get full text
Article -
300
The Comprehensive Investigation and Discussion on the Progress of Ethereum Proof-of-Stake
Published 2025-01-01“…This article examines the latest developments in five consensus algorithms for proof of stake, with the aim of identifying errors, omissions, and shortcomings in the original proof of stake. …”
Get full text
Article