-
161
Huffman coding-based data reduction and quadristego logic for secure image steganography
Published 2025-05-01“…To address these challenges, this study proposes a novel steganographic algorithm integrating two key innovations: (1) Enhancement of stego image quality via stego image’s segmentation into four images, reducing concentration-induced distortions, and (2) optimization of data embedding through Huffman coding through a lossless compression minimizing the embedding-induced distortions while maximizing payload capacity. …”
Get full text
Article -
162
FEXGBIDS: Federated XGBoost-Based Intrusion Detection System for In-Vehicle Network
Published 2025-01-01“…We use the BatchCrypt algorithm to batch encrypt first- and second-order gradients to reduce the computational and communication overhead of Paillier homomorphic encryption. …”
Get full text
Article -
163
TCCM: Trajectory Converged Chaff-Based Mix-Zone Strategy for Enhancing Location Privacy in VANET
Published 2025-01-01“…Additionally, the TCCM strategy incorporates a genetic algorithm to optimize mix zone placement and ensure a balance between privacy protection and resource efficiency. …”
Get full text
Article -
164
CONSTRUCTION OF SUBSTITUTION BOX (S-BOX) BASED ON IRREDUCIBLE POLYNOMIALS ON GF(2^8)
Published 2024-03-01“…In the field of modern encryption algorithms, the creation of S-Box is an essential element that plays an important role in maintaining data security in various industries. …”
Get full text
Article -
165
An online tool based on the Internet of Things and intelligent blockchain technology for data privacy and security in rural and agricultural development
Published 2025-07-01“…Central to this model is the proposed Quantum Neural Network + Bayesian Optimization (QNN + BO), a practiced algorithm that, when combined with methods like the Elliptic Curve Cryptography (ECC) and Coyote Optimization Algorithm (COA), guarantees secure data flow, processing, and storage. …”
Get full text
Article -
166
ApproximateSecret Sharing in Field of Real Numbers
Published 2025-07-01“…To address these issues, this paper proposes an innovative algorithm to optimize SSS via type-specific coding for real numbers. …”
Get full text
Article -
167
Analysis and Research on Intelligent Logistics Data under Internet of Things and Blockchain
Published 2024-12-01“…This stability is primarily attributed to the seamless integration of BC technology, which optimizes data packet transmission paths and mitigates waiting time. …”
Get full text
Article -
168
Noise Impact Analysis in Computer-Generated Holography Based on Dual Metrics Evaluation via Peak Signal-to-Noise Ratio and Structural Similarity Index Measure
Published 2025-05-01“…The findings provide theoretical guidance for noise suppression, parameter optimization, and algorithm selection in CGH systems, advancing its applications in optical encryption and high-precision imaging.…”
Get full text
Article -
169
A Novel Approach to Strengthening Cryptography Using RSA, Efficient Domination and Fuzzy Logic
Published 2025-05-01“…Although it has many applications in problems in computation, it is only for cryptography in contexts involving efficient algorithms, combinatorial structures, and optimization for security that it finds uses. …”
Get full text
Article -
170
ECC Based Load Information Protection Scheme for Electric Vehicle Users
Published 2023-01-01“…On this basis, the load decomposition algorithm is designed as a test tool for the encryption scheme to decompose the encrypted power data. …”
Get full text
Article -
171
AgriChainSync: A Scalable and Secure Blockchain-Enabled Framework for IoT-Driven Precision Agriculture
Published 2024-01-01“…The proposed framework shows a dynamic data storage algorithm that optimizes storage decisions based on data characteristics and features. …”
Get full text
Article -
172
Enhancing Efficiency and Security in MTC Environments: A Novel Strategy for Dynamic Grouping and Streamlined Management
Published 2024-04-01“…Our proposed solution integrates advanced cryptographic methods, including an optimized Authenticated Message Authentication Code (AMAC) and lightweight encryption, sophisticated optimization algorithms for dynamic grouping, and an efficient, lightweight group management protocol. …”
Get full text
Article -
173
Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks
Published 2024-06-01“…This research aims to compare the key machine learning approaches, Namely Support Vector Machines (SVM), Random Forest (RF) and Decision Trees (DT), in their ability to classify Intrusion Detection Systems (IDS) via routing networks over distributed computing systems. In addition, Algorithms perform quality control to determine the optimal hyperplane for the given data, Find neighboring data points and preserve the structure of the tree. …”
Get full text
Article -
174
The Impact of AI Software on Financial Transactions
Published 2025-01-01“…To address these challenges, the paper proposes strengthening data protection through advanced encryption and access controls, improving algorithmic transparency with Explainable AI (XAI), and enhancing regulatory frameworks to monitor high-frequency trading. …”
Get full text
Article -
175
A deep learning-orchestrated garlic routing architecture for secure telesurgery operations in healthcare 4.0
Published 2025-06-01“…ElGamal encryption encrypts the session tags for each telesurgery data relayed between surgeons and the robotic arm. …”
Get full text
Article -
176
Research on Credit Risk Prevention in Supply Chain Finance Driven by Blockchain
Published 2025-01-01“…It will also detail the principles and characteristics of blockchain technology, including its decentralized architecture, encryption algorithms, resistance to tampering, smart contract functionalities, and more. …”
Get full text
Article -
177
The Alliance of BIM and Artificial Intelligence: Challenges for a Reinvented Future – The State of the Art
Published 2025-06-01“…It also highlights the importance of data encryption, AI skills development and a comprehensive training framework within organizations to ensure successful implementation of AI-integrated BIM. …”
Get full text
Article -
178
Microservices for information support of multi-agent systems: methods of collection, monitoring and decision-making
Published 2025-01-01“…The research uses methods of building a microservice architecture to separate and autonomously perform functions such as data collection, monitoring and diagnostics in order to optimize SLA and increase system reliability. To increase the system's resilience to security threats, access control, data encryption, and anomaly analysis stages have been added to the algorithms. …”
Get full text
Article -
179
AHA: Design and Evaluation of Compute-Intensive Hardware Accelerators for AMD-Xilinx Zynq SoCs Using HLS IP Flow
Published 2025-05-01“…The increasing complexity of algorithms in embedded applications has amplified the demand for high-performance computing. …”
Get full text
Article -
180
CareNexus: Integrated solutions for Healthcare Communication
Published 2025-05-01“…A secure authentication based on multiple factors and the use of encryption algorithms, an interface based on different user roles and a prediction system based on model training had been implemented. …”
Get full text
Article