Showing 10,101 - 10,120 results of 10,476 for search '"intelligence"', query time: 0.07s Refine Results
  1. 10101

    Dynamic and efficient vehicular cloud management scheme with privacy protection by Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG

    Published 2022-12-01
    “…The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed, where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services, and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users, and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition, the key negotiation and update process used lightweight signatures, supporting batch verification, to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud, adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman (ICDH) problem, it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users, realize the legal tracking of malicious vehicles, and ensure the confidentiality, integrity and anti-counterfeiting of communications, as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.…”
    Get full text
    Article
  2. 10102
  3. 10103
  4. 10104
  5. 10105
  6. 10106
  7. 10107
  8. 10108
  9. 10109

    Raising public awareness on anthropogenic underwater noise by means of playful activities and serious games by Paolo Diviacco, Massimiliano Iurcev

    Published 2025-02-01
    “…The system we developed makes it possible to gradually reduce the volume of the noise and increase the volume of the sound until it becomes intelligible. The team that identifies more sounds wins. …”
    Get full text
    Article
  10. 10110

    Wireless body area network: Architecture and security mechanism for healthcare using internet of things by Arun Kumar, Ritu Dewan, Wisam Subhi Al-Dayyeni, Bharat Bhushan, Jayant Giri, Sardar MN Islam, Ahmed Elaraby

    Published 2025-01-01
    “…The paper proposes an intelligent gateway-based verification and approval system to protect health data from IoT wearable devices, a key worldwide data security risk. …”
    Get full text
    Article
  11. 10111
  12. 10112
  13. 10113
  14. 10114

    Evaluation of the practical application of the category-imbalanced myeloid cell classification model. by Zhigang Hu, Aoru Ge, Xinzheng Wang, Cuisi Ou, Shen Wang, Junwen Wang

    Published 2025-01-01
    “…This study provided an important reference for the study of bone marrow cell classification and a practical application of the model, promoting the development of the intelligent classification of AML.…”
    Get full text
    Article
  15. 10115
  16. 10116
  17. 10117
  18. 10118
  19. 10119
  20. 10120

    ViPErLEED package I: Calculation of I(V) curves and structural optimization by Florian Kraushofer, Alexander M. Imre, Giada Franceschi, Tilman Kißlinger, Erik Rheinfrank, Michael Schmid, Ulrike Diebold, Lutz Hammer, Michele Riva

    Published 2025-01-01
    “…Added functionalities include intelligent structure-dependent defaults for most calculation parameters, automatic detection of bulk and surface symmetries and their relationship, automated search procedures that preserve the symmetry and speed up convergence, adjustments to the TensErLEED code to handle larger systems than before, as well as parallelization and optimization. …”
    Get full text
    Article