Showing 821 - 840 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 821
  2. 822

    Key technology and application of intelligent connected patrol vehicles for security scenario by Yuchao LIU, Ziyue LI

    Published 2020-04-01
    “…Practical applications combined with industry scene is a common problem in the present artificial intelligence technology.Facing the security application scenario,the practice landing of unmanned technology -- intelligent connected patrol vehicle was studied.Integrating different sensors such as camera,LiDAR,inertial navigation system (INS),etc,the awareness system can accurately identify the platform itself,road conditions and target behavior using key technology such as artificial intelligence (AI),data fusion.Combining human intelligence (HI) in scene cognition of human experience and artificial intelligence (AI) in cognition of computing,a hybrid intelligent cognitive system using to security scene was built.Based on human in the loop system architecture and technology such as 5G ,vehicle to everything (V2X),edge computing,etc,different interactions between human ,machine and environment were designed,which ensured the safe and reliable operation of the system and increased the work efficiency by a wide margin.…”
    Get full text
    Article
  3. 823

    Enhanced Lightweight Quantum Key Distribution Protocol for Improved Efficiency and Security by Ashutosh Bhatia, Sainath Bitragunta, Kamlesh Tiwari

    Published 2025-01-01
    “…Quantum Key Distribution (QKD) provides secure communication by leveraging quantum mechanics, with the BB84 protocol being one of its most widely adopted implementations. …”
    Get full text
    Article
  4. 824
  5. 825

    A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System by Ruikang Zhou, Yingxu Lai, Zenghui Liu, Yinong Chen, Xiangzhen Yao, Jiezhong Gong

    Published 2016-03-01
    “…By applying BAN predicate logic and AVISPA security analysis tool of network interaction protocol, we can guarantee protocol security and provide complete safety tests. …”
    Get full text
    Article
  6. 826

    An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security by Mouaad Mohy-Eddine, Azidine Guezzaz, Said Benkirane, Mourade Azrour, Yousef Farhaoui

    Published 2023-09-01
    “…However, IIoT involves some security vulnerabilities that are more damaging than those of IoT. …”
    Get full text
    Article
  7. 827
  8. 828
  9. 829
  10. 830

    Secure outsource computing scheme of modular exponentiation based on single server by Weijie DING

    Published 2018-01-01
    “…At present,in discrete-log based cryptographic protocols,most of the computational models of modular exponentiation are for primes,while less work has been done for composite.What’s more,most schemes are based on two servers,in which it requires at least one server to be honest.However,there may not be a fully trusted cloud server in the actual environment.Then a new secure method for outsourcing exponentiation modular a composite which based on a single server was proposed.The scheme used a new mathematical division method,it could ensure the privacy of the base and exponentiation.Compared with the existing schemes,the checkability of our scheme can be greatly improved.The user can detect the error result with the probability of 119/120.…”
    Get full text
    Article
  11. 831
  12. 832

    Data update algorithm based on secure network coding in cloud environment by Hao WU, Cheng-zhe LAI, Jiu-lun FAN, Jian-hua LIU

    Published 2017-05-01
    “…In the cloud environment for data storage,the use of secure network coding technology can be a good solution to the data privacy and reliability issues.However,each coding block usually has a high correlation after network coding,very few updates to the file need to be re-encoded which is extremely easy to cause information leakage and serious consumption of system resources.To solve this problem,a network coding cloud storage data updating algorithm was proposed.Just by sending files change difference matrix,the storage node could update parts of the coding block accordingly which could complete the entire update files.Experimental results show that compared with RS coding and Tornado coding,the algorithm can not only ensure data security,but also greatly improve the efficiency of data update and data reconstruction.…”
    Get full text
    Article
  13. 833
  14. 834

    Climate change, economic security, and macroeconomic stability: Insights from the EU by Lobonț Oana-Ramona, Vătavu Sorana, Nicolescu Ana-Cristina, Trip Andrei, Costea Florin

    Published 2025-01-01
    “…This research examines the impact of climate change risks on the macroeconomic situation and the security of the economic system in the EU-27 during the 2002-2020 period. …”
    Get full text
    Article
  15. 835
  16. 836
  17. 837
  18. 838
  19. 839
  20. 840