Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
43161
A robust audio steganography algorithm based on differential evolution
Published 2021-11-01“…Audio steganography is to hide secret information into the audio carrier and has become a research hotspot in the field of information hiding.Most of the existing studies focus on minimizing distortion at the expense of steganography capacity, and it is often difficult for them to extract secret information correctly after some common signal processing attacks.Therefore, based on the spread spectrum technology, firstly, the relationship between steganography parameters (i.e., segmented scaling parameters and steganography capacity) and imperceptibility as well as robustness was analyzed.Next, a multi-objective optimization model of audio steganography was presented, in which segmented scaling parameters and steganography capacity were decision variables, imperceptibility and steganography capacity were optimization objectives, and the signal-to-noise ratio was a constraint.Then, a robust audio steganography algorithm based on differential evolution was proposed, including the corresponding encoding, fitness function, crossover and mutation operators.Finally, comparative experimental results show that the proposed steganography algorithm can achieve better robustness against common signal processing attacks on the premise of ensuring imperceptibility and anti-detection.…”
Get full text
Article -
43162
Meta‐stability immunity technique for high speed SAR ADCs
Published 2017-03-01“…The ADC chip was fabricated in a 65 nm CMOS technology. It achieves an ENOB of 7.45 bits, with 48 mW power consumption and an area of 0.075 mm2.…”
Get full text
Article -
43163
-
43164
(Dis)Connected Generation
Published 2025-01-01“…Findings included that students recognize the distraction that mobile devices have on their learning yet need more self-management skills to ensure that technology does not disrupt the focus required to learn. …”
Get full text
Article -
43165
Privacy-preserving multi-attribute reverse spectrum auction scheme
Published 2020-09-01“…Aiming the problem that the existing reverse spectrum auctions do not take the non-price attribute of spectrum into account and the security of spectrum auction,a privacy-preserving multi-attribute reverse spectrum auction was proposed.Firstly,price and non-price positive attributes of spectrum were considered as the bidding scheme of bidders and auctions was performed to judge spectrum winners.Secondly,to ensure the security of the spectrum auction,the Paillier threshold system was used to introduce a group of spectrum auction servers of auctioneers to replace the traditional single third-party agency,which could prevent the fraud collusion between spectrum auctioneers and bidders.The cryptography tools such as the anonymization technology and oblivious transfer were introduced to achieve the secure features,which could make the spectrum auction performed securely.The security analysis shows that the security protocol has strong security.The performance of the protocol is also evaluated,and experimental results show that the security scheme is superior to the multi-attribute reverse auction security scheme that can be applied in the spectrum auction scenario in terms of computational overhead.…”
Get full text
Article -
43166
Intermedial Practices as Reflections on Media and the Arts. What Do Kinema-Sketches Teach Us about Screenlife Movies?
Published 2024-11-01“…The article redefines intermediality not as a mere artistic or expressive tool but as a set of practices shaping our conceptualization of technology, media, and art. In this context, intermedial practices are crucial in the continuous process through which technologies can evolve into mediums and art forms. …”
Get full text
Article -
43167
A differentially-private mechanism for multi-level data publishing
Published 2015-12-01“…Privacy preserving technology had addressed the problem of privacy leakage during data publishing proc-ess,however,current data publishing technologies mostly focused on publishing privacy preserving data with single level,without considering some scenarios of multi-level users.Therefore,a differentially-private mechanism for multi-level data publishing was proposed.The proposed mechanism employed the Laplace mechanism with different privacy budgets to output results with different privacy protection levels.After the user’s level was determined ac-cording to the charge or privilege of that specific user,the goal that a user with high(low) level can only use the out-put result with low(high) privacy protection level which had low(high) error rate could be achieved.Finally,the evaluation results and security analysis show that our proposed framework can not only prevent from background knowledge attack,but also achieve multi-level data publishing with different error rates effectively .…”
Get full text
Article -
43168
The Design Blueprint for a Large-Scale Telehealth Platform
Published 2022-01-01“…Technological innovation plays a crucial role in digital healthcare services. …”
Get full text
Article -
43169
Social-aware caching and forwarding for video streaming in information-centric 5G VANET
Published 2019-12-01“…The arrival of 5G-enabled communication technology has laid the foundation for providing high-quality video stream services in vehicular Ad Hoc network (VANET).However,current VANET still distribute video content over IP networks which design for host communication instead of content distribution.The mismatch between network function and design goals brings huge challenges for providing high quality video service.Based on the above questions,a social-aware caching and forwarding was proposed to support efficient video streaming services and the time complexity of the algorithm was O(m<sup>2</sup>).Firstly,a virtual community was constructed by analyzing the user's behaviors.Then,a fast forwarding scheme was introduced to ensure that users could discover the requested videos nearby.Finally,a community-based caching policy was proposed to optimize the in-community caching distributions.Simulation results show how the proposed strategy achieves better performance than other state-of-art solutions in terms of caching hit ratio,searching delay and control overhead.…”
Get full text
Article -
43170
-
43171
Dynamics of inclined CNTRC sandwich beams under a moving mass with influence of CNT agglomeration
Published 2023-11-01Get full text
Article -
43172
ACQUISITION OF ROAD SPECTRUM BASED ON FEMFAT LAB-ADAMS
Published 2019-01-01“…The development of virtual prototype technology makes the vehicle multi-bod dynamics simulation and virtual fatigue durability calculation become the necessary means of engineering research,and obtaining reliable and effective road spectrum is the premise of the two means. …”
Get full text
Article -
43173
Astronomy Lab I: Photometric Experiments for Physics Students
Published 2023-12-01Get full text
Article -
43174
Partial fanout multicast switching model of reconfigurable foundation network
Published 2012-05-01“…The multicast switching model using copying before scheduling and fanout copying modes had worse large-scale extensibility capability in traditional technology system.A partial fanout multicast switching model with basic switching fabric comprised by 2×2 Boolean cells and Boolean group concentrators was proposed facing to reconfigurable foundation network.Self-routing path selected was realized by partial fanout copying mode and quaternary symbols cut-through coding.Unicast blocking probability,multicast blocking probability and multicast fanout ratio iterative course was deduced based on unicast and multicast mixed business source.The simulation result shows that the value of multicast blocking probability is from 10<sup>-10</sup> to 10<sup>-2</sup> based on Bernoulli uniform business source when normalized unicast load 0.2,the model can meet time QoS requirement because the value of multicast time delay is less than hundred nano-second level limit.…”
Get full text
Article -
43175
Design and innovation for the Cultural Heritage. Phygital connections for a Heritage of proximity
Published 2021-12-01“…The potential of new technologies makes it possible to create significant connections between the Heritage, the users and the stakeholders, in a hybrid spatial dimension of both physical and metaphorical proximity. …”
Get full text
Article -
43176
Editorial: Methods and applications of tumour metabolic imaging in the preclinical and clinical setting
Published 2025-01-01Get full text
Article -
43177
A critical analysis of the Mises stress criterion used in frequency domain fatigue life prediction
Published 2016-10-01Get full text
Article -
43178
Analysis of 3D Cobweb Economic Differential Dynamic System Based on Supply-Demand and Price Relationships
Published 2022-01-01“…Model (32) reveals that with the continuous improvement of production technology, supply quantity, price, and demand will fluctuate, but all three will change periodically. …”
Get full text
Article -
43179
-
43180
Fault Diagnosis of Wind Turbine Gearbox Based on Multisensor Data Fusion
Published 2022-01-01Get full text
Article