Showing 43,161 - 43,180 results of 68,043 for search '"technology"', query time: 0.19s Refine Results
  1. 43161

    A robust audio steganography algorithm based on differential evolution by Zhaopin SU, Chaoyong SHEN, Guofu ZHANG, Feng YUE, Donghui HU

    Published 2021-11-01
    “…Audio steganography is to hide secret information into the audio carrier and has become a research hotspot in the field of information hiding.Most of the existing studies focus on minimizing distortion at the expense of steganography capacity, and it is often difficult for them to extract secret information correctly after some common signal processing attacks.Therefore, based on the spread spectrum technology, firstly, the relationship between steganography parameters (i.e., segmented scaling parameters and steganography capacity) and imperceptibility as well as robustness was analyzed.Next, a multi-objective optimization model of audio steganography was presented, in which segmented scaling parameters and steganography capacity were decision variables, imperceptibility and steganography capacity were optimization objectives, and the signal-to-noise ratio was a constraint.Then, a robust audio steganography algorithm based on differential evolution was proposed, including the corresponding encoding, fitness function, crossover and mutation operators.Finally, comparative experimental results show that the proposed steganography algorithm can achieve better robustness against common signal processing attacks on the premise of ensuring imperceptibility and anti-detection.…”
    Get full text
    Article
  2. 43162

    Meta‐stability immunity technique for high speed SAR ADCs by L. Qiu, K. Tang, Y.J. Zheng, L. Siek

    Published 2017-03-01
    “…The ADC chip was fabricated in a 65 nm CMOS technology. It achieves an ENOB of 7.45 bits, with 48 mW power consumption and an area of 0.075 mm2.…”
    Get full text
    Article
  3. 43163
  4. 43164

    (Dis)Connected Generation by Amy Baldwin, Louis Nadelson, Dana Triblle

    Published 2025-01-01
    “…Findings included that students recognize the distraction that mobile devices have on their learning yet need more self-management skills to ensure that technology does not disrupt the focus required to learn. …”
    Get full text
    Article
  5. 43165

    Privacy-preserving multi-attribute reverse spectrum auction scheme by Jiaqi WANG, Ning LU, Qingfeng CHENG, Zhaoxia WU, Wenbo SHI

    Published 2020-09-01
    “…Aiming the problem that the existing reverse spectrum auctions do not take the non-price attribute of spectrum into account and the security of spectrum auction,a privacy-preserving multi-attribute reverse spectrum auction was proposed.Firstly,price and non-price positive attributes of spectrum were considered as the bidding scheme of bidders and auctions was performed to judge spectrum winners.Secondly,to ensure the security of the spectrum auction,the Paillier threshold system was used to introduce a group of spectrum auction servers of auctioneers to replace the traditional single third-party agency,which could prevent the fraud collusion between spectrum auctioneers and bidders.The cryptography tools such as the anonymization technology and oblivious transfer were introduced to achieve the secure features,which could make the spectrum auction performed securely.The security analysis shows that the security protocol has strong security.The performance of the protocol is also evaluated,and experimental results show that the security scheme is superior to the multi-attribute reverse auction security scheme that can be applied in the spectrum auction scenario in terms of computational overhead.…”
    Get full text
    Article
  6. 43166

    Intermedial Practices as Reflections on Media and the Arts. What Do Kinema-Sketches Teach Us about Screenlife Movies? by Izabella Füzi

    Published 2024-11-01
    “…The article redefines intermediality not as a mere artistic or expressive tool but as a set of practices shaping our conceptualization of technology, media, and art. In this context, intermedial practices are crucial in the continuous process through which technologies can evolve into mediums and art forms. …”
    Get full text
    Article
  7. 43167

    A differentially-private mechanism for multi-level data publishing by Wen-jing ZHANG, Hui LI

    Published 2015-12-01
    “…Privacy preserving technology had addressed the problem of privacy leakage during data publishing proc-ess,however,current data publishing technologies mostly focused on publishing privacy preserving data with single level,without considering some scenarios of multi-level users.Therefore,a differentially-private mechanism for multi-level data publishing was proposed.The proposed mechanism employed the Laplace mechanism with different privacy budgets to output results with different privacy protection levels.After the user’s level was determined ac-cording to the charge or privilege of that specific user,the goal that a user with high(low) level can only use the out-put result with low(high) privacy protection level which had low(high) error rate could be achieved.Finally,the evaluation results and security analysis show that our proposed framework can not only prevent from background knowledge attack,but also achieve multi-level data publishing with different error rates effectively .…”
    Get full text
    Article
  8. 43168

    The Design Blueprint for a Large-Scale Telehealth Platform by Rattakorn Poonsuph

    Published 2022-01-01
    “…Technological innovation plays a crucial role in digital healthcare services. …”
    Get full text
    Article
  9. 43169

    Social-aware caching and forwarding for video streaming in information-centric 5G VANET by Tengfei CAO, Cuili JIANG, Zhiqiang LIU, Xiaoying WANG

    Published 2019-12-01
    “…The arrival of 5G-enabled communication technology has laid the foundation for providing high-quality video stream services in vehicular Ad Hoc network (VANET).However,current VANET still distribute video content over IP networks which design for host communication instead of content distribution.The mismatch between network function and design goals brings huge challenges for providing high quality video service.Based on the above questions,a social-aware caching and forwarding was proposed to support efficient video streaming services and the time complexity of the algorithm was O(m<sup>2</sup>).Firstly,a virtual community was constructed by analyzing the user's behaviors.Then,a fast forwarding scheme was introduced to ensure that users could discover the requested videos nearby.Finally,a community-based caching policy was proposed to optimize the in-community caching distributions.Simulation results show how the proposed strategy achieves better performance than other state-of-art solutions in terms of caching hit ratio,searching delay and control overhead.…”
    Get full text
    Article
  10. 43170
  11. 43171
  12. 43172

    ACQUISITION OF ROAD SPECTRUM BASED ON FEMFAT LAB-ADAMS by FENG JinZhi, ZHENG GuangLei, ZHENG SongLin, ZHAO LiHui, LIANG JunYi

    Published 2019-01-01
    “…The development of virtual prototype technology makes the vehicle multi-bod dynamics simulation and virtual fatigue durability calculation become the necessary means of engineering research,and obtaining reliable and effective road spectrum is the premise of the two means. …”
    Get full text
    Article
  13. 43173
  14. 43174

    Partial fanout multicast switching model of reconfigurable foundation network by Bo ZHANG, Bin-qiang WANG, Sheng-ping ZHU

    Published 2012-05-01
    “…The multicast switching model using copying before scheduling and fanout copying modes had worse large-scale extensibility capability in traditional technology system.A partial fanout multicast switching model with basic switching fabric comprised by 2×2 Boolean cells and Boolean group concentrators was proposed facing to reconfigurable foundation network.Self-routing path selected was realized by partial fanout copying mode and quaternary symbols cut-through coding.Unicast blocking probability,multicast blocking probability and multicast fanout ratio iterative course was deduced based on unicast and multicast mixed business source.The simulation result shows that the value of multicast blocking probability is from 10<sup>-10</sup> to 10<sup>-2</sup> based on Bernoulli uniform business source when normalized unicast load 0.2,the model can meet time QoS requirement because the value of multicast time delay is less than hundred nano-second level limit.…”
    Get full text
    Article
  15. 43175

    Design and innovation for the Cultural Heritage. Phygital connections for a Heritage of proximity by Eleonora Lupo

    Published 2021-12-01
    “…The potential of new technologies makes it possible to create significant connections between the Heritage, the users and the stakeholders, in a hybrid spatial dimension of both physical and metaphorical proximity. …”
    Get full text
    Article
  16. 43176
  17. 43177
  18. 43178

    Analysis of 3D Cobweb Economic Differential Dynamic System Based on Supply-Demand and Price Relationships by Debao Gao

    Published 2022-01-01
    “…Model (32) reveals that with the continuous improvement of production technology, supply quantity, price, and demand will fluctuate, but all three will change periodically. …”
    Get full text
    Article
  19. 43179
  20. 43180