Showing 52,081 - 52,100 results of 68,043 for search '"technology"', query time: 0.25s Refine Results
  1. 52081
  2. 52082

    Image double fragile watermarking algorithm based on block neighborhood by Yilong WANG, Zhenyu LI, Daofu GONG, Fenlin LIU

    Published 2023-06-01
    “…To address the security risks associated with fixed offset mapping in self-embedded watermarking technology, as well as the limited recovery rate of single watermarking methods, an image double fragile watermarking algorithm based on block neighborhood was proposed.The image was divided into non-overlapping blocks of size 4×4 and block truncation coding was used to generate the recovery watermark based on the image block.For each image block, a neighborhood of a proper size was specified and two mapping blocks were randomly selected from the regions within and outside the neighborhood.Then the recovery watermark was embedded into the two mapping blocks simultaneously.The image block neighborhood setting mechanism of the algorithm ensured that the image block maintains a certain distance from its corresponding mapping block.Additionally, the selection mechanism of mapping blocks inside and outside the image block neighborhood ensured a certain distance between the two mapping blocks, thereby guaranteeing the security of the watermark.In the case of continuous region tampering, the relationship between the tampered region and the neighborhood of the image block was analyzed theoretically.The analysis showed that a suitable image block neighborhood can improve the average recovery rate of the tampered area compared with the random mapping embedding algorithm.Besides, the distribution trend of the average recovery rate of the tampered area and the recovery rate of each image block in the tampered area were given by numerical calculation.It was found that the tampered area image block can be recovered 100%, some image blocks in the center of the tampered area can be recovered 100%, and the recovery rate of image blocks in tampered area will be reduced.The experimental results verify the rationality and effectiveness of the theoretical analysis.Moreover, when the neighborhood parameters are large, the proposed algorithm achieves a higher average recovery rate of the tampered region than the random mapping embedding algorithm in the case of continuous region tampering.…”
    Get full text
    Article
  3. 52083

    SWOT Analysis for Marketing Strategies of Fajar Margiyono's Bag and Luggage Business in Surakarta by Musa Fatahilah Fajar, Muhammad Sholahuddin

    Published 2025-01-01
    “…Product innovation includes introducing eco-friendly and multifunctional luggage designs tailored to specific customer segments, such as travelers and professionals. Adopting digital technology entails creating an e-commerce platform, enhancing social media marketing, and utilizing customer relationship management (CRM) software to improve customer interactions. …”
    Get full text
    Article
  4. 52084
  5. 52085
  6. 52086

    Research on strong robustness watermarking algorithm based on dynamic difference expansion by Tianqi WANG, Yingzhou ZHANG, Yunlong DI, Dingwen LI, Linlin ZHU

    Published 2023-10-01
    “…A surge in the amount of information comes with the rapid development of the technology industry.Across all industries, there is a need to collect and utilize vast amounts of data.While this big data holds immense value, it also poses unprecedented challenges to the field of data security.As relational databases serve as a fundamental storage medium for data, they often contain large-scale data rich in content and privacy.In the event of a data leak, significant losses may occur, highlighting the pressing need to safeguard database ownership and verify data ownership.However, existing database watermarking technologies face an inherent tradeoff between improving watermark embedding capacity and reducing data distortion.To address this issue and enhance watermark robustness, a novel robust database watermarking algorithm based on dynamic difference expansion was introduced.The QR code was employed as the watermark, the SVD decomposition of the low frequency part of the image was utilized after Haar wavelet transform.By extracting specific feature values and using residual feature values as the watermark sequence, it was ensured that the same-length watermark sequence contains more information and the embedded watermark length can be reduced.Furthermore, by combining the adaptive differential evolution algorithm and the minimum difference algorithm, the optimal embedding attribute bits were selected to alleviate the problems of low computational efficiency, high data distortion and poor robustness of traditional difference expansion techniques in embedding watermarks, and to improve the embedding capacity of watermarks while reducing the distortion of data.Experimental results demonstrate that the proposed algorithm achieves a high watermark embedding rate with low data distortion.It is resilient against multiple attacks, exhibiting excellent robustness and strong traceability.Compared to existing algorithms, it offers distinct advantages and holds great potential for broad application in the field of data security.…”
    Get full text
    Article
  7. 52087
  8. 52088
  9. 52089
  10. 52090
  11. 52091

    Autonomous security analysis and penetration testing model based on attack graph and deep Q-learning network by Cheng FAN, Guoqing HU, Taojie DING, Zhanhua ZHANG

    Published 2023-12-01
    “…With the continuous development and widespread application of network technology, network security issues have become increasingly prominent.Penetration testing has emerged as an important method for assessing and enhancing network security.However, traditional manual penetration testing methods suffer from inefficiency,human error, and tester skills, leading to high uncertainty and poor evaluation results.To address these challenges, an autonomous security analysis and penetration testing framework called ASAPT was proposed, based on attack graphs and deep Q-learning networks (DQN).The ASAPT framework was consisted of two main components:training data construction and model training.In the training data construction phase, attack graphs were utilized to model the threats in the target network by representing vulnerabilities and possible attacker attack paths as nodes and edges.By integrating the common vulnerability scoring system (CVSS) vulnerability database, a “state-action”transition matrix was constructed, which depicted the attacker’s behavior and transition probabilities in different states.This matrix comprehensively captured the attacker’s capabilities and network security status.To reduce computational complexity, a depth-first search (DFS) algorithm was innovatively applied to simplify the transition matrix, identifying and preserving all attack paths that lead to the final goal for subsequent model training.In the model training phase, a deep reinforcement learning algorithm based on DQN was employed to determine the optimal attack path during penetration testing.The algorithm interacted continuously with the environment, updating the Q-value function to progressively optimize the selection of attack paths.Simulation results demonstrate that ASAPT achieves an accuracy of 84% in identifying the optimal path and exhibits fast convergence speed.Compared to traditional Q-learning, ASAPT demonstrates superior adaptability in dealing with large-scale network environments, which could provide guidance for practical penetration testing.…”
    Get full text
    Article
  12. 52092
  13. 52093

    Sharp needle reconstructs peripheral outflow for patients with malfunctional arteriovenous fistula by Yong Xu, Shu-Yuan Zhu, Yuan-Ming Li, Xin-Xin Liu, Hao Zhang, Lu-Fang Wang

    Published 2024-12-01
    “…The immediate patency rate for the internal fistulas was 100%, with 3-month, 6-month, and 12-month patency rates at 91.3%, 78.3%, and 43.5%, respectively.Conclusion Sharp needle technology merged with PTA presents an effective and secure minimally invasive method for reconstructing the outflow tract, offering a new solution for recanalizing high-pressure or occluded fistulas.…”
    Get full text
    Article
  14. 52094

    Islam and survivals of pre-islamic beliefs in the Gol­den Horde on the materials of architectural funeral structures by Zilivinskaya E.D.

    Published 2023-12-01
    “…Results and scientific novelty: On the basis of building technology in the Golden Horde, two areas of architecture are distinguished – building from brick (fired and raw) and building from stone. …”
    Get full text
    Article
  15. 52095
  16. 52096

    Design, development, and performance study of a PWM based thermostat system for viscosity measurement by Md․Saidul Islam, Md․Sadequl Azam, Mahedi Hassan, Atish Bhathacharjee, Shahin Aziz

    Published 2025-03-01
    “…It comprises sensors and microcontroller-based technology to automatically regulate the temperature of bath liquid in a precise way. …”
    Get full text
    Article
  17. 52097
  18. 52098
  19. 52099

    Determining the Thermal Conductivity of Clay during the Freezing Process by Artificial Neural Network by Xiuling Ren, Yanhui You, Qihao Yu, Guike Zhang, Pan Yue, Mingyang Jin

    Published 2021-01-01
    “…By measuring the thermal conductivity of clay using a transient hot-wire method in the laboratory, the influential factors of the thermal conductivity of soils during the freezing process were analyzed, and a predictive model of thermal conductivity was developed with an artificial neural network (ANN) technology. The results show that the variation of thermal conductivity can be divided into three stages with decreasing temperature, positive temperature stage, transition stage, and negative temperature stage. …”
    Get full text
    Article
  20. 52100

    AI AS A CREATIVE PARTNER: HOW ARTIFICIAL INTELLIGENCE IMPACTS STUDENT CREATIVITY AND INNOVATION: CASE STUDY OF STUDENTS FROM LATVIA, UKRAINE AND SPAIN by Olga Verdenhofa, Remigijus Kinderis, Galina Berjozkina

    Published 2024-12-01
    “…This study explores students' perceptions of Artificial Intelligence (AI) in the educational process, focusing specifically on creativity and confidence. As AI technology becomes increasingly integrated into higher education, understanding its impact on students' creative development and their confidence in using AI tools is crucial for shaping effective educational practices. …”
    Get full text
    Article