电脑和通信(英文)最新文献

筛选
英文 中文
Implementation of a Hybrid Triple-Data Encryption Standard and Blowfish Algorithms for Enhancing Image Security in Cloud Environment 云环境下增强图像安全的混合三数据加密标准和河豚算法的实现
电脑和通信(英文) Pub Date : 2023-01-01 DOI: 10.4236/jcc.2023.1110009
Mohan Nagamunthala, Ramakrishnan Manjula
{"title":"Implementation of a Hybrid Triple-Data Encryption Standard and Blowfish Algorithms for Enhancing Image Security in Cloud Environment","authors":"Mohan Nagamunthala, Ramakrishnan Manjula","doi":"10.4236/jcc.2023.1110009","DOIUrl":"https://doi.org/10.4236/jcc.2023.1110009","url":null,"abstract":"In recent years, technological advancements have provided the world with cloud computing which can transfer, store, and process huge data chunks in the form of video, audio, images, and text efficiently. In spite of the universal hype on the subject across the information technology world, protecting sensitive data stored in the cloud server is one of the crucial problems. The large volume and sophistication of cyberattacks conclude to the fact that private pictures need exceptional care than other forms of data on the cloud. Since the user who has stored their private pictures in the cloud has no control over the privacy protection of data, the cloud vendors have to assure a greater level of security in terms of authentication and prevention from cyberattacks. Image encryption algorithms secure visual data by transmuting pictures into an unintelligible form to preserve the confidentiality of pictures over reliable unrestricted social media. This work aims to develop a method for enhancing the security of user photographs on a cloud platform by means of cryptography algorithms. The proposed hybrid technique presents the idea of protecting images in two straightforward steps. First, we generate a chipper text (i.e., secret key) using Triple Data Encryption Standard (TDES) by giving a plaintext and a key as input. Then, the cipher text obtained from TDES is given to the Blowfish algorithm for encrypting the user images. The encrypted image is then uploaded to the database of the cloud server and can be retrieved whenever the user requests it. Both image encryption and decryption processes are analyzed and evaluated based on performance metrics such as cloud storage time, encryption time, decryption time, and encryption throughput. A comparative study with conventional image encryption methods will demonstrate the effectiveness and robustness of our proposed method.","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135319074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Resilience Models of Health Systems before COVID-19 Pandemic in Côte d’Ivoire 在COVID-19大流行之前改进科特迪瓦卫生系统的复原力模型
电脑和通信(英文) Pub Date : 2023-01-01 DOI: 10.4236/jcc.2023.112001
G. B. N’guessan, Ida Brou Assie, Jean S. Inkpé Haudie
{"title":"Improving Resilience Models of Health Systems before COVID-19 Pandemic in Côte d’Ivoire","authors":"G. B. N’guessan, Ida Brou Assie, Jean S. Inkpé Haudie","doi":"10.4236/jcc.2023.112001","DOIUrl":"https://doi.org/10.4236/jcc.2023.112001","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70935097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Creating Bengali Freebase Using Wikidata 使用维基数据创建孟加拉语Freebase
电脑和通信(英文) Pub Date : 2023-01-01 DOI: 10.4236/jcc.2023.115011
Rukaiya Habib, M. Ferdous, M. Anwar
{"title":"Creating Bengali Freebase Using Wikidata","authors":"Rukaiya Habib, M. Ferdous, M. Anwar","doi":"10.4236/jcc.2023.115011","DOIUrl":"https://doi.org/10.4236/jcc.2023.115011","url":null,"abstract":"Freebase is a large collaborative knowledge base and database of general, structured information for public use. Its structured data had been harvested from many sources, including individual, user-submitted wiki contributions. Its aim is to create a global resource so that people (and machines) can access common information more effectively which is mostly available in English. In this research work, we have tried to build the technique of creating the Free-base for Bengali language. Today the number of Bengali articles on the internet is growing day by day. So it has become a necessary to have a structured data store in Bengali. It consists of different types of concepts (topics) and relationships between those topics. These include different types of areas like popular culture (e.g. films, music, books, sports, television), location information (restaurants, geolocations, businesses), scholarly information (linguistics, biology, astronomy), birth place of (poets, politicians, actor, actress) and general knowledge (Wikipedia). It will be much more helpful for relation extraction or any kind of Natural Language Processing (NLP) works on Ben-gali language. In this work, we identified the technique of creating the Bengali Freebase and made a collection of Bengali data. We applied SPARQL query language to extract information from natural language (Bengali) documents such as Wikidata which is typically in RDF (Resource Description Format) triple format.","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70936853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Indoor Security Robot based on Robot Operating System 基于机器人操作系统的室内安防机器人设计
电脑和通信(英文) Pub Date : 2023-01-01 DOI: 10.4236/jcc.2023.115008
Faxu He, Liye Zhang
{"title":"Design of Indoor Security Robot based on Robot Operating System","authors":"Faxu He, Liye Zhang","doi":"10.4236/jcc.2023.115008","DOIUrl":"https://doi.org/10.4236/jcc.2023.115008","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70936946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
End-to-End Auto-Encoder System for Deep Residual Shrinkage Network for AWGN Channels AWGN信道深度残余收缩网络端到端自动编码器系统
电脑和通信(英文) Pub Date : 2023-01-01 DOI: 10.4236/jcc.2023.115012
Wenhao Zhao, Shengbo Hu
{"title":"End-to-End Auto-Encoder System for Deep Residual Shrinkage Network for AWGN Channels","authors":"Wenhao Zhao, Shengbo Hu","doi":"10.4236/jcc.2023.115012","DOIUrl":"https://doi.org/10.4236/jcc.2023.115012","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70936971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Neural Network-Based Performance Index Model for Enterprise Goals Simulation and Forecasting 基于神经网络的企业目标仿真与预测绩效指标模型
电脑和通信(英文) Pub Date : 2023-01-01 DOI: 10.4236/jcc.2023.118001
J. Essien, Martin Ogharandukun
{"title":"Neural Network-Based Performance Index Model for Enterprise Goals Simulation and Forecasting","authors":"J. Essien, Martin Ogharandukun","doi":"10.4236/jcc.2023.118001","DOIUrl":"https://doi.org/10.4236/jcc.2023.118001","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"695 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70939086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning-based emotion detection 基于深度学习的情绪检测
电脑和通信(英文) Pub Date : 2022-01-29 DOI: 10.36227/techrxiv.18866159
Yuwei Chen, Jia-Zhou He
{"title":"Deep learning-based emotion detection","authors":"Yuwei Chen, Jia-Zhou He","doi":"10.36227/techrxiv.18866159","DOIUrl":"https://doi.org/10.36227/techrxiv.18866159","url":null,"abstract":"Since the deep learning methods used in current face recognition do not balance well between recognition rate and recognition speed, the present work proposed a face expression recognition model based on multilayer feature fusion with lightweight convolutional networks. The model is tested on two commonly used real expression datasets, FER- 2013 and AffectNet, the accuracy of ms_model_M is 74.35% and 56.67%, respectively, and the accuracy of the traditional MovbliNet model is 74.11% and 56.48% in the tests of these two datasets.","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43902539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Improved Genetic Algorithm for UWB Localization 一种改进的超宽带定位遗传算法
电脑和通信(英文) Pub Date : 2022-01-01 DOI: 10.4236/jcc.2022.1010001
Xianzhi Zheng
{"title":"An Improved Genetic Algorithm for UWB Localization","authors":"Xianzhi Zheng","doi":"10.4236/jcc.2022.1010001","DOIUrl":"https://doi.org/10.4236/jcc.2022.1010001","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70930211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Task-Specific Feature Selection and Detection Algorithms for IoT-Based Networks 基于物联网网络的任务特征选择和检测算法
电脑和通信(英文) Pub Date : 2022-01-01 DOI: 10.4236/jcc.2022.1010005
Yang G. Kim, Benito Mendoza, Ohbong Kwon, John Yoon
{"title":"Task-Specific Feature Selection and Detection Algorithms for IoT-Based Networks","authors":"Yang G. Kim, Benito Mendoza, Ohbong Kwon, John Yoon","doi":"10.4236/jcc.2022.1010005","DOIUrl":"https://doi.org/10.4236/jcc.2022.1010005","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70930522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Preventing Phishing Attack on Voting System Using Visual Cryptography 利用视觉密码防止投票系统的网络钓鱼攻击
电脑和通信(英文) Pub Date : 2022-01-01 DOI: 10.4236/jcc.2022.1010010
Ahood Alotaibi, Lama Alhubaidi, Alghala Alyami, Leena A. Marghalani, Bashayer Alharbi, Naya Nagy
{"title":"Preventing Phishing Attack on Voting System Using Visual Cryptography","authors":"Ahood Alotaibi, Lama Alhubaidi, Alghala Alyami, Leena A. Marghalani, Bashayer Alharbi, Naya Nagy","doi":"10.4236/jcc.2022.1010010","DOIUrl":"https://doi.org/10.4236/jcc.2022.1010010","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70930526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信