Search
Search Results
-
Optimal quantum key distribution networks: capacitance versus security
The rate and security of quantum communications between users placed at arbitrary points of a quantum communication network depend on the structure...
-
Face recognition approach for smart Internet of Things in home security system
The primary issue in today's environment is home security. The conventional home security techniques are incredibly easy to breach and encourage...
-
Advanced biometric system security: a novel hybrid approach integrating optical asymmetric PTFT and symmetric cipher techniques
The rapidly evolving field of biometric recognition and verification technologies has seen substantial progress recently. However, the storage of...
-
AI-enhanced security demand and routing management for MANETs with optical technologies
The proliferation of Mobile Ad hoc Networks (MANETs), where nodes connect with one another to offer the required real-time entertainment services, is...
-
Elastic optical network routing analysis using intelligent machine learning architecture with security analysis
Allocating and routing resources in optical networks is an extremely important operation since it has a direct bearing on the efficiency and...
-
Cryptographic enhancement of image data security through quantum-classical hybrid encryption with parameterized pixel ratios
To enhance the security of image data, this paper proposes a quantum-classical hybrid image encryption scheme based on parameterized pixel ratios....
-
Radio optical network security analysis with routing in quantum computing for 5G wireless communication using blockchain machine learning model
Rapid growth is also being seen in the deployment of optical network equipment and the development of new network services for next-generation...
-
Commissioning Tests of Tokamak JT-60SA (Chronicle)
AbstractThe authors of our journal repeatedly expressed concern about the large number of accidents (electrical breakdowns) occurring at electrical,...
-
Quantum communication based cyber security analysis using artificial intelligence with IoMT
Connected electronic devices used in healthcare, such as small sensors and actuators and other cyber-physical devices, make up what is known as the...
-
Toward Formalization of Software Security Issues
AbstractCVE, CWE, and CAPEC databases and their relationships are shortly introduced. Focus on this paper is on formalization and more specific on...
-
Utilizing hybrid computing models for network monitoring and security analysis through optical network modeling and data analytics
Safe and reliable data transport over optical networks is essential for a high-speed Internet. Optical fibres are the backbone of the Internet,...
-
Resource allocation with fuzzy logic based network optimization and security analysis in optical communication network
Modern optical transport networks are extremely complicated systems that make managing and distributing management information accurate and...
-
Design and evaluation of novel hybrid quantum resistant cryptographic system for enhancing security in wireless body sensor networks
Data and information secrecy during storage or transmission has been preserved through the use of cryptography. Consequently, cryptography studies...
-
Optical network modelling-based data analytics for network monitoring and security analysis using hybrid computing models
With the ever-increasing complexity and scale of optical networks, efficient network monitoring and robust security analysis have become paramount....
-
Security analysis of a chaotic encryption algorithm related to the sum of plaintext pixel value
The security analysis of the existing chaotic image encryption algorithm is mainly for the algorithm whose secret keys are independent of plaintext,...
-
Characterization of Laminated Composite Materials by Mechanical and Ultrasonic Tests
AbstractComposite materials are used in various domains of the industry and research . In the way of exploring new resins that could be used in the...
-
Practical quantum tokens without quantum memories and experimental tests
Unforgeable quantum money tokens were the first invention of quantum information science, but remain technologically challenging as they require...
-
High-rate tests on resistive plate chambers operated with eco-friendly gas mixtures
Results obtained by the RPC ECOgas@GIF++ Collaboration, using Resistive Plate Chambers operated with new, eco-friendly gas mixtures, based on...
-
Security Modeling and Simulation
Modeling and simulation (M&S) represent the structure and behavior of a system with a focus on what the system is and does to provide value-delivery.... -
Security Modeling and Simulation
Modeling and simulation (M&S) represent the structure and behavior of a system with a focus on what the system is and does to provide value-delivery....