Zobrazeno 1 - 10
of 1 030
pro vyhledávání: '"Checksum"'
Autor:
Ammar Osamah Hoori
Publikováno v:
Journal of Engineering, Vol 19, Iss 08 (2023)
In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error
Externí odkaz:
https://doaj.org/article/cec5a87d38594e2091edd1372c675784
Autor:
Ping Zhang
Publikováno v:
Mathematics, Vol 12, Iss 7, p 1011 (2024)
COPA, introduced by Andreeva et al., is the first online authenticated encryption (AE) mode with nonce-misuse resistance, and it is covered in COLM, which is one of the final CAESAR portfolios. However, COPA has been proven to be insecure in the rele
Externí odkaz:
https://doaj.org/article/bec041de54544382946054b5d145ff2a
Publikováno v:
IEEE Access, Vol 10, Pp 23931-23947 (2022)
In this paper, we propose a new approach to perform multiple error correction in wireless communications over error-prone networks. It is based on the cyclic redundancy check syndrome, using an optimized lookup table that avoids performing arithmetic
Externí odkaz:
https://doaj.org/article/f6bdae32937840b9b3eb97d18ca1cc6f
Autor:
Kolev, Orlin
Publikováno v:
Индустриални отношения и обществено развитие / Industrial Relations and Public Development. (4):1-8
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=1003077
Publikováno v:
IEEE Access, Vol 9, Pp 66707-66722 (2021)
The relational database has become one of the mainstream tools for data storage and management. However, there are two main types of threats to relational databases: external attacks and internal tampering threats. In this paper, we focus on the inte
Externí odkaz:
https://doaj.org/article/2a27b5695800452fbd043170acfe439d
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:2546-2558
The ability of Convolutional Neural Networks (CNNs) to accurately process real-time telemetry has boosted their use in safety-critical and high-performance computing systems. As such systems require high levels of resilience to errors, CNNs must exec
Publikováno v:
Статистика и экономика, Vol 0, Iss 3, Pp 180-183 (2016)
The article deals with methods of information hiding at the level of file system. Advantages and disadvantages of existing methods are given. The new method of information hiding with the use of specific file system is offered. Comparative results of
Externí odkaz:
https://doaj.org/article/fce5651d951449e0a548fb85babe9e89
Publikováno v:
Materials Today: Proceedings. 60:1329-1333
A distributed computing platform is preferred to meet out the current challenges of cloud computing paradigm. Hadoop manages distribution of large volume of big data and data is stored using cluster analysis of data. Hadoop Distributed File System (H