دانلود و نمایش مقالات مرتبط با ORAC::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - ORAC

تعداد مقالات یافته شده: 49
ردیف عنوان نوع
1 DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage
DOPIV: برون سپاری داده مبتنی بر هویت امن پس از کوانتومی با تأیید صحت عمومی در فضای ذخیره سازی ابری-2022
Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A majority of existing public verification schemes are based on conventional hardness assumptions, which are vulnerable to adversaries equipped with quantum computers in the near future. Moreover, new security issues need to be solved when an original data owner is restricted or cannot access the remote cloud server flexibly. In this paper, we propose an efficient identity-based data outsourcing with public integrity verification scheme (DOPIV) in cloud storage. DOPIV is designed on lattice-based cryptography, which achieves post-quantum security. DOPIV enables an original data owner to delegate a proxy to generate the signatures of data and outsource them to the cloud server. Any TPA can perform data integrity verification efficiently on behalf of the original data owner, without retrieving the entire data set. Additionally, DOPIV possesses the advantages of being identity-based systems, avoiding complex certificate management procedures. We provide security proofs of DOPIV in the random oracle model, and conduct a comprehensive performance evaluation to show that DOPIV is more practical in post-quantum secure cloud storage systems.
Index Terms: Cloud storage | public verification | lattice-based cryptography | identity-based data outsourcing | post-quantum security
مقاله انگلیسی
2 Grover on KATAN: Quantum Resource Estimation
گروور در کاتان: برآورد منابع کوانتومی-2022
This article presents the cost analysis of mounting Grover’s key search attack on the family of KATAN block cipher. Several designs of the reversible quantum circuit of KATAN are proposed. Owing to the National Insitute of Standards and Technology’s (NIST) proposal for postquantum cryptography standardization, the circuits are designed focusing on minimizing the overall depth. We observe that the reversible quantum circuits designed using and gates and T-depth one Toffoli gate give more shallow circuits. Grover oracle for KATAN is designed based on the reversible circuits, which are used further to mount Grover’s key search attack on KATAN. The designs are implemented using the software framework ProjectQ, which provides a resource estimation tool to perform an appropriate cost analysis in an automated way. While estimating the resources, NIST’s depth restrictions are also respected.
INDEX TERMS: Grover’s algorithm | KATAN | postquantum cryptography (PQC) | ProjectQ implementation | quantum cryptanalysis.
مقاله انگلیسی
3 Quantum Algorithm for Fidelity Estimation
الگوریتم کوانتومی برای برآورد وفاداری-2022
For two unknown mixed quantum states ρ and σ in an N-dimensional Hilbert space, computing their fidelity F (ρ, σ) is a basic problem with many important applications in quantum computing and quantum information, for example verification and characterization of the outputs of a quantum computer, and design and analysis of quantum algorithms. In this paper, we propose a quantum algorithm that solves this problem in poly(log(N ), r, 1/ε) time, where r is the lower rank of ρ and σ, and ε is the desired precision, provided that the purifications of ρ and σ are prepared by quantum oracles. This algorithm exhibits an exponential speedup over the best known algorithm (based on quantum state tomography) which has time complexity polynomial in N.
keywords: Quantum computing | quantum algorithms | quantum fidelity | quantum states.
مقاله انگلیسی
4 Alternative Tower Field Construction for Quantum Implementation of the AES S-Box
ساخت میدان برج جایگزین برای اجرای کوانتومی AES S-Box-2022
Grover’s search algorithm allows a quantum adversary to find a k-bit secret key of a block cipher by making O(2k=2) block cipher queries. Resistance of a block cipher to such an attack is evaluated by quantum resources required to implement Grover’s oracle for the target cipher. The quantum resources are typically estimated by the T-depth of its circuit implementation and the number of qubits used by the circuit (width). Since the AES S-box is the only component which requires T-gates in a quantum implementation of AES, recent research has put its focus on efficient implementation of the AES S-box. However, any efficient implementation with low T-depth will not be practical in the real world without considering qubit consumption of the implementation. In this work, we propose three methods of trade-off between time and space for the quantum implementation of the AES S-box. In particular, one of our methods turns out to use the smallest number of qubits among the existing methods, significantly reducing its T-depth.
Index Terms: Quantum implementation | quantum cryptanalysis | Grover’s algorithm | AES | multiplicative inversion
مقاله انگلیسی
5 Provably secure biometric-based client–server secure communication over unreliable networks
ارتباطات امن مشتری و سرور مبتنی بر بیومتریک به طور قابل اطمینان در شبکه های غیرقابل اعتماد-2021
Due to rapid advancement in internet technologies, remote client access has become much more comfortable than in previous days. The responsibility of the system does not limit even after providing access to resources. In every system, there is a possibility that an adversary may use the resources of the system without prior authentication. This will create interruption, and the clients of the system will ultimately be affected, so the system must provide some authentication mechanism. Therefore, an authentication scheme needs to be introduced, which provides security against different attacks. Consequently, in this article, we propose a reliable and secure three factor authentication scheme that prevents various security attacks. The provable security of the proposed scheme is proved through a widely used random oracle model. We implemented the cryptographic operations of proposed and related schemes on a desktop system having good specifications to get the experimental results. Moreover, the presented scheme is compared with the existing schemes to compare its performance. The performance evaluation shows that our scheme is lightweight and efficient in terms of computation and communication costs as compared to related competing schemes.
Keywords: Anonymity | Authentication | Impersonation attack | Session key | Smartcard
مقاله انگلیسی
6 Analysis and enhancement of secure three-factor user authentication using Chebyshev Chaotic Map
تجزیه و تحلیل و افزایش احراز هویت کاربر سه عامل امن با استفاده از نقشه آشفته Chebyshev-2021
The most popular solution for a variety of business applications such as e-banking and e-healthcare is the multi-server environment. The user registration of individual servers is not the primary concern in such an environment. Here, the user can get various services from different servers by registering him/her under one server. To get secure services through this environment, the authenticity of users and servers are crucial. In this observation, the smart card based biometric authentication system is well popular and easy to use. This paper delineates that the security flaws can be found in a trusted authentication scheme proposed by Chatterjee et al. (2018). Besides, this work proposes an enhanced authentication scheme namely, asymmetric encryption based secure user authentication (ASESUA) to eliminate the drawbacks of Chatterjee et al.’s scheme. The formal security analysis of ASESUA has been done with the help of random oracle model and verified by the well popular AVISPA tool. The analysis shows that ASESUA performs better concerning security, communication cost, and computation cost than other related existing schemes.
Keywords: Attack | Authentication | Biometric | Smart card | Security
مقاله انگلیسی
7 Exploring smart construction objects as blockchain oracles in construction supply chain management
کاوش اشیا ساخت هوشمند به عنوان اوراکل بلاکچین در مدیریت زنجیره تأمین ساخت و ساز-2021
Blockchain technology has attracted the interest of the global construction industry for its potential to enhance the transparency, traceability, and immutability of construction data and enables collaboration and trust throughout the supply chain. However, such potential cannot be achieved without blockchain “oracles” needed to bridge the on-chain (i.e., blockchain system) and off-chain (i.e., real-life physical project) worlds. This study presents an innovative solution that exploits smart construction objects (SCOs). It develops a SCOs-enabled blockchain oracles (SCOs-BOs) framework. To instantiate this framework, the system architecture of a blockchain-enabled construction supply chain management (BCSCM) system is developed and validated using a case study, whereby four primary smart contracts are examined in the context of off-site logistics and on-site assembly services. The validation results show that accurate data is retrieved against malicious data in each request, and the corresponding reputation scores are successfully recorded. The innovativeness of the research lies in two aspects. In addition to mobilizing SCOs as blockchain oracles to bridge the on-chain and off-chain worlds, it develops a decentralized SCO network to avoid the single point of failure (SPoF) problem widely existing in blockchain systems. This study contributes to existing research and practice to harness the power of blockchain in construction.
Keywords: Blockchain | Oracles | Smart contract | Supply chain management | Smart construction objects | Prefabricated construction
مقاله انگلیسی
8 Learning to run a power network challenge for training topology controllers
یادگیری اجرای چالش شبکه برق برای آموزش کنترل کننده های توپولوژی-2020
For power grid operations, a large body of research focuses on using generation redispatching, load shedding or demand side management flexibilities. However, a less costly and potentially more flexible option would be grid topology reconfiguration, as already partially exploited by Coreso (European RSC) and RTE (French TSO) operations. Beyond previous work on branch switching, bus reconfigurations are a broader class of actions and could provide some substantial benefits to route electricity and optimize the grid capacity to keep it within safety margins. Because of its non-linear and combinatorial nature, no existing optimal power flow solver can yet tackle this problem. We here propose a new framework to learn topology controllers through imitation and reinforcement learning. We present the design and the results of the first “Learning to Run a Power Network” challenge released with this framework. We finally develop a method providing performance upper-bounds (oracle), which highlights remaining unsolved challenges and suggests future directions of improvement.
Keywords: Artificial intelligence | Control | Power flow | Reinforcement learning | Competition
مقاله انگلیسی
9 ECG AI-Guided Screening for Low Ejection Fraction (EAGLE): Rationale and design of a pragmatic cluster randomized trial
غربالگری هدایت شده با هوش مصنوعی ECG برای کسر کم دفع (EAGLE): منطق و طراحی یک آزمایش تصادفی خوشه عملی-2020
Background A deep learning algorithm to detect low ejection fraction (EF) using routine 12-lead electrocardiogram (ECG) has recently been developed and validated. The algorithm was incorporated into the electronic health record (EHR) to automatically screen for low EF, encouraging clinicians to obtain a confirmatory transthoracic echocardiogram (TTE) for previously undiagnosed patients, thereby facilitating early diagnosis and treatment. Objectives To prospectively evaluate a novel artificial intelligence (AI) screening tool for detecting low EF in primary care practices. Design The EAGLE trial is a pragmatic two-arm cluster randomized trial (NCT04000087) that will randomize N100 clinical teams (i.e., clusters) to either intervention (access to the new AI screening tool) or control (usual care) at 48 primary care practices across Minnesota and Wisconsin. The trial is expected to involve approximately 400 clinicians and 20,000 patients. The primary endpoint is newly discovered EF ≤50%. Eligible patients will include adults who undergo ECG for any reason and have not been previously diagnosed with low EF. Data will be pulled from the EHR, and no contact will be made with patients. A positive deviance qualitative study and a post-implementation survey will be conducted among select clinicians to identify facilitators and barriers to using the new screening report. Summary This trial will examine the effectiveness of the AI-enabled ECG for detection of asymptomatic low EF in routine primary care practices and will be among the first to prospectively evaluate the value of AI in real-world practice. Its findings will inform future implementation strategies for the translation of other AI-enabled algorithms. (Am Heart J 2020;219:31-6.)
مقاله انگلیسی
10 AI Chest 4 All
AI Chest 4 All-2020
AIChest4All is the name of the model used to label and screening diseases in our area of focus, Thailand, including heart disease, lung cancer, and tuberculosis. This is aimed to aid radiologist in Thailand especially in rural areas, where there is immense staff shortages. Deep learning is used in our methodology to classify the chest X-ray images from datasets namely, NIH set, which is separated into 14 observations, and the Montgomery and Shenzhen set, which contains chest X-ray images of patients with tuberculosis, further supplemented by the dataset from Udonthani Cancer hospital and the National Chest Institute of Thailand. The images are classified into six categories: no finding, suspected active tuberculosis, suspected lung malignancy, abnormal heart and great vessels, Intrathoracic abnormal findings, and Extrathroacic abnormal findings. A total of 201,527 images were used. Results from testing showed that the accuracy values of the categories heart disease, lung cancer, and tuberculosis were 94.11%, 93.28%, and 92.32%, respectively with sensitivity values of 90.07%, 81.02%, and 82.33%, respectively and the specificity values were 94.65%, 94.04%, and 93.54%, respectively. In conclusion, the results acquired have sufficient accuracy, sensitivity, and specificity values to be used. Currently, AIChest4All is being used to help several of Thailand’s government funded hospitals, free of charge.
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 401 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 401 :::::::: افراد آنلاین: 60