stored information
Recently Published Documents


TOTAL DOCUMENTS

247
(FIVE YEARS 75)

H-INDEX

22
(FIVE YEARS 3)

2022 ◽  
Author(s):  
zhu rongrong

Abstract Through the neural system damage and repair process of human brain, we can construct the complex deep learning and training of the repair process such as the damage of brain like high-dimensional flexible neural network system or the local loss of data, so as to prevent the dimensional disaster caused by the local loss of high-dimensional data. How to recover and extract feature information when the damaged neural system (flexible neural network) has amnesia or local loss of stored information. Information extraction generally exists in the distribution table of the generation sequence of the key group of the higher dimension or the lower dimension to find the core data stored in the brain. The generation sequence of key group exists in a hidden time tangent cluster. Brain like slice data processing runs on different levels, different dimensions, different tangent clusters and cotangent clusters. The key group in the brain can be regarded as the distribution table of memory fragments. Memory parsing has mirror reflection and is accompanied by the loss of local random data. In the compact compressed time tangent cluster, it freely switches to the high-dimensional information field, and the parsed key is buried in the information.


2021 ◽  
Author(s):  
zhu rongrong

Abstract Through the neural system damage and repair process of human brain, we can construct the complex deep learning and training of the repair process such as the damage of brain like high-dimensional flexible neural network system or the local loss of data, so as to prevent the dimensional disaster caused by the local loss of high-dimensional data. How to recover and extract feature information when the damaged neural system (flexible neural network) has amnesia or local loss of stored information. Information extraction generally exists in the distribution table of the generation sequence of the key group of the higher dimension or the lower dimension to find the core data stored in the brain. The generation sequence of key group exists in a hidden time tangent cluster. Brain like slice data processing runs on different levels, different dimensions, different tangent clusters and cotangent clusters. The key group in the brain can be regarded as the distribution table of memory fragments. Memory parsing has mirror reflection and is accompanied by the loss of local random data. In the compact compressed time tangent cluster, it freely switches to the high-dimensional information field, and the parsed key is buried in the information.


2021 ◽  
pp. 44-46
Author(s):  
Linda Christabel. S ◽  
Merrylda Claribel. S ◽  
Sushmitha. M ◽  
Mohammed Haroon. A. L ◽  
Karpagam. S ◽  
...  

In this modern era equipped with technologies, the crime rates are increasing exponentially. This requires newer methodologies to identify a person who is a victim as well as the perpetruator. Automated biometric systems helps in identifying the individuals by the stored information in the database which are unique for each individual. Some of the important methods are ngerprint biometrics and iris scanning.As these methods involves soft tissues they cant be relied upon during mass disasters like burn accidents and gas leakage accidents. Hence, a biometric system using the hard tissue is required for better identication of the individuals. Thus, Ameloglyphics is introduced to aid in identication of individuals died during mass disasters and it plays a vital role in forensic odontology. This review highlights this technology in detail.


2021 ◽  
Author(s):  
zhu rongrong

Abstract Through the neural system damage and repair process of human brain, we can construct the complex deep learning and training of the repair process such as the damage of brain like high-dimensional flexible neural network system or the local loss of data, so as to prevent the dimensional disaster caused by the local loss of high-dimensional data. How to recover and extract feature information when the damaged neural system (flexible neural network) has amnesia or local loss of stored information. Information extraction generally exists in the distribution table of the generation sequence of the key group of the higher dimension or the lower dimension to find the core data stored in the brain. The generation sequence of key group exists in a hidden time tangent cluster. Brain like slice data processing runs on different levels, different dimensions, different tangent clusters and cotangent clusters. The key group in the brain can be regarded as the distribution table of memory fragments. Memory parsing has mirror reflection and is accompanied by the loss of local random data. In the compact compressed time tangent cluster, it freely switches to the high-dimensional information field, and the parsed key is buried in the information.


2021 ◽  
Author(s):  
Vibhanshu Pant ◽  
Deepak Sharma ◽  
Annapurani. K ◽  
R. Sundar

Keeping up the attendance record with everyday exercises is a difficult task. The conventional method of marking staff attendance is by tapping their ID card and then using fingerprint scanner. But due to COVID-19 pandemic the attendance system of using fingerprint scanner is stalled and currently not in use. The following system depends on face recognition and intranet connectivity to keep up attendance record of facilities and staff. The paper discusses the attendance marking system that is passive (no direct contact with the scanner or sensor) and restricting the users within certain network. The main goal of this system is divided in two steps, in initial step face is snare from the front camera of the smart phone and it is then recognized in the picture and in the second step these distinguished appearances and features are contrasted with stored information in data set for confirmation.


2021 ◽  
Vol 9 (11) ◽  
pp. 314-317
Author(s):  
V. V. Vetrov

The article deals with the issue of confidentiality of citizens’ digital data and the security of their storage on the platform of a citizen’s Digital Profile. Due to the scale of this system, as well as the value of the stored information, there is a high risk of leakage or illegal receipt of confidential data that could be of commercial value to many entities, which is why this issue is relevant. 


Author(s):  
M. Shaheda Begum

Abstract: Motivated by the exponential growth and the huge success of cloud data services bring the cloud common place for data to be not only stored in the cloud, but also shared across multiple users. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. Unfortunately, the integrity of cloud data is subject to skepticism due to the existence of hardware/software failures and human errors. Several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. However, public auditing on the integrity of shared data with these existing mechanisms will inevitably reveal confidential information—identity privacy—to public verifiers. In this paper, we propose a novel privacy-preserving mechanism that supports public auditing on shared data stored in the cloud. In particular, we exploit ring signatures to compute verification metadata needed to audit the correctness of shared data. With our mechanism, the identity of the signer on each block in shared data is kept private from public verifiers, who are able to efficiently verify shared data integrity without retrieving the entire file. In addition, our mechanism is able to perform multiple auditing tasks simultaneously instead of verifying them one by one. Our experimental results demonstrate the effectiveness and efficiency of our mechanism when auditing shared data integrity. Keywords: Public auditing, privacy-preserving, shared data, cloud computing


Atmosphere ◽  
2021 ◽  
Vol 12 (11) ◽  
pp. 1525
Author(s):  
Abdullah Ayub Khan ◽  
Zaffar Ahmed Shaikh ◽  
Asif Ali Laghari ◽  
Sami Bourouis ◽  
Asif Ali Wagan ◽  
...  

In this paper, we propose a secure blockchain-aware framework for distributed data management and monitoring. Indeed, images-based data are captured through drones and transmitted to the fog nodes. The main objective here is to enable process and schedule, to investigate individual captured entity (records) and to analyze changes in the blockchain storage with a secure hash-encrypted (SH-256) consortium peer-to-peer (P2P) network. The proposed blockchain mechanism is also investigated for analyzing the fog-cloud-based stored information, which is referred to as smart contracts. These contracts are designed and deployed to automate the overall distributed monitoring system. They include the registration of UAVs (drones), the day-to-day dynamic captured drone-based images, and the update transactions in the immutable storage for future investigations. The simulation results show the merit of our framework. Indeed, through extensive experiments, the developed system provides good performances regarding monitoring and management tasks.


2021 ◽  
Author(s):  
Moritz Winter ◽  
Francisco J. T. Goncalves ◽  
Ivan Soldatov ◽  
Yangkun He ◽  
Belén Zéuniga Céspedes ◽  
...  

Abstract Skyrmionics materials hold the potential for future information technologies, such as racetrack memories. Key to that advancement are skyrmionics systems that exhibit high tunability and scalability, with stored information being easy to read and write by means of all-electrical techniques. Topological magnetic excitations, such as skyrmions and antiskyrmions give rise to a characteristic topological Hall effect (THE) in electrical transport. However, an unambiguous transport signature of antiskyrmions, in both thin films and bulk samples has been challenging to date. Here we apply magnetosensitive microscopy combined with electrical transport to directly detect the emergence of antiskyrmions in crystalline microstructures of Mn1.4PtSn at room temperature. We reveal the THE of antiskyrmions and demonstrate its tunability by means of finite sizes, field orientation, and temperature. Our atomistic simulations and experimental anisotropy studies demonstrate the link between antiskyrmions and a complex magnetism that consists of competing ferro- and antiferromagnetic as well as chiral exchange interactions.


2021 ◽  
Vol 10 (5) ◽  
pp. 17-36
Author(s):  
Paulo A. Salgado ◽  
T-P Azevedo Perdicoulis

In this work, the subtractive mountain clustering algorithm has been adapted to the problem of natural languages processing in view to construct a chatbot that answers questions posed by the user. The implemented algorithm version allosws for the association of a set of words into clusters. After finding the centre of every cluster — the most relevant word, all the others are aggregated according to a defined metric adapted to the language processing realm. All the relevant stored information (necessary to answer the questions) is processed, as well as the questions, by the algorithm. The correct processing of the text enables the chatbot to produce answers that relate to the posed queries. Since we have in view a chatbot to help elder people with medication, to validate the method, we use the package insert of a drug as the available information and formulate associated questions. Errors in medication intake among elderly people are very common. One of the main causes for this is their loss of ability to retain information. The high amount of medicine intake required by the advanced age is another limiting factor. Thence, the design of an interactive aid system, preferably using natural language, to help the older population with medication is in demand. A chatbot based on a subtractive cluster algorithm is the chosen solution.


Sign in / Sign up

Export Citation Format

Share Document