The proceedings contain 146 papers. The topics discussed include: trajectory tracking controller design for percutaneous interventional procedures;Bregman divergence based approach for adaptive system identification a...
ISBN:
(纸本)9798350349207
The proceedings contain 146 papers. The topics discussed include: trajectory tracking controller design for percutaneous interventional procedures;Bregman divergence based approach for adaptive system identification and line enhancement;real-time hardware-in-loop testbed for power system analysis;regularized hybrid deep learning for DDoS attack prediction in software defined internet of Things (SD-IoT);investigation of core loss in electric vehicle induction motor using finite element analysis for performance enhancement;fault-tolerant strategy for asymmetrical half-bridge converter in switched reluctance motor drives;protection coordination impact on reliability of distribution systems with distributed energy resources;and design and control of shunt active power filter for power quality improvements with PV array.
Traditional decision support systems (DSS) show obvious limitations in dealing with increasingly complex and dynamic decision-making scenarios. By integrating graph neural networks (GNNs) and expert systems (ESs), thi...
详细信息
Recent growth in internet infrastructure has increased demands for internettechnology and so there is a need for a secure decentralized system that is combined with secure and transparent infrastructure. Blockchain t...
详细信息
The availability of online resource is seriously threatened by the fatal DDoS (distributed Denial of Service) attacks, which can earnestly break up a targeted network or website by flooding it with traffic. DDoS attac...
详细信息
Aiming at the problem that monitoring data in cross-domain tests face a large amount of data and cross categories, we establish a test monitoring data classification system, study the distributed adaptive data classif...
详细信息
The Open structure for allotted and Cooperative Media Algorithms (OADCMA) is an open-deliver framework imparting a plug-in platform that lets customers, without problem, develop distributed and cooperative media algor...
详细信息
As a result of the proliferation of internet-connected smart devices brought about by the explosive growth of the internet of Everything (IoE), lower bandwidth load, slower response, bad security, and poor privacy are...
详细信息
This study is committed to solving the problem of high computational volume in the internet of Things environment of most current searchable encryption schemes, and proposes a lightweight attribute-based searchable en...
详细信息
ISBN:
(纸本)9798400718212
This study is committed to solving the problem of high computational volume in the internet of Things environment of most current searchable encryption schemes, and proposes a lightweight attribute-based searchable encryption scheme. Firstly, by dividing the encryption stage into online and offline parts, the ciphertext can be generated only by performing limited calculations in the online stage. Secondly, outsourcing the decryption computing to the edge server significantly reduces the computing and storage burden of IoT terminal devices and improves the overall performance of the system. At the same time, multi-keyword query is introduced to improve the efficiency of ciphertext retrieval while ensuring data security and privacy. Simulation experiments verify the lightness and feasibility of the proposed scheme, which provides an effective solution for achieving efficient and secure searchable encryption in the internet of Things environment.
Patient care is now more accurate and efficient, thanks to the quick development of internet of Medical Things(IoMT) technology, which has made it possible to seamlessly integrate wearables, sensors, medical equipment...
详细信息
The internet of Things (IoT) connects numerous intelligent devices providing security features that interact with default settings accessed through applications. Additionally, Deep Learning (DL)-based mechanisms was i...
详细信息
暂无评论