Agriculture is crucial to the global economy, particularly in ensuring food security. Recent trends indicate that various plant diseases are causing substantial financial losses in the agricultural sector worldwide. T...
详细信息
The key objective of intrusion detection systems(IDS)is to protect the particular host or network by investigating and predicting the network traffic as an attack or *** IDS uses many methods of machine learning(ML)to...
详细信息
The key objective of intrusion detection systems(IDS)is to protect the particular host or network by investigating and predicting the network traffic as an attack or *** IDS uses many methods of machine learning(ML)to learn from pastexperience attack *** based and identify the new *** though these methods are effective,but they have to suffer from large computational costs due to considering all the traffic features,***,emerging technologies like the Internet of Things(Io T),big data,*** getting advanced day by day;as a result,network traffics are also increasing ***,the issue of computational cost needs to be addressed ***,in this research,firstly,the ML methods have been used with the feature selection technique(FST)to reduce the number of features by picking out only the important ones from NSL-KDD,CICIDS2017,and CIC-DDo S2019datasets later that helped to build IDSs with lower cost but with the higher performance which would be appropriate for vast scale *** experimental result demonstrated that the proposed model *** tree(DT)with Recursive feature elimination(RFE)performs better than other classifiers with RFE in terms of accuracy,specificity,precision,sensitivity,F1-score,and G-means on the investigated datasets.
Removing noise in the real-world scenario has been a daunting task in the field of natural language processing. Research has shown that Deep Neural Networks (DNN) have proven to be very useful in terms of noise genera...
详细信息
Device-to-Device (D2D) relaying helps improve the coverage range and throughput of the millimeter Wave (mmWave) networks. This work focuses on improving the uplink throughput in a single-cell mmWave-based Internet-of-...
详细信息
This article proposes a novel idea for creating a sentiment-based stock market index forecasting model by amalgamating price and sentiment data hidden in the price pattern itself. The state-of-the-art methodologies us...
详细信息
As internet use in communication networks has grown, fake news has become a big problem. The misleading heading of the news loses the trust of the reader. Many techniques have emerged, but they fail because fraudsters...
详细信息
Detecting and promptly identifying cracks on road surfaces is of paramount importance for preserving infrastructure integrity and ensuring the safety of road users, including both drivers and pedestrians. Presently, t...
详细信息
With the popularity of the Internet of Vehicles(IoV), a large amount of data is being generated every day. How to securely share data between the IoV operator and various value-added service providers becomes one of t...
详细信息
With the popularity of the Internet of Vehicles(IoV), a large amount of data is being generated every day. How to securely share data between the IoV operator and various value-added service providers becomes one of the critical issues. Due to its flexible and efficient fine-grained access control feature, Ciphertext-Policy Attribute-Based Encryption(CP-ABE) is suitable for data sharing in IoV. However, there are many flaws in most existing CP-ABE schemes, such as attribute privacy leakage and key misuse. This paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP). A partially hidden access structure is adopted to hide sensitive user attribute values, and attribute categories are sent along with the ciphertext to effectively avoid privacy exposure. In addition, key tracking and malicious user revocation are introduced with broadcast encryption to prevent key misuse. Since the main computation task is outsourced to the cloud, the burden of the user side is relatively low. Analysis of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV.
In 2018, there were 1 million occurrences of non-melanoma cancer and 288,000 occurrences of malignant skin cancer (MM) recorded worldwide. Given the aging of the population and limited resources for medical care, a co...
详细信息
In the era of advancement in technology and modern agriculture, early disease detection of potato leaves will improve crop yield. Various researchers have focussed on disease due to different types of microbial infect...
详细信息
暂无评论