The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in *** has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organiza...
详细信息
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in *** has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and *** widespread usage of informationtechnology(IT)and IT Enable Services(ITES)reinforces *** constantly evolving cyber threats are a topic that is generating a lot of *** this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the *** existing legislative framework and measures in the KSA are geared toward deterring criminal activity *** competency models have been devised to address the necessary cybercrime competencies in this *** research specialists in this domain can benefit more by developing a master competency level for achieving optimum *** address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(***),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security *** similarities and differences between the three methods are also *** cybersecurity analysis determined that the National Cyber Security Centre got the highest *** study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for ***,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.
Biometric authentication systems have gained significant popularity in recent years due to their high level of security and convenience. Cancelable biometrics is a promising area of research that addresses the privacy...
详细信息
Biometric authentication systems have gained significant popularity in recent years due to their high level of security and convenience. Cancelable biometrics is a promising area of research that addresses the privacy and security concerns associated with traditional biometric systems. By transforming the biometric data in a non-invertible manner, cancelable biometrics offer enhanced privacy protection, increased security, and the flexibility to revoke or update biometric templates. As research in this field continues to advance, cancelable biometrics has the potential to revolutionize the way biometric systems are implemented and utilized. Ten years ago, there is a dire need to develop new cancelable biometric systems depending on cryptography or steganography system which may merging the two previous techniques to hide secret information within a cover medium. It involves encrypting the message and then embedding it into an innocent-looking file, such as an image or audio file. The goal is to make the hidden message undetectable to anyone who is not the intended recipient. This method ensures that even if the cover medium is intercepted, the secret information remains secure. Crypto-steganography is a powerful tool for covert communication and has applications in various fields, including intelligence agencies, cyber-security, and digital multimedia applications. In a classical cryptography system, users can easily change their password if they are compromised. However, user's biometrics is limited and unique, and if they are compromised, it will be impossible to change them as it in cryptography system. So, the basic concept of cancelable biometrics is to use another version of the original biometric template created through a one-way transform or a crypto-steganography scheme to keep the original biometrics safe and away from utilization in the system. Cancelable biometrics depends on the transformation of data so that users can replace their single biometric te
Text mining, a subfield of natural language processing (NLP), has received considerable attention in recent years due to its ability to extract valuable insights from large volumes of unstructured textual data. This r...
详细信息
Wireless systems enable people in last decades to communicate and access applications and information without wires, which provided better image, audio and video transmitting with progressive needing for information s...
详细信息
Wireless systems enable people in last decades to communicate and access applications and information without wires, which provided better image, audio and video transmitting with progressive needing for information security research. In a digital world, Cryptography and steganography are both intended to protect information from unwanted hackers. Both are excellent suggestion which are applied within different multiple layers of data security. Steganography is the type of security which used to hide the user data into a cover medium while observing the least possible statistical detectability. Cryptography is a schedule in which the data is decoded into encrypted form and distributes them, so both are used to assure security and privacy. But each of them needs to satisfy added properties such as robustness, un-detectability and capacity etc. The proposed approach depends on multi-audios, multi-encryption algorithms, and only one steganography algorithm, where users can access encrypted audios with an encryption key and decrypts them with a decryption key, while in steganography, secret messages are hidden in cover media with no change of audios structure. It is very beneficial for sending the information secretly from one point to another without letting anyone understand that the other or critical audio document has been sent. In this paper, a novel hybrid audio crypto-steganography algorithm is based on the merging cryptography with steganography to have crypto-steganography algorithm which used to overcome each other’s drawbacks and work hard to resist attacks or stealers. Also the system may gain more security of crypto-steganography when it applied over many layers of audio data and many layers of encryption algorithms to be transmitted after that over Orthogonal Frequency Division Multiplexing (OFDM) system which is considered in this paper as a Worldwide Interoperability for Microwave Access (WIMAX) system based on Fast Fourier Transform OFDM (FFT-OFDM), Dis
People transmit millions of digital images daily over various networks, where securing these images is a big challenge. Image encryption is a successful approach widely used in securing digital images while transmitti...
详细信息
The evolving field of Alzheimer’s disease(AD)diagnosis has greatly benefited from deep learning models for analyzing brain magnetic resonance(MR)*** study introduces Dynamic GradNet,a novel deep learning model design...
详细信息
The evolving field of Alzheimer’s disease(AD)diagnosis has greatly benefited from deep learning models for analyzing brain magnetic resonance(MR)*** study introduces Dynamic GradNet,a novel deep learning model designed to increase diagnostic accuracy and interpretability for multiclass AD ***,four state-of-the-art convolutional neural network(CNN)architectures,the self-regulated network(RegNet),residual network(ResNet),densely connected convolutional network(DenseNet),and efficient network(EfficientNet),were comprehensively compared via a unified preprocessing pipeline to ensure a fair *** these models,EfficientNet consistently demonstrated superior performance in terms of accuracy,precision,recall,and F1 *** a result,EfficientNetwas selected as the foundation for implementing Dynamic *** GradNet incorporates gradient weighted class activation mapping(GradCAM)into the training process,facilitating dynamic adjustments that focus on critical brain regions associated with early dementia *** adjustments are particularly effective in identifying subtle changes associated with very mild dementia,enabling early diagnosis and *** model was evaluated with the OASIS dataset,which contains greater than 80,000 brain MR images categorized into four distinct stages of AD *** proposed model outperformed the baseline architectures,achieving remarkable generalizability across all *** findingwas especially evident in early-stage dementia detection,where Dynamic GradNet significantly reduced false positives and enhanced classification *** findings highlight the potential of Dynamic GradNet as a robust and scalable approach for AD diagnosis,providing a promising alternative to traditional attention-based *** model’s ability to dynamically adjust spatial focus offers a powerful tool in artificial intelligence(AI)assisted precisionmedicine,particularly in the early det
Brain tumors are very dangerous as they cause death. A lot of people die every year because of brain tumors. Therefore, accurate classification and detection in the early stages can help in recovery. Various deep lear...
详细信息
The Internet of Things (IoT) has introduced issues to traditional cloud infrastructure, leading to the emergence of an intermediary architectural design called fog computing. Fog computing, a subtype of cloud computin...
详细信息
Big data is usually unstructured, and many applications require theanalysis in real-time. Decision tree (DT) algorithm is widely used to analyzebig data. Selecting the optimal depth of DT is time-consuming process as ...
详细信息
Big data is usually unstructured, and many applications require theanalysis in real-time. Decision tree (DT) algorithm is widely used to analyzebig data. Selecting the optimal depth of DT is time-consuming process as itrequires many iterations. In this paper, we have designed a modified versionof a (DT). The tree aims to achieve optimal depth by self-tuning runningparameters and improving the accuracy. The efficiency of the modified (DT)was verified using two datasets (airport and fire datasets). The airport datasethas 500000 instances and the fire dataset has 600000 instances. A comparisonhas been made between the modified (DT) and standard (DT) with resultsshowing that the modified performs better. This comparison was conductedon multi-node on Apache Spark tool using Amazon web services. Resultingin accuracy with an increase of 6.85% for the first dataset and 8.85% for theairport dataset. In conclusion, the modified DT showed better accuracy inhandling different-sized datasets compared to standard DT algorithm.
The diversity of data sources resulted in seeking effective manipulation and *** challenge that arises from the increasing dimensionality has a negative effect on the computation performance,efficiency,and stability o...
详细信息
The diversity of data sources resulted in seeking effective manipulation and *** challenge that arises from the increasing dimensionality has a negative effect on the computation performance,efficiency,and stability of *** of the most successful optimization algorithms is Particle Swarm Optimization(PSO)which has proved its effectiveness in exploring the highest influencing features in the search space based on its fast convergence and the ability to utilize a small set of parameters in the search *** research proposes an effective enhancement of PSO that tackles the challenge of randomness search which directly enhances PSO *** the other hand,this research proposes a generic intelligent framework for early prediction of orders delay and eliminate orders backlogs which could be considered as an efficient potential solution for raising the supply chain *** proposed adapted algorithm has been applied to a supply chain dataset which minimized the features set from twenty-one features to ten significant *** confirm the proposed algorithm results,the updated data has been examined by eight of the well-known classification algorithms which reached a minimum accuracy percentage equal to 94.3%for random forest and a maximum of 99.0 for Naïve ***,the proposed algorithm adaptation has been compared with other proposed adaptations of PSO from the literature over different *** proposed PSO adaptation reached a higher accuracy compared with the literature ranging from 97.8 to 99.36 which also proved the advancement of the current research.
暂无评论