With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the cri...
详细信息
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the critical *** to its flexible and efficient fine-grained access control feature,Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is suitable for data sharing in ***,there are many flaws in most existing CP-ABE schemes,such as attribute privacy leakage and key *** paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP).A partially hidden access structure is adopted to hide sensitive user attribute values,and attribute categories are sent along with the ciphertext to effectively avoid privacy *** addition,key tracking and malicious user revocation are introduced with broadcast encryption to prevent key *** the main computation task is outsourced to the cloud,the burden of the user side is relatively *** of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV.
With the rapid expansion of interactions across various domains such as knowledge graphs and social networks, anomaly detection in dynamic graphs has become increasingly critical for mitigating potential risks. Howeve...
详细信息
Human pose estimation is a critical research area in the field of computer vision,playing a significant role in applications such as human-computer interaction,behavior analysis,and action *** this paper,we propose a ...
详细信息
Human pose estimation is a critical research area in the field of computer vision,playing a significant role in applications such as human-computer interaction,behavior analysis,and action *** this paper,we propose a U-shaped keypoint detection network(DAUNet)based on an improved ResNet subsampling structure and spatial grouping *** network addresses key challenges in traditional methods,such as information loss,large network redundancy,and insufficient sensitivity to low-resolution *** is composed of three main ***,we introduce an improved BottleNeck block that employs partial convolution and strip pooling to reduce computational load and mitigate feature ***,after upsampling,the network eliminates redundant features,improving the overall ***,a lightweight spatial grouping attention mechanism is applied to enhance low-resolution semantic features within the feature map,allowing for better restoration of the original image size and higher *** results demonstrate that DAUNet achieves superior accuracy compared to most existing keypoint detection models,with a mean PCKh@0.5 score of 91.6%on the MPII dataset and an AP of 76.1%on the COCO ***,real-world experiments further validate the robustness and generalizability of DAUNet for detecting human bodies in unknown environments,highlighting its potential for broader applications.
Nowadays in the medicalfield,imaging techniques such as Optical Coherence Tomography(OCT)are mainly used to identify retinal *** this paper,the Central Serous Chorio Retinopathy(CSCR)image is analyzed for various stag...
详细信息
Nowadays in the medicalfield,imaging techniques such as Optical Coherence Tomography(OCT)are mainly used to identify retinal *** this paper,the Central Serous Chorio Retinopathy(CSCR)image is analyzed for various stages and then compares the difference between CSCR before as well as after treatment using different application *** approach,which was focused on image quality,improves medical image *** enhancement algorithm was implemented to improve the OCT image contrast and denoise purpose called Boosted Anisotropic Diffusion with an Unsharp Masking Filter(BADWUMF).The classifier used here is tofigure out whether the OCT image is a CSCR case or not.150 images are checked for this research work(75 abnormal from Optical Coherence Tomography Image Retinal Database,in-house clinical database,and 75 normal images).This article explicitly decides that the approaches suggested aid the ophthalmologist with the precise retinal analysis and hence the risk factors to be *** total precision is 90 percent obtained from the Two Class Support Vector Machine(TCSVM)classifier and 93.3 percent is obtained from Shallow Neural Network with the Powell-Beale(SNNWPB)classifier using the MATLAB 2019a program.
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly promin...
详细信息
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly prominent.A piece of code,known as a Webshell,is usually uploaded to the target servers to achieve multiple *** Webshell attacks has become a hot spot in current ***,the traditional Webshell detectors are not built for the cloud,making it highly difficult to play a defensive role in the cloud ***,a Webshell detection system based on deep learning that is successfully applied in various scenarios,is proposed in this *** system contains two important components:gray-box and neural network *** gray-box analyzer defines a series of rules and algorithms for extracting static and dynamic behaviors from the code to make the decision *** neural network analyzer transforms suspicious code into Operation Code(OPCODE)sequences,turning the detection task into a classification *** experiment results show that SmartEagleEye achieves an encouraging high detection rate and an acceptable false-positive rate,which indicate its capability to provide good protection for the cloud environment.
Cloud computing distributes task-parallel among the various *** with self-service supported and on-demand service have rapid *** these applications,cloud computing allocates the resources dynami-cally via the internet...
详细信息
Cloud computing distributes task-parallel among the various *** with self-service supported and on-demand service have rapid *** these applications,cloud computing allocates the resources dynami-cally via the internet according to user *** resource allocation is vital for fulfilling user *** contrast,improper resource allocations result to load imbalance,which leads to severe service *** cloud resources implement internet-connected devices using the protocols for storing,communi-cating,and *** extensive needs and lack of optimal resource allo-cating scheme make cloud computing more *** paper proposes an NMDS(Network Manager based Dynamic Scheduling)for achieving a prominent resource allocation scheme for the *** proposed system mainly focuses on dimensionality problems,where the conventional methods fail to address *** proposed system introduced three–threshold mode of task based on its size STT,MTT,LTT(small,medium,large task thresholding).Along with it,task mer-ging enables minimum energy consumption and response *** proposed NMDS is compared with the existing Energy-efficient Dynamic Scheduling scheme(EDS)and Decentralized Virtual Machine Migration(DVM).With a Network Manager-based Dynamic Scheduling,the proposed model achieves excellence in resource allocation compared to the other existing *** obtained results shows the proposed system effectively allocate the resources and achieves about 94%of energy efficient than the other *** evaluation metrics taken for comparison are energy consumption,mean response time,percentage of resource utilization,and migration.
Deep learning-based image stitching pipelines are typically divided into three cascading stages: registration, fusion, and rectangling. Each stage requires its own network training and is tightly coupled to the others...
Wireless sensor networks (WSNs) are networks with many sensor nodes that are utilized for various purposes, including the military and medical. In hazardous circumstances, precise data aggregation and routing are esse...
详细信息
In cloud data centers,the consolidation of workload is one of the phases during which the available hosts are allocated *** phenomenon ensures that the least possible number of hosts is used without compromise in meet...
详细信息
In cloud data centers,the consolidation of workload is one of the phases during which the available hosts are allocated *** phenomenon ensures that the least possible number of hosts is used without compromise in meeting the Service Level Agreement(SLA).To consolidate the workloads,the hosts are segregated into three categories:normal hosts,under-loaded hosts,and over-loaded hosts based on their *** is to be noted that the identification of an extensively used host or underloaded host is challenging to ***-old values were proposed in the literature to detect this *** current study aims to improve the existing methods that choose the underloaded hosts,get rid of Virtual Machines(VMs)from them,andfinally place them in some other *** researcher proposes a Host Resource Utilization Aware(HRUAA)Algorithm to detect those underloaded and place its virtual machines on different hosts in a vibrant Cloud *** mechanism presented in this study is contrasted with existing mechanisms *** results attained from the study estab-lish that numerous hosts can be shut down,while at the same time,the user's workload requirement can also be *** proposed method is energy-efficient in workload consolidation,saves cost and time,and leverages active hosts.
Most of the search-based software remodularization(SBSR)approaches designed to address the software remodularization problem(SRP)areutilizing only structural information-based coupling and cohesion quality ***,in prac...
详细信息
Most of the search-based software remodularization(SBSR)approaches designed to address the software remodularization problem(SRP)areutilizing only structural information-based coupling and cohesion quality ***,in practice apart from these quality criteria,there require other aspects of coupling and cohesion quality criteria such as lexical and changed-history in designing the modules of the software ***,consideration of limited aspects of software information in the SBSR may generate a sub-optimal modularization ***,such modularization can be good from the quality metrics perspective but may not be acceptable to the *** produce a remodularization solution acceptable from both quality metrics and developers’perspectives,this paper exploited more dimensions of software information to define the quality criteria as modularization ***,these objectives are simultaneously optimized using a tailored manyobjective artificial bee colony(MaABC)to produce a remodularization *** assess the effectiveness of the proposed approach,we applied it over five software *** obtained remodularization solutions are evaluated with the software quality metrics and developers view of *** demonstrate that the proposed software remodularization is an effective approach for generating good quality modularization solutions.
暂无评论