With a steady increase in the adoption of cloud storage systems, the client’s data are at risk of being leaked. There are several methods of encrypting data which are quite useful but they lack some of the features o...
详细信息
ISBN:
(数字)9798350388602
ISBN:
(纸本)9798350388619
With a steady increase in the adoption of cloud storage systems, the client’s data are at risk of being leaked. There are several methods of encrypting data which are quite useful but they lack some of the features of today’s sophisticated threats. The methodology used in this research propose an encryption framework known as Obfuscrypt to improve the issues of data privacy as well as confidentiality of data stored in cloud storage systems. Obfuscrypt uses conventional encryption strategies incorporated with obfuscation and post-quantum cryptographic algorithms to provide a complex security plan immune to classic and quantum approaches. Some of the proposed other innovations include the decentralised key management with multi-factor authentication and RBAC-ABE as the fine-grained access control techniques. These features make it possible for only the authorized personnel to be in a position to be in a position of decrypting and retrieving the stored data thereby minimizing the possibility of the data being accessed by unauthorized people. The work also considers the issue of performance efficiency of the cloud storage systems. Similar to other symmetric encryption programs, Obfuscrypt uses light encryption algorithms and brings in to play the hardware acceleration so that it may infuse lesser computational overhead in the process of encryption and decryption. As can be clearly seen from the results, the actual work proves that the proposed framework not only offers a higher level of security but does not affect the system performance to a great extent. Also, the study addresses the post-quantum cryptographic algorithm for making the system resistant to an attack that can be posed by quantum computing systems. With the help of these improved algorithms, Obfuscrypt guarantees the permanent data security in the world of constantly emerging cyber threats.
Over the past decade, the continuous surge in cloud computing demand has intensified data center workloads, leading to significant carbon emissions and driving the need for improving their efficiency and sustainabilit...
详细信息
作者:
Josh LuzierDavid C. ConnerDepartment of Physics
Computer Science and Engineering Capable Humanitarian Robotics and Intelligent Systems Lab (CHRISLab) Christopher Newport University Newport News Virginia
This paper presents synthesis tools for the ROS 2 version of the Flexible Behavior Engine (FlexBE). Synthesis reduces the need for extensive testing and validation of hand crafted controllers by using mathematically p...
This paper presents synthesis tools for the ROS 2 version of the Flexible Behavior Engine (FlexBE). Synthesis reduces the need for extensive testing and validation of hand crafted controllers by using mathematically precise specifications to generate “correct-by-construction” behavior controllers. Our approach builds upon work using the GR(1) (General Reactivity of rank 1) fragment of LTL to synthesize a reactive hierarchical finite state machine that can be directly executed in FlexBE. The presented work expands on previous ROS 1 tools, and extends them to ROS 2 in a way that supports more general specifications that incorporate environmental states. This paper presents an accessible open-source demonstration that serves as a general introduction to these powerful synthesis techniques.
With the development of machine learning technology in various fields, such as medical care, smart manufacturing, etc., the data has exploded. It is a challenge to train a deep learning model for different application...
详细信息
In the process of steel plate production, predicting the plate shape is of great significance for producing high-quality and consistently stable plate shapes. This paper presents a model that predicts both the defect ...
详细信息
Applying evidence-based medicine prevents medical errors highlighting the need for applying Clinical Guidelines (CGs) to improve patient care by nurses. However, nurses often face challenges in utilizing CGs due to pa...
详细信息
The healthcare sector is a very sensitive area given the information that circulates within it, which makes hackers more inclined to target this architecture. Various techniques are available to ensure illegal intrusi...
详细信息
ISBN:
(数字)9798331543891
ISBN:
(纸本)9798331543907
The healthcare sector is a very sensitive area given the information that circulates within it, which makes hackers more inclined to target this architecture. Various techniques are available to ensure illegal intrusion, including phishing, an attack that is widely used by attackers as they take advantage of users' negligence or non-technical background to get them to provide initial access to the target architecture. This paper will discuss the threats that can affect an Internet of Things (IoT) architecture for healthcare domain, more specifically the phishing attack, using the STRIDE approach with the Microsoft Threat Modeling (MTM) tool, and then proposing countermeasures and recommendations for mitigating and correcting these threats, to guarantee correct and secure communication as far as possible.
In precision poultry farming, detecting multiple objects is challenging. While Convolutional Neural Networks (CNNs) excel in single-object detection, addressing the complexity of multi-object detection, requires advan...
In precision poultry farming, detecting multiple objects is challenging. While Convolutional Neural Networks (CNNs) excel in single-object detection, addressing the complexity of multi-object detection, requires advanced approaches. To overcome this challenge, we implement advanced algorithms like YOLOv8, SSD, and Faster RCNN. The primary goal is to analyze their performance, focusing on accuracy, speed, and adaptability. We aim to balance computational efficiency with optimal resource utilization, considering hardware constraints. Integrating these models into precision farming systems and adapting to environmental variations are key challenges. This project specifically aims to validate YOLOv8's effectiveness, and yields an accuracy around 98% in poultry farming scenarios. This research contributes insights to advance precision poultry farming practices.
Electrical Impedance Tomography (EIT) is a clinical imaging technique that gained a lot of attention because it is a non-invasive and radiation-free method. To obtain an inner image of the domain under study, a specif...
详细信息
Plant disease diagnosis is the process of identifying and characterizing diseases that affect plants. The primary goal of plant disease diagnosis is to determine the cause of the disease, and to develop appropriate co...
Plant disease diagnosis is the process of identifying and characterizing diseases that affect plants. The primary goal of plant disease diagnosis is to determine the cause of the disease, and to develop appropriate control and management strategies to minimize its impact on crop yields and quality. In this research, four transfer learning models such as AlexNet, VGG16, MobileNetV2, and InceptionV3 has been used for the classification of plant disease into different categories. Out of all the four transfer learning models, the best performing model is InceptionV3 with the value of accuracy as 0.92 and precision as 0.84.
暂无评论