As internet use in communication networks has grown, fake news has become a big problem. The misleading heading of the news loses the trust of the reader. Many techniques have emerged, but they fail because fraudsters...
详细信息
In modern society,an increasing number of occasions need to effectively verify people's *** is the most ef-fective technology for personal *** research on automated biometrics recognition mainly started in the 196...
详细信息
In modern society,an increasing number of occasions need to effectively verify people's *** is the most ef-fective technology for personal *** research on automated biometrics recognition mainly started in the 1960s and *** the following 50 years,the research and application of biometrics have achieved fruitful *** 2014-2015,with the successful applications of some emerging information technologies and tools,such as deep learning,cloud computing,big data,mobile communication,smartphones,location-based services,blockchain,new sensing technology,the Internet of Things and federated learning,biometric technology entered a new development ***,taking 2014-2015 as the time boundary,the development of biometric technology can be divided into two *** addition,according to our knowledge and understanding of biometrics,we fur-ther divide the development of biometric technology into three phases,i.e.,biometrics 1.0,2.0 and *** 1.0 is the primary de-velopment phase,or the traditional development *** 2.0 is an explosive development phase due to the breakthroughs caused by some emerging information *** present,we are in the development phase of biometrics *** 3.0 is the future development phase of *** the biometrics 3.0 phase,biometric technology will be fully mature and can meet the needs of various *** 1.0 is the initial phase of the development of biometric technology,while biometrics 2.0 is the advanced *** this paper,we provide a brief review of biometrics ***,the concept of biometrics 2.0 is defined,and the architecture of biometrics 2.0 is *** particular,the application architecture of biometrics 2.0 in smart cities is *** challenges and perspectives of biometrics 2.0 are also discussed.
The key objective of intrusion detection systems(IDS)is to protect the particular host or network by investigating and predicting the network traffic as an attack or *** IDS uses many methods of machine learning(ML)to...
详细信息
The key objective of intrusion detection systems(IDS)is to protect the particular host or network by investigating and predicting the network traffic as an attack or *** IDS uses many methods of machine learning(ML)to learn from pastexperience attack *** based and identify the new *** though these methods are effective,but they have to suffer from large computational costs due to considering all the traffic features,***,emerging technologies like the Internet of Things(Io T),big data,*** getting advanced day by day;as a result,network traffics are also increasing ***,the issue of computational cost needs to be addressed ***,in this research,firstly,the ML methods have been used with the feature selection technique(FST)to reduce the number of features by picking out only the important ones from NSL-KDD,CICIDS2017,and CIC-DDo S2019datasets later that helped to build IDSs with lower cost but with the higher performance which would be appropriate for vast scale *** experimental result demonstrated that the proposed model *** tree(DT)with Recursive feature elimination(RFE)performs better than other classifiers with RFE in terms of accuracy,specificity,precision,sensitivity,F1-score,and G-means on the investigated datasets.
Potatoes are essential for food production and consumption, but pests and illnesses can cause major economic losses. To quickly identify potato leaf diseases, image processing, computer vision, and deep learning can b...
详细信息
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the cri...
详细信息
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the critical *** to its flexible and efficient fine-grained access control feature,Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is suitable for data sharing in ***,there are many flaws in most existing CP-ABE schemes,such as attribute privacy leakage and key *** paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP).A partially hidden access structure is adopted to hide sensitive user attribute values,and attribute categories are sent along with the ciphertext to effectively avoid privacy *** addition,key tracking and malicious user revocation are introduced with broadcast encryption to prevent key *** the main computation task is outsourced to the cloud,the burden of the user side is relatively *** of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV.
1 Introduction The Internet of Things(IoT)has facilitated the development of numerous fields in our ***,some equipment in IoT environment lacks sufficient storage and data processing capabilities[1].A feasible strateg...
详细信息
1 Introduction The Internet of Things(IoT)has facilitated the development of numerous fields in our ***,some equipment in IoT environment lacks sufficient storage and data processing capabilities[1].A feasible strategy is to leverage the powerful computing capabilities of cloud servers to process the data within the IoT devices.
Antenna optimization using machine learning is a rapidly evolving field that leverages the power of artificial intelligence to design and improve antenna systems. Antenna optimization is a process of modifying antenna...
详细信息
This study examines the use of experimental designs, specifically full and fractional factorial designs, for predicting Alzheimer’s disease with fewer variables. The full factorial design systematically investigates ...
详细信息
The photocatalytic activity of catalysts depends on the energy-harvesting ability and the separation or transport of photogenerated *** light absorption capacity of graphitic carbon nitride(g-C_(3)N_(4))-based composi...
详细信息
The photocatalytic activity of catalysts depends on the energy-harvesting ability and the separation or transport of photogenerated *** light absorption capacity of graphitic carbon nitride(g-C_(3)N_(4))-based composites can be enhanced by adjusting the surface plasmon resonance(SPR)of noble metal nanoparticles(e.g.,Cu,Au,and Pd)in the entire visible *** can be carried out by varying the nanocomponents of the *** SPR of noble metals can enhance the local electromagnetic field and improve interband transition,and resonant energy transfer occurs from plasmonic dipoles to electron-hole pairs via near-field electromagnetic ***,noble metals have emerged as relevant nanocomponents for g-C_(3)N_(4) used in CO_(2) photoreduction and water ***,recent key advances in noble metals(either in single atom,cluster,or nanoparticle forms)and composite photocatalysts based on inorganic or organic nanocomponent-incorporated g-C_(3)N_(4) nanosheets are systematically discussed,including the applications of these photocatalysts,which exhibit improved photoinduced charge mobility in CO_(2) photoconversion and H2 *** related to the different types of multi-nanocomponent heterostructures(involving Schottky junctions,Z-/S-scheme heterostructures,noble metals,and additional semiconductor nanocomponents)and the adjustment of dimensionality of heterostructures(by incorporating noble metal nanoplates on g-C_(3)N_(4) forming 2D/2D heterostructures)are *** current prospects and possible challenges of g-C_(3)N_(4) composite photocatalysts incorporated with noble metals(e.g.,Au,Pt,Pd,and Cu),particularly in water splitting,CO_(2) reduction,pollution degradation,and chemical conversion applications,are summarized.
Images captured under severe weather conditions, such as haze and fog, suffer from image quality degradation caused by atmospheric particle diffusion. This degradation manifests as color fading, reduced contrast, and ...
详细信息
暂无评论