The on-demand availableness of computer systems resources, especially storage of data (cloud storage) and rectifying power, with no direct ongoing administration by the user is what they call cloud computing. Large cl...
详细信息
ISBN:
(纸本)9798350397284
The on-demand availableness of computer systems resources, especially storage of data (cloud storage) and rectifying power, with no direct ongoing administration by the user is what they call cloud computing. Large cloud functions are usually spread among several locations, each of which constitutes a data center. Customers may save money on capital expenses by using cloud computing, which frequently takes a 'pay-as-you-go' approach. Coherence in cloud computing is achieved by sharing resources. In today's world of the Internet, demand for cloud services is increasing drastically leading to the production of new services day by day. As the services increase, the data gets primarily targeted by spiteful users who attempt to steal the data for their own atrocious and unethical activities. Users and trustworthy applications are considering more security and privacy and services get more in demand. Moreover, this study has reviewed several algorithms such as CPE-ABE (Ciphertext policy attribute-based encryption), ABE, KP-ABE (Key policy attribute-based encryption) CSP (Constraint satisfaction problem), PKG, AES (Advanced Encryption Standards), SHA-1 (Secure Hash Algorithm), Photo encryption, Photo decryption, PRE, IDEA (International Data Encryption algorithm) and LSBG (Least Significant Bit Grouping) for image data security. As already discussed, the increasing threats and frauds around the world, safe and secure applications and services should be created to resolve this problem so that people can store data on a platform that can be relied on. This research study has discussed about the concept of what are the paradigms required for securing and protecting the data and securing the image data at an encrypted level. This study has reviewed several existing research works, studied different algorithms which have been used in different research articles, and compared their strengths and drawbacks accordingly. Different research works have been summarized in a form of ta
Double Stator Hybrid Excitation Flux Switching Generator (DS-HEFSG) has attracted significant interest in power-generating research owing to its potential for improved performance and sustainability. This research exa...
详细信息
Schizophrenia is a chronic mental disorder with distorted thinking, hallucinations, and social difficulties. Early diagnosis is vital, but current methods are limited. This research proposes a web-based application in...
详细信息
In this work, the antenna optimisation process is done by using ML algorithms such as KNN, random forest, Gradient Boost, XG Boost and MLP. Then the predicted results are ensembled using Voting Regressor. A Cylindrica...
详细信息
In situations when the precise position of a machine is unknown,localization becomes *** research focuses on improving the position prediction accuracy over long-range(LoRa)network using an optimized machine learning-...
详细信息
In situations when the precise position of a machine is unknown,localization becomes *** research focuses on improving the position prediction accuracy over long-range(LoRa)network using an optimized machine learning-based *** order to increase the prediction accuracy of the reference point position on the data collected using the fingerprinting method over LoRa technology,this study proposed an optimized machine learning(ML)based *** signal strength indicator(RSSI)data from the sensors at different positions was first gathered via an experiment through the LoRa network in a multistory round layout *** noise factor is also taken into account,and the signal-to-noise ratio(SNR)value is recorded for every RSSI *** study concludes the examination of reference point accuracy with the modified KNN method(MKNN).MKNN was created to more precisely anticipate the position of the reference *** findings showed that MKNN outperformed other algorithms in terms of accuracy and complexity.
Emotions are vital in human cognition and are essential for human survival. Emotion is often associated with smart decisions, interpersonal behavior, and, to some extent, intellectual cognition. From the recent litera...
详细信息
Accurate and early diagnosis of renal cancer is important for the improvement of outcomes in patients;hence, timely intervention has much to do with the effectiveness of treatments and survival rates. While there has ...
详细信息
The fundamental security aspect of the classical crypto-system depends on integer factorization and discrete logarithm problems. The quantum factorization problem is a crucial problem in quantum computing as it has si...
详细信息
The industrial world including the merits of Internet of Things (IoT) paradigm has wide opened the evolution of new digital technology to facilitate promising and revolutionizing dimensions in diversified industrial a...
详细信息
With the ever growth of Internet users,video applications,and massive data traffic across the network,there is a higher need for reliable bandwidth-efficient multimedia *** Video Coding(VVC/H.266)is finalized in Septe...
详细信息
With the ever growth of Internet users,video applications,and massive data traffic across the network,there is a higher need for reliable bandwidth-efficient multimedia *** Video Coding(VVC/H.266)is finalized in September 2020 providing significantly greater compression efficiency compared to Highest Efficient Video Coding(HEVC)while providing versatile effective use for Ultra-High Definition(HD)*** article analyzes the quality performance of convolutional codes,turbo codes and self-concatenated convolutional(SCC)codes based on performance metrics for reliable future video *** advent of turbo codes was a significant achievement ever in the era of wireless communication approaching nearly the Shannon *** codes are operated by the deployment of an interleaver between two Recursive Systematic Convolutional(RSC)encoders in a parallel *** RSC encoders may be operating on the same or different architectures and code *** proposed work utilizes the latest source compression standards H.266 and H.265 encoded standards and Sphere Packing modulation aided differential Space Time Spreading(SP-DSTS)for video transmission in order to provide bandwidth-efficient wireless video ***,simulation results show that turbo codes defeat convolutional codes with an averaged E_(b)/N_(0) gain of 1.5 dB while convolutional codes outperformcompared to SCC codes with an E_(b)/N_(0) gain of 3.5 dBatBit ErrorRate(BER)of 10−*** Peak Signal to Noise Ratio(PSNR)results of convolutional codes with the latest source coding standard of H.266 is plotted against convolutional codes with H.265 and it was concluded H.266 outperform with about 6 dB PSNR gain at E_(b)/N_(0) value of 4.5 dB.
暂无评论