This systematic review gave special attention to diabetes and the advancements in food and nutrition needed to prevent or manage diabetes in all its forms. There are two main forms of diabetes mellitus: Type 1 (T1D) a...
详细信息
Diabetes is a worldwide epidemic that affects millions of people. Long-term consequences, such as cardiovascular disease and renal failure, are more likely to occur in people with diabetes. If this condition could be ...
详细信息
The healthcare sector holds valuable and sensitive *** amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast *** to their nature,software-defined networks(SDNs)are widely use...
详细信息
The healthcare sector holds valuable and sensitive *** amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast *** to their nature,software-defined networks(SDNs)are widely used in healthcare systems,as they ensure effective resource utilization,safety,great network management,and *** this sector,due to the value of thedata,SDNs faceamajor challengeposed byawide range of attacks,such as distributed denial of service(DDoS)and probe *** attacks reduce network performance,causing the degradation of different key performance indicators(KPIs)or,in the worst cases,a network failure which can threaten human *** can be significant,especially with the current expansion of portable healthcare that supports mobile and wireless devices for what is called mobile health,or *** this study,we examine the effectiveness of using SDNs for defense against DDoS,as well as their effects on different network KPIs under various *** propose a threshold-based DDoS classifier(TBDC)technique to classify DDoS attacks in healthcare SDNs,aiming to block traffic considered a hazard in the form of a DDoS *** then evaluate the accuracy and performance of the proposed TBDC *** technique shows outstanding performance,increasing the mean throughput by 190.3%,reducing the mean delay by 95%,and reducing packet loss by 99.7%relative to normal,with DDoS attack traffic.
Protecting the privacy of data in the multi-cloud is a crucial *** mining is a technique that protects the privacy of individual data while mining those *** most significant task entails obtaining data from numerous r...
详细信息
Protecting the privacy of data in the multi-cloud is a crucial *** mining is a technique that protects the privacy of individual data while mining those *** most significant task entails obtaining data from numerous remote *** algorithms can obtain sensitive information once the data is in the data *** traditional algorithms/techniques promise to provide safe data transfer,storing,and retrieving over the cloud *** strategies are primarily concerned with protecting the privacy of user *** study aims to present data mining with privacy protection(DMPP)using precise elliptic curve cryptography(PECC),which builds upon that algebraic elliptic curve *** approach enables safe data exchange by utilizing a reliable data consolidation approach entirely reliant on rewritable data concealing ***,it outperforms data mining in terms of solid privacy procedures while maintaining the quality of the *** approximation error,computational cost,anonymizing time,and data loss are considered performance *** suggested approach is practical and applicable in real-world situations according to the experimentalfindings.
In recent years, academics have placed a high value on multi-modal emotion identification, as well as extensive research has been conducted in the areas of video, text, voice, and physical signal emotion detection. Th...
详细信息
Bot detection is considered a crucial security issue that is extensively analysed in various existingapproaches. Machine Learning is an efficient way of botnet attack detection. Bot detectionis the major issue faced b...
详细信息
Bot detection is considered a crucial security issue that is extensively analysed in various existingapproaches. Machine Learning is an efficient way of botnet attack detection. Bot detectionis the major issue faced by the existing system. This research concentrates on adopting a graphbasedfeature learning process to reduce feature dimensionality. The incoming samples arecorrectly classified and optimised using an Adaboost classifier with an improved grey wolfoptimiser (g-AGWO). The proposed IGWO optimisation approach is adopted to fulfil the multiconstraintissues related to bot detection and provide better local and global solutions (to satisfyexploration and exploitation). The extensive results show that the proposed g-AGWO model outperformsexisting approaches to reduce feature dimensionality, under-fitting/over-fitting andexecution time. The error rate prediction shows the feasibility of the given model to work over thechallenging environment. This model also works efficiently towards the unseen data to achievebetter generalization.
Electric power lines may be at risk of a safety hazard as a result of defective insulators. Image detection technique can significantly save maintenance costs and increase the effectiveness of Insulator Defect Detecti...
详细信息
ISBN:
(纸本)9789819717231
Electric power lines may be at risk of a safety hazard as a result of defective insulators. Image detection technique can significantly save maintenance costs and increase the effectiveness of Insulator Defect Detection. Nevertheless, limited precision and a lengthy detection process are drawbacks of the present insulator fault detection methods. For images with complex backgrounds, it is challenging to detect insulator faults using the conventional methods since they focus on minimal edge detection from images and classifier design. To address this issue, this paper recommends fast-RCNN coupled four-dense layered deep fully connected neural network (FR-4DCNN) that detects the insulator defects with high accuracy using the Insulator Defect Detection dataset from KAGGLE. The proposed FR-4DCNN model uses Insulator Defect Detection dataset from KAGGLE with 1800 insulator images. The insulator images are preprocessed with convolutional layers for feature map creation followed by the formation of region proposal network that detects the insulators by bounding box regressor algorithm. The classified insulator is then fed into ROI pooling coupled with four-dense hidden layered deep fully connected neural network having single input and output layer that predicts the ROI for classification of the insulator defect types for each ROI using the bounding box regressor method. The novelty of the proposed FR-4DCNN exists in the classification of the insulator defects in the form of missing plates in the hanging or attached insulator chain, broking sheds in insulators and the presence of rust in insulators. The dataset for Insulator Defect Detection was divided into training and testing data, and the training data were fitted to both the proposed FR-4DCNN model and other deep learning models in order to compare the efficiency. Results of execution indicate that the proposed FR-4DCNN model showcases the accuracy of 99.47%, precision of 99.42%, recall of 99.25%, and F1-score of 99.3
In recent decades, Cellular Networks (CN) have been used broadly in communication technologies. The most critical challenge in the CN was congestion control due to the distributed mobile environment. Some approaches, ...
详细信息
Sign language recognition is an important social issue to be addressed which can benefit the deaf and hard of hearing community by providing easier and faster communication. Some previous studies on sign language reco...
详细信息
Purpose: The rapid spread of COVID-19 has resulted in significant harm and impacted tens of millions of people globally. In order to prevent the transmission of the virus, individuals often wear masks as a protective ...
详细信息
暂无评论