Strong protection against cyber threats is ensured by forensic analysis and cloud environment security being reinforced by the use of real-time threat detection and advanced encryption *** existing approach struggles ...
详细信息
ISBN:
(纸本)9798331508845
Strong protection against cyber threats is ensured by forensic analysis and cloud environment security being reinforced by the use of real-time threat detection and advanced encryption *** existing approach struggles to keep up with changing cyber threats and lack the strategic thinking skills necessary to address new security issues. To overcome these drawbacks, this work presents a novel method that maximizes security and forensic analysis in cloud-based settings by fusing blockchain technology, the game theory, and recursive Gated Recurrent Unit (GRU) models. The behavioral analytic capabilities of the recursive GRU models are especially helpful for detecting patterns and anomalies in security-related cloud logs, as evidenced by the UNW-NB15 dataset. Its flexibility is essential for identifying changing cyber threats and identifying anomalous user behavior. Using blockchain technology to create a decentralized, immutable ledger helps to mitigate data integrity issues that may arise from forensic investigation in cloud environments. This ledger guarantees the accuracy of data for forensic examinations, and smart contracts which come with built-in security features automate access controls and security issue remedies. Because blockchain is decentralized, it reduces individual points of failure, which improves the security of cloud infrastructure as a whole. By synchronizing security occurrences in real-time with the blockchain, the proposed connection creates a reliable and unchangeable record. Programmed intelligent agreements respond quickly to security incidents by issuing alerts or executing specified actions, as detected by the recursive GRU model. Through the use of continuous learning techniques, the model continuously adjusts to new data, improving its comprehension of both common and uncommon tendencies based on security incidents recorded on the blockchain. In cloud environments, this approach seeks to improve safety, openness, and effectiven
Diabetic Retinopathy (DR) is widely recognized as the primary cause of visual impairment worldwide. Early intervention is crucial in preventing irreversible vision loss. Ophthalmologists conventionally utilize fundus ...
详细信息
The Internet of Things (IoT) has gained importance over the last decade due to the exponential growth in digital communication systems and networks. The future society relies on connecting and communicating everything...
详细信息
The brain tumors detected early and precisely is essential for giving patients a better chance of recovery. Magnetic Resonance Imaging are the leading method for problems abnormalities in the brain, however traditiona...
详细信息
The development of the Internet of Things(IoT)technology is leading to a new era of smart applications such as smart transportation,buildings,and smart ***,these applications act as the building blocks of IoT-enabled ...
详细信息
The development of the Internet of Things(IoT)technology is leading to a new era of smart applications such as smart transportation,buildings,and smart ***,these applications act as the building blocks of IoT-enabled smart *** high volume and high velocity of data generated by various smart city applications are sent to flexible and efficient cloud computing resources for ***,there is a high computation latency due to the presence of a remote cloud *** computing,which brings the computation close to the data source is introduced to overcome this *** an IoT-enabled smart city environment,one of the main concerns is to consume the least amount of energy while executing tasks that satisfy the delay *** efficient resource allocation at the edge is helpful to address this *** this paper,an energy and delay minimization problem in a smart city environment is formulated as a bi-objective edge resource allocation ***,we presented a three-layer network architecture for IoT-enabled smart ***,we designed a learning automata-based edge resource allocation approach considering the three-layer network architecture to solve the said bi-objective minimization *** Automata(LA)is a reinforcement-based adaptive decision-maker that helps to find the best task and edge resource *** extensive set of simulations is performed to demonstrate the applicability and effectiveness of the LA-based approach in the IoT-enabled smart city environment.
The integration of wireless sensor networks (WSNs) and blockchain technology has gained significant attention in recent years due to its potential in addressing security and privacy concerns in various applications. I...
详细信息
ISBN:
(纸本)9789819717231
The integration of wireless sensor networks (WSNs) and blockchain technology has gained significant attention in recent years due to its potential in addressing security and privacy concerns in various applications. In this paper, we propose blockchain technology with wireless-based secure warehouse system (BCWS2) that leverages wireless blockchain technology along with an efficient routing policy to ensure data integrity, authenticity, and confidentiality in a warehouse environment. The proposed system consists of a network of battery-powered wireless sensors deployed within the warehouse premises to monitor various environmental parameters such as temperature, humidity, and light levels. These sensors collect data and transmit it securely to a blockchain network using cryptographic techniques to prevent unauthorized access and tampering. The blockchain network, powered by smart contracts, acts as a decentralized ledger, ensuring the immutability and transparency of the collected sensor data. Each sensor node contributes to the blockchain by forming a consensus on the validity of the data through a distributed consensus protocol. This enables secure and tamper-proof storage of the collected data, eliminating the need for a central authority or trusted intermediary. In order to enhance routing efficiency within the warehouse sensor network, we present a highly efficient routing policy that leverages machine learning algorithms. Our proposed routing policy aims to optimize the path selection process, ensuring effective and streamlined communication within the network. The policy dynamically adjusts the routing paths based on the current network conditions, such as node congestion, battery levels, and signal strength. The proposed routing approach significantly enhances network performance, minimizes energy consumption, and guarantees prompt delivery of sensor data to the blockchain network. This system effectively tackles various challenges encountered in conventiona
The medical services industry is on the cusp of another period driven by the union of distributed computing, man-made consciousness (simulated intelligence), and the Ayushman Bharat Wellbeing Record (ABHA) card drive....
详细信息
Topological indices provide valuable insights into various physical, chemical, and biological properties of molecules. Topological indices are correlated with various physicochemical properties of molecules, including...
详细信息
Globally, the search engine is extremely important in reducing the difficulty of information exploration. An internet spider, bot, or program known as a web crawler is used by search engines to maintain an index and r...
详细信息
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t...
详细信息
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and targets while ignoring relational types information. Considering the positive or negative effects of DTIs will facilitate the study on comprehensive mechanisms of multiple drugs on a common target, in this work, we model DTIs on signed heterogeneous networks, through categorizing interaction patterns of DTIs and additionally extracting interactions within drug pairs and target protein pairs. We propose signed heterogeneous graph neural networks(SHGNNs), further put forward an end-to-end framework for signed DTIs prediction, called SHGNN-DTI,which not only adapts to signed bipartite networks, but also could naturally incorporate auxiliary information from drug-drug interactions(DDIs) and protein-protein interactions(PPIs). For the framework, we solve the message passing and aggregation problem on signed DTI networks, and consider different training modes on the whole networks consisting of DTIs, DDIs and PPIs. Experiments are conducted on two datasets extracted from Drug Bank and related databases, under different settings of initial inputs, embedding dimensions and training modes. The prediction results show excellent performance in terms of metric indicators, and the feasibility is further verified by the case study with two drugs on breast cancer.
暂无评论