With the continuous construction of HVDC, it has gradually become dis-tances and large capacity transmission, as well as one of the main technologies of regional power grid interconnection. The scale of AC-DC hybrid g...
详细信息
In the era of big data and growing privacy concerns, Federated Learning (FL) has emerged as a promising solution for collaborative model training while preserving user data privacy. However, FL faces challenges such a...
详细信息
Automatic Pill Dispensers are becoming a necessity in the current ages. The survey paper mainly examines the contemporary medicine pill dispensers focusing specifically on Internet of Things (IoT) usage and its featur...
详细信息
In other instances, the cloud transfers payment information directly to the merchant’s server without first doing any fraud checks. Block authentication between the cloud and a healthcare merchant server is the goal ...
详细信息
In other instances, the cloud transfers payment information directly to the merchant’s server without first doing any fraud checks. Block authentication between the cloud and a healthcare merchant server is the goal of this study, which is designed to prevent the deployment of fraudulent servers. Smart contract verification on the blockchain will be used to this end. The cloud assault must be prevented from accessing personal payment and card information. It is via the employment of cryptography methods that this concept of privacy reservation is made possible. The Boolean crossover depth first search (DFS) technique is used to encrypt data in the payment gateway protocol at its inception. When the hospital administrator solicits card data from patients or users, our innovative approach swiftly initiates data encryption using the DFS technique. This method meticulously traverses the data structure in a depth-first manner, employing Boolean operations to systematically encrypt sensitive information. Through this process, the patient's payment and card data undergo secure transformation, rendering it unreadable to unauthorized entities. Additionally, an authentication key is generated concurrently with the encryption process, enabling verification between the system and the user before any data transmission occurs. The integration of the DFS technique serves as a fundamental layer of defense against potential cloud-based attacks. Its application ensures the utmost protection of personal payment and card details throughout the transaction process, bolstering the security infrastructure of our proposed system. A comprehensive analysis comparing our approach with existing methods showcases the efficiency and reliability of our proposed system in terms of Execution Time (ms), Encryption Time (ms), Decryption Time (ms), and Memory (bits). This study aims to bridge the gap in transactional security, ensuring robust protection against unauthorized access and data breaches in
Pisciculture encounters an array of intricate challenges that span disease management, preservation of water quality, prevention of genetic hybridization, ensuring the integrity of net systems, sourcing sustainable aq...
详细信息
Discontinuity in long Deoxyribonucleic Acid (DNA) sequences creates harmful diseases. Changes in the DNA structure refers to changes in the human immunity system. Tuberculosis is a critical disease that causes coughin...
详细信息
With the development of internet, the existence of signed networks has become increasingly common. These networks contain signed information in links, such as friendly and hostile relationships in social networks. Sig...
详细信息
Parkinson's Disease is a neurological progressive disorder that affects the nervous system of a human being, which effects the parts of the body. Tremors, imbalance, slowed movement, stiffness, difficulty in walki...
详细信息
This paper presents a comparative analysis of several regression techniques for predicting student academic performance, with a particular focus on Ridge Regression and its interpretability through SHAP, a method of E...
详细信息
In this paper, design and implementation of a 2D graphics processing hardware unit using FPGA for educational purpose is presented. We propose a more simple & minimalist GPU architecture, which is flexible and eas...
详细信息
暂无评论