Faced with overwhelming product information, users often struggle to make choices, impacting their shopping experience and time. To address this, recommendation systems provide precise suggestions that streamline deci...
详细信息
The Wireless Sensor Networks(WSNs)are characterized by their widespread deployment due to low cost,but the WSNs are vulnerable to various types of *** defend against the attacks,an effective security solution is ***,t...
详细信息
The Wireless Sensor Networks(WSNs)are characterized by their widespread deployment due to low cost,but the WSNs are vulnerable to various types of *** defend against the attacks,an effective security solution is ***,the limits of these networks’battery-based energy to the sensor are the most critical impediments to selecting cryptographic ***,finding a suitable algorithm that achieves the least energy consumption in data encryption and decryption and providing a highly protected system for data remains the fundamental *** this research,the main objective is to obtain data security during transmission by proposing a robust and low-power encryption algorithm,in addition,to examining security algorithms such as ECC and MD5 based on previous *** this research,the Energy Saving and Securing Data algorithm(ESSD)algorithm is introduced,which provides the Message Digest 5(MD5)computation simplicity by modifying the Elliptic Curve Cryptography(ECC)under the primary condition of power *** three algorithms,ECC,MD5,and ESSD,are applied to Low Energy Adaptive Clustering Hierarchy(LEACH)and Threshold-sensitive Energy Efficient Sensor Network Protocol(TEEN)hierarchical routing algorithms which are considered the most widely used in *** results of security methods under the LEACH protocol show that all nodes are dead at 456,496,and 496,respectively,to ECC,MD5,and *** results of security methods under the TEEN protocol show that the test ends at 3743,4815,and 4889,respectively,to ECC,MD5,and *** on these results,the ESSD outperforms better in terms of increased security and less power *** addition,it is advantageous when applied to TEEN protocol.
In recent years, the increasing development of Web 3.0 has generated growing attention toward blockchain and smart contracts. However, due to their immutability, smart contracts still exhibit various vulnerabilities t...
详细信息
The secondary structure of a protein is critical for establishing a link between the protein primary and tertiary *** this reason,it is important to design methods for accurate protein secondary structure *** of the e...
详细信息
The secondary structure of a protein is critical for establishing a link between the protein primary and tertiary *** this reason,it is important to design methods for accurate protein secondary structure *** of the existing computational techniques for protein structural and functional prediction are based onmachine learning with *** deep learning architectures have already been applied to tackle protein secondary structure prediction *** this study,deep learning based models,i.e.,convolutional neural network and long short-term memory for protein secondary structure prediction were *** input to proposed models is amino acid sequences which were derived from CulledPDB *** tuning with cross validation was employed to attain best parameters for the proposed *** proposed models enables effective processing of amino acids and attain approximately 87.05%and 87.47%Q3 accuracy of protein secondary structure prediction for convolutional neural network and long short-term memory models,respectively.
Federated learning(FL)is a decentralized machine learning paradigm,which has significant advantages in protecting data privacy[1].However,FL is vulnerable to poisoning attacks that malicious participants perform attac...
详细信息
Federated learning(FL)is a decentralized machine learning paradigm,which has significant advantages in protecting data privacy[1].However,FL is vulnerable to poisoning attacks that malicious participants perform attacks by injecting dirty data or abnormal model parameters during the local model training and aim to manipulate the performance of the global model[2].
The quick increasing in the Internet of Things (IoT) devices has raised significant security concerns, particularly in the face of reactive jamming attacks. This paper proposes a trust-based protocol named Trust-Based...
详细信息
In addressing labor-intensive process of manual plant disease detection, this article introduces an innovative solution—the lightweight parallel depthwise separable convolutional neural network (PDSCNN) coupled with ...
详细信息
With the emergence of AI for good, there has been an increasing interest in building computer vision data-driven deep learning inclusive AI solutions. Sign language Recognition (SLR) has gained attention recently. It ...
详细信息
With the rapid development of cloud computing, more and more complicated services are deployed on the cloud. The frequent communication between services places a great burden on the network of the data center and lead...
详细信息
The cloud network is rapidly growing due to a massive increase in interconnected devices and the emergence of different technologies such as the Internet of things, fog computing, and artificial intelligence. In respo...
详细信息
暂无评论