Clustering is a method of grouping data based on similarities, and is an unsupervised technique for discovering patterns in data. In this research paper, various clustering algorithms such as k-Means, DBSCAN, Spectral...
详细信息
The Internet of Vehicles (IoV) has gained significant attention due to its capability to facilitate Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication. However, IoV networks are highly suscepti...
详细信息
ISBN:
(数字)9798331509934
ISBN:
(纸本)9798331509941
The Internet of Vehicles (IoV) has gained significant attention due to its capability to facilitate Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication. However, IoV networks are highly susceptible to security and privacy threats, including unauthorized tracking of vehicle locations and Distributed Denial-of-Service (DDoS) attacks. To address these challenges, recent studies have explored blockchain technology as a potential solution for enhancing data security and privacy in IoV networks. This research proposes a blockchain-based enhanced secure data storage model for IoV networks, incorporating lightweight cryptography algorithms to ensure robust security. Additionally, the framework integrates statistical and machine learning models to analyze harvested vehicular data, providing predictive insights for threat detection and mitigation. The study presents a hypothetical V2V communication dataset comprising eleven attributes and four records representing a four-smart-vehicle scenario. Analysis of vehicular speed data reveals an average speed of 55 km/h, with maximum and minimum speeds of 100 km/h and 0 km/h, respectively. The total payload transmitted is 42 KB, with an average payload size of 10.5 KB. A key contribution of this study is the development of a Solana blockchain-based secure data storage model, where transactions are automated and validated through smart contracts. The model efficiently stores the large volume of data generated by smart vehicles and enables real-time data retrieval using embedded internet protocols. The proposed framework is expected to provide a highly secure IoV data storage system upon successful implementation while enhancing threat prediction accuracy and overall network security.
Cyberbullying has become a serious issue with the rise in social media usage, especially among adolescents. Victims of cyberbullying often suffer from psychological distress, anxiety, depression and even suicidal tend...
详细信息
Human action recognition in videos is a critical task with significant implications for numerous applications, including surveillance, sports analytics, and healthcare. The challenge lies in creating models that are b...
详细信息
The current study presents the planning and implementation of a custom-built, Internet of Things (IoT)-based smart irrigation system for wheat cultivation that helps to combat problems such as water scarcity and ineff...
详细信息
In India, globalization and reforms in the financial sector have brought about a major overhaul of the financial landscape. The connection between financial markets and the tangible economy is now highly valued in the...
详细信息
In this paper, we study the impossibility of constructing perfect complete quantum public key encryption (QPKE) from quantumly secure one-way functions (OWFs) in a black-box manner. We show that this problem is connec...
详细信息
Digitalisation in education and its influence on teaching methods is the focus of this study, which examines the use of ChatGPT in a role-playing game used in the Cloud computing Engineering Master’s programme at the...
详细信息
Recent developments in the area of research on sign language recognition have led to making use of deep learning techniques with the goal to assist the self-learning transition of sign language from one language to an...
详细信息
ISBN:
(数字)9798350375190
ISBN:
(纸本)9798350375206
Recent developments in the area of research on sign language recognition have led to making use of deep learning techniques with the goal to assist the self-learning transition of sign language from one language to another. In order to detect and classify characters from photographs in multiple sign languages, a number of deep-learning models, have been deployed. SLR is a prominent area of study and technology that aims to mitigate speaking barriers for individuals who unable to talk and listen. This involves the development of tools capable of understanding and deciphering sign language movements, hence facilitating a wider range of interactions for those who are difficult of listening and speaking. This paper demonstrates a novel model called CNN Inception Net, which is a neural network based on convolution. The use of an Indian sign dataset enables the achievement of a notable performance rate of 98.9%, enabling precise recognition of actions in the language of signs.
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ...
详细信息
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny *** it comes to deploying IoT,everyone agrees that security is the biggest *** is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square *** research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted *** lightweight cryptography,the information sent between these gadgets may be *** order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance *** also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.
暂无评论