This paper proposes a new score function (SF) of interval-valued intuitionistic fuzzy values (IVIFVs) in order to overcome the shortcomings of the existing SFs of IVIFVs, which are not be able to distinguish the ranki...
详细信息
Feature selection is a cornerstone in advancing the accuracy and efficiency of predictive models, particularly in nuanced domains like socio-economic analysis. This study explores nine distinct feature selection metho...
详细信息
To ensure the privacy, integrity, and security of the user data and to prevent the unauthorized access of data by illegal users in the blockchain storage system is significant. Blockchain networks are widely used for ...
详细信息
To ensure the privacy, integrity, and security of the user data and to prevent the unauthorized access of data by illegal users in the blockchain storage system is significant. Blockchain networks are widely used for the authentication of data between the data user and the data owner. However, blockchain networks are vulnerable to potential privacy risks and security issues concerned with the data transfer and the logging of data transactions. To overcome these challenges and enhance the security associated with blockchain storage systems, this research develops a highly authenticated secure blockchain storage system utilizing a rider search optimized deep Convolution Neural Network(CNN) model. The architecture integrates the Ethereum blockchain, Interplanetary File System (IPFS), data users, and owners, in which the Smart contracts eliminate intermediaries, bolstering user-owner interactions. In tandem, blockchain ensures immutable transaction records, and merging IPFS with blockchain enables off-chain, distributed storage of data, with hash records on the blockchain. The research accomplishes privacy preservation through six-phase network development: system establishment, registration, encryption, token generation, testing, and decryption. Parameters for secure transactions are initialized, user registration provides genuine user transaction credentials, and encryption guarantees data security, employing optimized Elliptic Curve Cryptography (ECC). Further, the optimized ECC algorithm is developed utilizing a novel rider search optimization that utilizes search and rescue characteristics of human, and rider characteristics for determining the shorter key lengths. Token generation involves issuing digital tokens on a blockchain platform, followed by testing using a deep CNN classifier to detect anomalies and prevent unauthorized data access during the test phase. The decryption of data is conducted for registered users. The developed rider search optimized deep CN
Diabetic foot ulcer (DFU) is a potentially fatal complication of diabetes. Traditional techniques of DFU analysis and therapy are more time-consuming and costly. Artificial intelligence (AI), particularly deep neural ...
详细信息
The advent of precision agriculture is disrupting traditional farming practices, leading to a significant increase in the data flow. However, current anomaly detection methods overlook the impact of concept drift. The...
详细信息
Brain tumors are very dangerous as they cause death. A lot of people die every year because of brain tumors. Therefore, accurate classification and detection in the early stages can help in recovery. Various deep lear...
详细信息
This study introduces an innovative approach to optimize cloud computing job distribution using the Improved Dynamic Johnson Sequencing Algorithm(DJS).Emphasizing on-demand resource sharing,typical to Cloud Service Pr...
详细信息
This study introduces an innovative approach to optimize cloud computing job distribution using the Improved Dynamic Johnson Sequencing Algorithm(DJS).Emphasizing on-demand resource sharing,typical to Cloud Service Providers(CSPs),the research focuses on minimizing job completion delays through efficient task *** Johnson’s rule from operations research,the study addresses the challenge of resource availability post-task *** advocates for queuing models with multiple servers and finite capacity to improve job scheduling models,subsequently reducing wait times and queue *** Dynamic Johnson Sequencing Algorithm and the M/M/c/K queuing model are applied to optimize task sequences,showcasing their efficacy through comparative *** research evaluates the impact of makespan calculation on data file transfer times and assesses vital performance indicators,ultimately positioning the proposed technique as superior to existing approaches,offering a robust framework for enhanced task scheduling and resource allocation in cloud computing.
Enterprise Resource Planning (ERP) systems have become essential instruments in contemporary corporate operations, offering significant benefits in process optimization and efficient data management. The assurance of ...
详细信息
Unusual crowd analysis is an important problem in surveillance video due to their features cannot be extracted efficiently on the crowd scenes. To overcome this challenge, this paper introduced the appearance and moti...
详细信息
The rise of online social network (OSN) platforms has revealed pivotal issues with regards to data transparency and the concerns on the user's consent. Users are barely aware of how their data is used. To this end...
详细信息
暂无评论