In this work, the SHA-256 mapper of the blockchain has been utilized to secure medical data from brute-force attacks. The uniform distribution and lower correlation of the encrypted data are achieved using the multi-c...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information,and these methods have made it feasible to handle a wide range of problems associated with image *** with little information or low payload are used by information embedding methods,but the goal of all contemporary research is to employ high-payload images for *** address the need for both low-and high-payload images,this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to efficiently extract characteristics from both type of *** Vector Machine(SVM),a commonplace classification technique,has been employed to determine whether the image is a stego or *** Wavelet Obtained Weights(WOW),Spatial Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Steganography(HUGO),and Minimizing the Power of Optimal Detector(MiPOD)steganography techniques are used in a variety of experimental scenarios to evaluate the performance of the *** WOW at several payloads,the proposed approach proves its classification accuracy of 98.60%.It exhibits its superiority over SOTA methods.
The upsurge in urbanization is depleting natural resources due to the wide usage of aggregates in construction, posing a menace to further progress. If the contemporary state persists, it becomes a threat for further ...
详细信息
In telemedicine applications, it is crucial to ensure the authentication, confidentiality, and privacy of medical data due to its sensitive nature and the importance of the patient information it contains. Communicati...
详细信息
In telemedicine applications, it is crucial to ensure the authentication, confidentiality, and privacy of medical data due to its sensitive nature and the importance of the patient information it contains. Communication through open networks is insecure and has many vulnerabilities, making it susceptible to unauthorized access and misuse. Encryption models are used to secure medical data from unauthorized access. In this work, we propose a bit-level encryption model having three phases: preprocessing, confusion, and diffusion. This model is designed for different types of medical data including patient information, clinical data, medical signals, and images of different modalities. Also, the proposed model is effectively implemented for grayscale and color images with varying aspect ratios. Preprocessing has been applied based on the type of medical data. A random permutation has been used to scramble the data values to remove the correlation, and multilevel chaotic maps are fused with the cyclic redundancy check method. A circular shift is used in the diffusion phase to increase randomness and security, providing protection against potential attacks. The CRC method is further used at the receiver side for error detection. The performance efficiency of the proposed encryption model is proved in terms of histogram analysis, information entropy, correlation analysis, signal-to-noise ratio, peak signal-to-noise ratio, number of pixels changing rate, and unified average changing intensity. The proposed bit-level encryption model therefore achieves information entropy values ranging from 7.9669 to 8.000, which is close to the desired value of 8. Correlation coefficient values of the encrypted data approach to zero or are negative, indicating minimal correlation in encrypted data. Resistance against differential attacks is demonstrated by NPCR and UACI values exceeding 0.9960 and 0.3340, respectively. The key space of the proposed model is 1096, which is substantially mor
Epileptic seizures are a significant agony for those who suffer from them. Epileptic studies primarily focus on understanding the abnormal behavior of brain signals. Detecting seizures in EEG signals manually is a ver...
详细信息
Spike camera is a retina-inspired neuromorphic camera which can capture dynamic scenes of high-speed motion by firing a continuous stream of spikes at an extremely high temporal resolution. The limitation in the curre...
详细信息
Fruit safety is a critical component of the global economy, particularly within the agricultural sector. There has been a recent surge in the incidence of diseases affecting fruits, leading to economic setbacks in agr...
详细信息
Recently, deep learning has been widely employed across various domains. The Convolution Neural Network (CNN), a popular deep learning algorithm, has been successfully utilized in object recognition tasks, such as fac...
详细信息
Earthquake damage prediction is crucial for ensuring the safety of building occupants and preventing substantial financial losses. Because it enables robust structural design, financial readiness, and well-timed expen...
详细信息
Earthquake damage prediction is crucial for ensuring the safety of building occupants and preventing substantial financial losses. Because it enables robust structural design, financial readiness, and well-timed expenditures in preventive measures, anticipating seismic impacts promotes sustainability and long-term building. Machine learning (ML) have transformed building damage prediction, providing efficient methodologies for assessing structural vulnerabilities and risks. ML analyzes multifaceted datasets, handling complex spatial and temporal data, enhancing accuracy in forecasting damage probabilities and enabling proactive monitoring for timely interventions. However, ensemble machine learning and the fine-tuning of such algorithms with the hyperparameter optimization with the earthquake damage prediction have not been explored in the literature yet. Hyperparameter optimization in machine learning enhances model performance and generalization capacity. Skillful adjustment of hyperparameters significantly improves predictive accuracy, resilience, and training convergence, ensuring optimal model performance across diverse datasets and real-world scenarios. This study focuses on improving earthquake damage prediction accuracy through an extensive analysis of the earthquake dataset on ensemble machine learning with hyperparameter tuning. Utilizing various hyperparameter tuning algorithms and examining five ensemble machine learning algorithms, combined with six distinct hyperparameter tuning techniques, significantly enhanced accuracy. The paper’s main contributions include exploring novel hyperparameter tuning algorithms for earthquake damage prediction and filling a knowledge gap in the field. The thorough dataset analysis revealed a scarcity of existing literature, suggesting opportunities for further research. The study underscores the critical role of hyperparameter analysis in machine learning and proposes potential applications beyond earthquake prediction,
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a few research studies have focused on the application of ML especially supervised learning techniques in Requirement engineering(RE)activities to solve the problems that occur in RE *** authors focus on the systematic mapping of past work to investigate those studies that focused on the application of supervised learning techniques in RE activities between the period of 2002–*** authors aim to investigate the research trends,main RE activities,ML algorithms,and data sources that were studied during this ***-five research studies were selected based on our exclusion and inclusion *** results show that the scientific community used 57 *** those algorithms,researchers mostly used the five following ML algorithms in RE activities:Decision Tree,Support Vector Machine,Naïve Bayes,K-nearest neighbour Classifier,and Random *** results show that researchers used these algorithms in eight major RE *** activities are requirements analysis,failure prediction,effort estimation,quality,traceability,business rules identification,content classification,and detection of problems in requirements written in natural *** selected research studies used 32 private and 41 public data *** most popular data sources that were detected in selected studies are the Metric Data Programme from NASA,Predictor Models in Software engineering,and iTrust Electronic Health Care System.
暂无评论