This research work aims to create an Augmented Reality (AR) based android app that can project the dimensions of an automobile in the real world and recognize voice commands to operate functions like opening car doors...
详细信息
In this generation, social media platforms such as Twitter, Instagram and also e-commerce websites have become an integral part of our society. Social media is used for communication and it is also a platform where th...
详细信息
Strong protection against cyber threats is ensured by forensic analysis and cloud environment security being reinforced by the use of real-time threat detection and advanced encryption *** existing approach struggles ...
详细信息
ISBN:
(纸本)9798331508845
Strong protection against cyber threats is ensured by forensic analysis and cloud environment security being reinforced by the use of real-time threat detection and advanced encryption *** existing approach struggles to keep up with changing cyber threats and lack the strategic thinking skills necessary to address new security issues. To overcome these drawbacks, this work presents a novel method that maximizes security and forensic analysis in cloud-based settings by fusing blockchain technology, the game theory, and recursive Gated Recurrent Unit (GRU) models. The behavioral analytic capabilities of the recursive GRU models are especially helpful for detecting patterns and anomalies in security-related cloud logs, as evidenced by the UNW-NB15 dataset. Its flexibility is essential for identifying changing cyber threats and identifying anomalous user behavior. Using blockchain technology to create a decentralized, immutable ledger helps to mitigate data integrity issues that may arise from forensic investigation in cloud environments. This ledger guarantees the accuracy of data for forensic examinations, and smart contracts which come with built-in security features automate access controls and security issue remedies. Because blockchain is decentralized, it reduces individual points of failure, which improves the security of cloud infrastructure as a whole. By synchronizing security occurrences in real-time with the blockchain, the proposed connection creates a reliable and unchangeable record. Programmed intelligent agreements respond quickly to security incidents by issuing alerts or executing specified actions, as detected by the recursive GRU model. Through the use of continuous learning techniques, the model continuously adjusts to new data, improving its comprehension of both common and uncommon tendencies based on security incidents recorded on the blockchain. In cloud environments, this approach seeks to improve safety, openness, and effectiven
Recently,smart cities have emerged as an effective approach to deliver high-quality services to the people through adaptive optimization of the available *** the advantages of smart cities,security remains a huge chal...
详细信息
Recently,smart cities have emerged as an effective approach to deliver high-quality services to the people through adaptive optimization of the available *** the advantages of smart cities,security remains a huge challenge to be ***,Intrusion Detection System(IDS)is the most proficient tool to accomplish security in this ***,blockchain exhibits significance in promoting smart city designing,due to its effective characteristics like immutability,transparency,and *** order to address the security problems in smart cities,the current study designs a Privacy Preserving Secure Framework using Blockchain with Optimal Deep Learning(PPSF-BODL)*** proposed PPSFBODL model includes the collection of primary data using sensing ***,z-score normalization is also utilized to transform the actual data into useful ***,Chameleon Swarm Optimization(CSO)with Attention Based Bidirectional Long Short TermMemory(ABiLSTM)model is employed for detection and classification of *** is employed for optimal hyperparameter tuning of ABiLSTM *** the same time,Blockchain(BC)is utilized for secure transmission of the data to cloud *** cloud server is a decentralized,distributed,and open digital ledger that is employed to store the transactions in different methods.A detailed experimentation of the proposed PPSF-BODL model was conducted on benchmark dataset and the outcomes established the supremacy of the proposed PPSFBODL model over recent approaches with a maximum accuracy of 97.46%.
The medical services industry is on the cusp of another period driven by the union of distributed computing, man-made consciousness (simulated intelligence), and the Ayushman Bharat Wellbeing Record (ABHA) card drive....
详细信息
Artificial intelligence (AI) models are increasingly finding applications in the field of medicine. Concerns have been raised about the explainability of the decisions that are made by these AI models. In this article...
详细信息
Weeds refer to plants that a farmer does not intentionally cultivate because they interfere with or limit the growth and yield of crops. Due to their fast reproduction and spreading, weeds are well-known for quickly i...
详细信息
This paper compares video and audio QoE of OFDMA multi-user transmission and reliable groupcast over wireless LAN. We assume video and audio transmission to several terminals simultaneously. As a reliable groupcast me...
详细信息
The exponential growth in networked systems, such as entertainment streaming services, has necessitated advancements in network performance. Traditional singlepath routing often results in bottlenecks and inefficienci...
详细信息
The Internet of Medical Things IoMT has grown rapidly due to the growing popularity of wearable technology and its applications in health monitoring systems. The IoMT significantly reduces the death rate by facilitati...
详细信息
暂无评论