Mental-image based spatiotemporal (4D) language understanding in human was considered from the viewpoint of cognitive science and simulated based on the mental image model proposed in mental image directed semantic th...
详细信息
Routing in mobile wireless sensor network is a challenging task. Due to mobility of the nodes the topology of the sensor network keeps changing continuously. In this paper an energy efficient routing protocol for mobi...
详细信息
In today's digital era, cryptographic algorithms play a vital role in safeguarding sensitive information, maintaining confidentiality, and defending against cyberattacks. With the growing variety of encryption met...
详细信息
Distance estimation of moving objects from the camera with accuracy is a challenging task in the digital era where human interaction increases with smart systems and state-of-The-Art applications. The wide-ranging app...
详细信息
Hoeffding tree is a method to incrementally build decision trees. A common approach to handle numerical attributes in Hoeffding trees is to represent their sufficient statistics as Gaussian distributions. Our contribu...
详细信息
In this paper, we focus on semantic-aware computation offloading for executing the deep neural network (DNN) inference tasks in a mobile edge computing (MEC) system. To cope with the challenges of insufficient wireles...
详细信息
The primary factors contributing to mortality in the human population encompass a range of interrelated medical conditions, such as cardiovascular disease (CVD) and associated comorbidities. The main aim of the study ...
详细信息
This research paper targets to look at the usage of machine gaining knowledge of techniques and algorithms in terms of massive statistics retrieval overall performance. Specifically, this paper explores the efficacy o...
详细信息
This survey aims to identify hazards associated with the Internet of Things (IoT), focusing on malware that can infiltrate various devices, applications, and systems within the Industrial Internet of Things (IIoT). Su...
详细信息
The Cloud Computing Environment(CCE)developed for using the dynamic cloud is the ability of software and services likely to grow with any *** has transformed the methodology for storing the enterprise data,accessing t...
详细信息
The Cloud Computing Environment(CCE)developed for using the dynamic cloud is the ability of software and services likely to grow with any *** has transformed the methodology for storing the enterprise data,accessing the data,and Data Sharing(DS).Big data frame a constant way of uploading and sharing the cloud data in a hierarchical architecture with different kinds of separate privileges to access the *** the requirement of vast volumes of storage area in the CCEs,capturing a secured data access framework is an important *** paper proposes an Improved Secure Identification-based Multilevel Structure of Data Sharing(ISIMSDS)to hold the DS of big data in *** complex file partitioning technique is proposed to verify the access privilege context for sharing data in complex *** access control Encryption Method(EM)is used to improve the *** Complexity is measured to increase the authentication *** active attack is protected using this ISIMSDS *** proposed ISIMSDS method assists in diminishing the Complexity whenever the user’s population is increasing *** security analysis proves that the proposed ISIMSDS methodology is more secure against the chosen-PlainText(PT)attack and provides more efficient computation and storage space than the related *** performance of the proposed ISIMSDS methodology provides more efficiency in communication costs such as encryption,decryption,and retrieval of the data.
暂无评论