Electrical power systems are increasingly adopting DC-based loads like Electric Vehicles, DC-based energy sources like solar photovoltaic panels, and battery energy storage systems (BESS). This increasingly necessitat...
详细信息
Blockchain is a pillar in 4IR (4th Industrial Revolution) of the digital world. Selection of the right blockchain platform, for anonymity, is a challenge that can be overcome while getting acknowledged how anonymous a...
详细信息
Owing to the challenge of target occlusion leading to tracking failure during the target tracking process, achieving efficient and robust tracking of targets under occlusion scenarios has become a focal point of resea...
详细信息
Hand devices provides a huge barrier between convenient and user friendly Human-computer Interaction (HCI). There is a strong need for marker-less natural interface between human and computer that can also facilitate ...
详细信息
State-of-the-art lithium-ion battery state estimation techniques, including state-of-charge, state-of-health, and remaining useful life in battery management systems (BMS), are extensively dependent on equivalent elec...
详细信息
The exponential growth of data necessitates an effective data storage scheme,which helps to effectively manage the large quantity of *** accomplish this,Deoxyribonucleic Acid(DNA)digital data storage process can be em...
详细信息
The exponential growth of data necessitates an effective data storage scheme,which helps to effectively manage the large quantity of *** accomplish this,Deoxyribonucleic Acid(DNA)digital data storage process can be employed,which encodes and decodes binary data to and from synthesized strands of *** quantization(VQ)is a commonly employed scheme for image compression and the optimal codebook generation is an effective process to reach maximum compression *** article introduces a newDNAComputingwithWater StriderAlgorithm based Vector Quantization(DNAC-WSAVQ)technique for Data Storage *** proposed DNAC-WSAVQ technique enables encoding data using DNA computing and then compresses it for effective data ***,the DNAC-WSAVQ model initially performsDNA encoding on the input images to generate a binary encoded *** addition,aWater Strider algorithm with Linde-Buzo-Gray(WSA-LBG)model is applied for the compression process and thereby storage area can be considerably *** order to generate optimal codebook for LBG,the WSA is applied to *** performance validation of the DNAC-WSAVQ model is carried out and the results are inspected under several *** comparative study highlighted the improved outcomes of the DNAC-WSAVQ model over the existing methods.
Systems for managing water supplies are intricate, requiring a range of models to manage water resources efficiently. These models can be designed and manipulated using a Model-Driven Architecture (MDA), which will in...
详细信息
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the...
详细信息
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the challenges of security risks and data analysis *** IIoT grows,cyber-attacks become more diverse and complex,making existing anomaly detection models less effective to *** this paper,an ensemble deep learning model that uses the benefits of the Long Short-Term Memory(LSTM)and the AutoEncoder(AE)architecture to identify out-of-norm activities for cyber threat hunting in IIoT is *** this model,the LSTM is applied to create a model on normal time series of data(past and present data)to learn normal data patterns and the important features of data are identified by AE to reduce data *** addition,the imbalanced nature of IIoT datasets has not been considered in most of the previous literature,affecting low accuracy and *** solve this problem,the proposed model extracts new balanced data from the imbalanced datasets,and these new balanced data are fed into the deep LSTM AE anomaly detection *** this paper,the proposed model is evaluated on two real IIoT datasets-Gas Pipeline(GP)and Secure Water Treatment(SWaT)that are imbalanced and consist of long-term and short-term dependency on *** results are compared with conventional machine learning classifiers,Random Forest(RF),Multi-Layer Perceptron(MLP),Decision Tree(DT),and Super Vector Machines(SVM),in which higher performance in terms of accuracy is obtained,99.3%and 99.7%based on GP and SWaT datasets,***,the proposed ensemble model is compared with advanced related models,including Stacked Auto-Encoders(SAE),Naive Bayes(NB),Projective Adaptive Resonance Theory(PART),Convolutional Auto-Encoder(C-AE),and Package Signatures(PS)based LSTM(PS-LSTM)model.
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled *** addition,they have been deployed in civilian critical infrastructure *** this environment,real-time and...
详细信息
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled *** addition,they have been deployed in civilian critical infrastructure *** this environment,real-time and massive data is exchanged between the aerial vehicles and the ground control *** on the mission of these aerial vehicles,some of the collected and transmitted data is sensitive and ***,many security protocols have been presented to offer privacy and security ***,majority of these schemes fail to consider attack vectors such as side-channeling,de-synchronization and known secret session temporary information *** last attack can be launched upon adversarial physical capture of these *** addition,some of these protocols deploy computationally intensive asymmetric cryptographic primitives that result in high *** this paper,an authentication protocol based on lightweight quadratic residues and hash functions is *** formal security analysis is executed using the widely deployed random oracle *** addition,informal security analysis is carried out to show its robustness under the Dolev–Yao(DY)and Canetti–Krawczyk(CK)threat *** terms of operational efficiency,it is shown to have relatively lower execution time,communication costs,and incurs the least storage costs among other related ***,the proposed protocol provides a 25%improvement in supported security and privacy features and a 6.52%reduction in storage *** overall,the proposed methodology offers strong security and privacy protection at lower execution time,storage and communication overheads.
暂无评论