Cloud computing becomes an important application development platform for processing user data with high *** providers are accustomed to providing storage centers outside the trusted location preferred by the data ***...
详细信息
Cloud computing becomes an important application development platform for processing user data with high *** providers are accustomed to providing storage centers outside the trusted location preferred by the data ***,ensuring the security and confidentiality of the data while processing in the centralized network is very *** secured key transmission between the sender and the receiver in the network is a huge challenge in managing most of the sensitive data transmission among the cloud *** are very active over the network like real authenticated user to hack the personal sensitive data,such as bank balance,health data,personal data,and confidential documents over the cloud *** this research,a secured key agreement between the sender and the receiver using Kerberos authentication protocol with fingerprint is proposed to ensure security in *** of patients are monitored using wireless sensor devices and are then transferred to the *** protocol helps in avoiding unnecessary communication of authenticated data over the cloud *** security process is a procedure with the best security in most of the authentication *** node is responsible in carrying data packets from the sender to the receiver in the cloud *** Kerberos protocol is used in trust node to ensure *** communication between the local health center and the healthcare server is ensured by using a fingerprint feature called minutiae form,which refers to the fingerprint image of both sender and *** computational and communicational cost of the proposed system is lesser when compared with other existing authentication methods.
Distributed Denial of Service, known as DDoS attacks, significantly compromise network security and availability. Certain DDoS detection methods utilize machine learning techniques, whereas others are based on statist...
详细信息
Previous researchers conducting Just-In-Time (JIT) defect prediction tasks have primarily focused on the performance of individual pre-trained models, without exploring the relationship between different pre-trained m...
详细信息
Fake reviews detection is a considerable challenge to the different e-commerce and online business settings. This task aims to develop such systems that could ensure the veracity of reviews. The research community has...
详细信息
Deep reinforcement learning agents have achieved unprecedented results when learning to generalize from unstructured data. However, the “black-box” nature of the trained DRL agents makes it difficult to ensure that ...
详细信息
Preventing mechanical faults in motors is often impossible, early detection of air gap eccentricity faults in induction motors is critical in preventing damage to the machine. Therefore, designing a reliable, effectiv...
详细信息
Early detection of lung cancer, liver cancer (HCC), and pancreatitis is crucial for effective treatment. This study assessed the use of laser guidance CT scans for diagnosis and staging. 26 patients of CT scan which w...
详细信息
The research volume increases at the study rate,causing massive text *** to these enormous text corpora,we are drowning in data and starving for ***,recent research employed different text mining approaches to extract...
详细信息
The research volume increases at the study rate,causing massive text *** to these enormous text corpora,we are drowning in data and starving for ***,recent research employed different text mining approaches to extract information from this text *** proposed approaches extract meaningful and precise phrases that effectively describe the text’s *** extracted phrases are commonly termed ***,these key phrases are employed to determine the different fields of study ***,these key phrases can also be used to determine the spatiotemporal trends in the various research *** this research,the progress of a research field can be better revealed through spatiotemporal bibliographic trend ***,an effective spatiotemporal trend extraction mechanism is required to disclose textile research trends of particular regions during a specific *** study collected a diversified dataset of textile research from 2011–2019 and different countries to determine the research *** data was collected from various open access ***,this research determined the spatiotemporal trends using quality *** research also focused on finding the research collaboration of different countries in a particular research *** research collaborations of other countries’researchers show the impact on import and export of those *** visualization approach is also incorporated to understand the results better.
Metamorphic testing (MT) is an effective software quality assurance method;it uses metamorphic relations (MRs) to examine the inputs and outputs of multiple test cases. Metamorphic exploration (ME) and metamorphic rob...
详细信息
One of the most challenging investigations in forensic analysis is the work conducted on smartphones. Specifically using smartphone data to provide evidence for a case is becoming a norm nowadays. Many Android device ...
详细信息
暂无评论