Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encrypt...
详细信息
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encryption and decryption algorithms are being *** cloud computation,data processing,storage,and transmission can be done through laptops andmobile *** Storing in cloud facilities is expanding each day and data is the most significant asset of *** important concern with the transmission of information to the cloud is security because there is no perceivability of the client’s *** have to be dependent on cloud service providers for assurance of the platform’s *** security and privacy issues reduce the progression of cloud computing and add ***;most of the data that is stored on cloud servers is in the form of images and photographs,which is a very confidential form of data that requires secured *** this research work,a public key cryptosystem is being implemented to store,retrieve and transmit information in cloud computation through a modified Rivest-Shamir-Adleman(RSA)algorithm for the encryption and decryption of *** implementation of a modified RSA algorithm results guaranteed the security of data in the cloud *** enhance the user data security level,a neural network is used for user authentication and ***;the proposed technique develops the performance of detection as a loss function of the bounding *** Faster Region-Based Convolutional Neural Network(Faster R-CNN)gets trained on images to identify authorized users with an accuracy of 99.9%on training.
The exchange of multimedia data is secured using watermarking. Typically, embedding a watermark involves optimising scheme parameters, frequently by using meta-heuristic optimization methods. Despite the fact that DNN...
详细信息
Image captioning has gained increasing attention in recent *** characteristics found in input images play a crucial role in generating high-quality *** studies have used visual attention mechanisms to dynamically focu...
详细信息
Image captioning has gained increasing attention in recent *** characteristics found in input images play a crucial role in generating high-quality *** studies have used visual attention mechanisms to dynamically focus on localized regions of the input image,improving the effectiveness of identifying relevant image regions at each step of caption ***,providing image captioning models with the capability of selecting the most relevant visual features from the input image and attending to them can significantly improve the utilization of these ***,this leads to enhanced captioning network *** light of this,we present an image captioning framework that efficiently exploits the extracted representations of the *** framework comprises three key components:the Visual Feature Detector module(VFD),the Visual Feature Visual Attention module(VFVA),and the language *** VFD module is responsible for detecting a subset of the most pertinent features from the local visual features,creating an updated visual features ***,the VFVA directs its attention to the visual features matrix generated by the VFD,resulting in an updated context vector employed by the language model to generate an informative *** the VFD and VFVA modules introduces an additional layer of processing for the visual features,thereby contributing to enhancing the image captioning model’s *** the MS-COCO dataset,our experiments show that the proposed framework competes well with state-of-the-art methods,effectively leveraging visual representations to improve *** implementation code can be found here:https://***/althobhani/VFDICM(accessed on 30 July 2024).
The proliferation of physical objects and intelligent systems, along with their inherent differences, such as levels of device mobility, generated data volume, required storage memory, and complexity in data processin...
详细信息
Autism Spectrum Disorder(ASD)requires a precise diagnosis in order to be managed and ***-invasive neuroimaging methods are disease markers that can be used to help diagnose *** majority of available techniques in the ...
详细信息
Autism Spectrum Disorder(ASD)requires a precise diagnosis in order to be managed and ***-invasive neuroimaging methods are disease markers that can be used to help diagnose *** majority of available techniques in the literature use functional magnetic resonance imaging(fMRI)to detect ASD with a small dataset,resulting in high accuracy but low *** supervised machine learning classification algorithms such as support vector machines function well with unstructured and semi structured data such as text,images,and videos,but their performance and robustness are restricted by the size of the accompanying training *** learning on the other hand creates an artificial neural network that can learn and make intelligent judgments on its own by layering *** takes use of plentiful low-cost computing and many approaches are focused with very big datasets that are concerned with creating far larger and more sophisticated neural *** modelling,also known as Generative Adversarial Networks(GANs),is an unsupervised deep learning task that entails automatically discovering and learning regularities or patterns in input data in order for the model to generate or output new examples that could have been drawn from the original *** are an exciting and rapidly changingfield that delivers on the promise of generative models in terms of their ability to generate realistic examples across a range of problem domains,most notably in image-to-image translation tasks and hasn't been explored much for Autism spectrum disorder prediction in the *** this paper,we present a novel conditional generative adversarial network,or cGAN for short,which is a form of GAN that uses a generator model to conditionally generate *** terms of prediction and accuracy,they outperform the standard *** pro-posed model is 74%more accurate than the traditional methods and takes only around 10 min for training even with a huge dat
Internet of Things(IoT)is the most widespread and fastest growing technology *** to the increasing of IoT devices connected to the Internet,the IoT is the most technology under security *** IoT devices are not designe...
详细信息
Internet of Things(IoT)is the most widespread and fastest growing technology *** to the increasing of IoT devices connected to the Internet,the IoT is the most technology under security *** IoT devices are not designed with security because they are resource constrained ***,having an accurate IoT security system to detect security attacks is *** Detection Systems(IDSs)using machine learning and deep learning techniques can detect security attacks *** paper develops an IDS architecture based on Convolutional Neural Network(CNN)and Long Short-Term Memory(LSTM)deep learning *** implement our model on the UNSW-NB15 dataset which is a new network intrusion dataset that cate-gorizes the network traffic into normal and attacks *** this work,interpolation data preprocessing is used to compute the missing ***,the imbalanced data problem is solved using a synthetic data generation *** experiments have been implemented to compare the performance results of the proposed model(CNN+LSTM)with a basic model(CNN only)using both balanced and imbalanced ***,with some state-of-the-art machine learning classifiers(Decision Tree(DT)and Random Forest(RF))using both balanced and imbalanced *** results proved the impact of the balancing *** proposed hybrid model with the balance technique can classify the traffic into normal class and attack class with reasonable accuracy(92.10%)compared with the basic CNN model(89.90%)and the machine learning(DT 88.57%and RF 90.85%)***,comparing the proposed model results with the most related works shows that the proposed model gives good results compared with the related works that used the balance techniques.
A lot of research shows that there could be several reasons why the duality of agricultural products has been reduced. Plant diseases make up one of the most important components of this quality. Therefore, the reduct...
详细信息
The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized *** detection is one of the key methodologies utilized to ensure the security...
详细信息
The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized *** detection is one of the key methodologies utilized to ensure the security of the *** intrusion detection mechanisms have issues such as higher misclassification rates,increased model complexity,insignificant feature extraction,increased training time,increased run time complexity,computation overhead,failure to identify new attacks,increased energy consumption,and a variety of other factors that limit the performance of the intrusion system *** this research a security framework for WSN-IoT,through a deep learning technique is introduced using Modified Fuzzy-Adaptive DenseNet(MF_AdaDenseNet)and is benchmarked with datasets like NSL-KDD,UNSWNB15,CIDDS-001,Edge IIoT,Bot *** this,the optimal feature selection using Capturing Dingo Optimization(CDO)is devised to acquire relevant features by removing redundant *** proposed MF_AdaDenseNet intrusion detection model offers significant benefits by utilizing optimal feature selection with the CDO *** results in enhanced Detection Capacity with minimal computation complexity,as well as a reduction in False Alarm Rate(FAR)due to the consideration of classification error in the fitness *** a result,the combined CDO-based feature selection and MF_AdaDenseNet intrusion detection mechanism outperform other state-of-the-art techniques,achieving maximal Detection Capacity,precision,recall,and F-Measure of 99.46%,99.54%,99.91%,and 99.68%,respectively,along with minimal FAR and Mean Absolute Error(MAE)of 0.9%and 0.11.
Social Networks are an integral part of our daily life. These networks are tools for sharing information among different users. In such a network, the most influential users become the source for disseminating informa...
详细信息
This paper proposes a novel optimized histogram equalization technique using a genetic algorithm (GA) for brightness-preserved contrast enhancement. This method optimizes the histogram equalization technique to extrac...
详细信息
暂无评论