This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)*** steganography,a technique of embedding hidden information in digital photographs,should ideally ac...
详细信息
This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)*** steganography,a technique of embedding hidden information in digital photographs,should ideally achieve the dual purposes of maximum data hiding and maintenance of the integrity of the cover media so that it is least *** contemporary methods of steganography are at best a compromise between these *** this paper,we present our approach,entitled Ant Colony Optimization(ACO)-Least Significant Bit(LSB),which attempts to optimize the capacity in steganographic *** approach makes use of a grayscale cover image to hide the confidential data with an additional bit pair per byte,both for integrity verification and the file checksumof the secret *** approach encodes confidential information into four pairs of bits and embeds it within uncompressed grayscale *** ACO algorithm uses adaptive exploration to select some pixels,maximizing the capacity of data embedding whileminimizing the degradation of visual *** evaporation is introduced through iterations to avoid stagnation in solution *** levels of pheromone are modified to reinforce successful pixel *** results obtained through the ACO-LSB method reveal that it clearly improves image steganography capabilities by providing an increase of up to 30%in the embedding capacity compared with traditional approaches;the average Peak Signal to Noise Ratio(PSNR)is 40.5 dB with a Structural Index Similarity(SSIM)of *** approach also demonstrates very high resistance to detection,cutting down the rate by 20%.Implemented in MATLAB R2023a,the model was tested against one thousand publicly available grayscale images,thus providing robust evidence of its effectiveness.
Integrated sensing and communication (ISAC) is a promising technique to increase spectral efficiency and support various emerging applications by sharing the spectrum and hardware between these functionalities. Howeve...
详细信息
Integrated sensing and communication (ISAC) is a promising technique to increase spectral efficiency and support various emerging applications by sharing the spectrum and hardware between these functionalities. However, the traditional ISAC schemes are highly dependent on the accurate mathematical model and suffer from the challenges of high complexity and poor performance in practical scenarios. Recently, artificial intelligence (AI) has emerged as a viable technique to address these issues due to its powerful learning capabilities, satisfactory generalization capability, fast inference speed, and high adaptability for dynamic environments, facilitating a system design shift from model-driven to data-driven. Intelligent ISAC, which integrates AI into ISAC, has been a hot topic that has attracted many researchers to investigate. In this paper, we provide a comprehensive overview of intelligent ISAC, including its motivation, typical applications, recent trends, and challenges. In particular, we first introduce the basic principle of ISAC, followed by its key techniques. Then, an overview of AI and a comparison between model-based and AI-based methods for ISAC are provided. Furthermore, the typical applications of AI in ISAC and the recent trends for AI-enabled ISAC are reviewed. Finally, the future research issues and challenges of intelligent ISAC are discussed.
Research into Medicare fraud detection that utilizes machine learning methodologies is of great national interest due to the significant fiscal ramifications of this type of fraud. Our big data analysis pertains to th...
详细信息
The fast growth in Internet-of-Vehicles(IoV)applications is rendering energy efficiency management of vehicular networks a highly important *** of the existing models are failing to handle the demand for energy conser...
详细信息
The fast growth in Internet-of-Vehicles(IoV)applications is rendering energy efficiency management of vehicular networks a highly important *** of the existing models are failing to handle the demand for energy conservation in large-scale heterogeneous *** on Large Energy-Aware Fog(LEAF)computing,this paper proposes a new model to overcome energy-inefficient vehicular networks by simulating large-scale network *** main inspiration for this work is the ever-growing demand for energy efficiency in IoV-most particularly with the volume of generated data and connected *** proposed LEAF model enables researchers to perform simulations of thousands of streaming applications over distributed and heterogeneous *** the possible reasons is that it provides a realistic simulation environment in which compute nodes can dynamically join and leave,while different kinds of networking protocols-wired and wireless-can also be *** novelty of this work is threefold:for the first time,the LEAF model integrates online decision-making algorithms for energy-aware task placement and routing strategies that leverage power usage traces with efficiency optimization in *** existing fog computing simulators,data flows and power consumption are modeled as parameterizable mathematical equations in LEAF to ensure scalability and ease of analysis across a wide range of devices and *** results of evaluation show that LEAF can cover up to 98.75%of the distance,with devices ranging between 1 and 1000,showing significant energy-saving potential through A wide-area network(WAN)usage *** findings indicate great promise for fog computing in the future-in particular,models like LEAF for planning energy-efficient IoV infrastructures.
This article defines embeddings between state-based and action-based probabilistic logics which can be used to support probabilistic model checking. First, we slightly modify the model embeddings proposed in the liter...
详细信息
We present a geometric model of the differential sensitivity of the fidelity error for state transfer in a spintronic network based on the relationship between a set of matrix operators. We show an explicit dependence...
详细信息
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Rec...
详细信息
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Recognition(HAR)***,the significant computational demands and memory requirements hinder the practical deployment of deep networks in resource-constrained *** paper introduces a novel network pruning method based on the energy spectral density of data in the frequency domain,which reduces the model’s depth and accelerates activity *** traditional pruning methods that focus on the spatial domain and the importance of filters,this method converts sensor data,such as HAR data,to the frequency domain for *** emphasizes the low-frequency components by calculating their energy spectral density ***,filters that meet the predefined thresholds are retained,and redundant filters are removed,leading to a significant reduction in model size without compromising performance or incurring additional computational ***,the proposed algorithm’s effectiveness is empirically validated on a standard five-layer CNNs backbone *** computational feasibility and data sensitivity of the proposed scheme are thoroughly ***,the classification accuracy on three benchmark HAR datasets UCI-HAR,WISDM,and PAMAP2 reaches 96.20%,98.40%,and 92.38%,***,our strategy achieves a reduction in Floating Point Operations(FLOPs)by 90.73%,93.70%,and 90.74%,respectively,along with a corresponding decrease in memory consumption by 90.53%,93.43%,and 90.05%.
VPNs are vital for safeguarding communication routes in the continually changing cybersecurity ***,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorizeV...
详细信息
VPNs are vital for safeguarding communication routes in the continually changing cybersecurity ***,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorizeVPNnetwork *** present a novelVPNnetwork traffic flowclassificationmethod utilizing Artificial Neural Networks(ANN).This paper aims to provide a reliable system that can identify a virtual private network(VPN)traffic fromintrusion attempts,data exfiltration,and denial-of-service *** compile a broad dataset of labeled VPN traffic flows from various apps and usage ***,we create an ANN architecture that can handle encrypted communication and distinguish benign from dangerous *** effectively process and categorize encrypted packets,the neural network model has input,hidden,and output *** use advanced feature extraction approaches to improve the ANN’s classification accuracy by leveraging network traffic’s statistical and behavioral *** also use cutting-edge optimizationmethods to optimize network characteristics and *** suggested ANN-based categorization method is extensively tested and *** show the model effectively classifies VPN traffic *** also show that our ANN-based technique outperforms other approaches in precision,recall,and F1-score with 98.79%*** study improves VPN security and protects against new *** VPNtraffic flows effectively helps enterprises protect sensitive data,maintain network integrity,and respond quickly to security *** study advances network security and lays the groundwork for ANN-based cybersecurity solutions.
作者:
Zjavka, LadislavDepartment of Computer Science
Faculty of Electrical Engineering and Computer Science VŠB-Technical University of Ostrava 17. Listopadu 15/2172 Ostrava Czech Republic
Photovoltaic (PV) power is generated by two common types of solar components that are primarily affected by fluctuations and development in cloud structures as a result of uncertain and chaotic processes. Local PV for...
详细信息
Photovoltaic (PV) power is generated by two common types of solar components that are primarily affected by fluctuations and development in cloud structures as a result of uncertain and chaotic processes. Local PV forecasting is unavoidable in supply and load planning necessary in integration of smart systems into electrical grids. Intra- or day-ahead modelling of weather patterns based on Artificial Intelligence (AI) allows one to refine available 24 h. cloudiness forecast or predict PV production at a particular plant location during the day. AI usually gets an adequate prediction quality in shorter-level horizons, using the historical meteo- and PV record series as compared to Numerical Weather Prediction (NWP) systems. NWP models are produced every 6 h to simulate grid motion of local cloudiness, which is additionally delayed and usually scaled in a rough less operational applicability. Differential Neural Network (DNN) is based on a newly developed neurocomputing strategy that allows the representation of complex weather patterns analogous to NWP. DNN parses the n-variable linear Partial Differential Equation (PDE), which describes the ground-level patterns, into sub-PDE modules of a determined order at each node. Their derivatives are substituted by the Laplace transforms and solved using adapted inverse operations of Operation Calculus (OC). DNN fuses OC mathematics with neural computing in evolution 2-input node structures to form sum modules of selected PDEs added step-by-step to the expanded composite model. The AI multi- 1…9-h and one-stage 24-h models were evolved using spatio-temporal data in the preidentified daily learning sequences according to the applied input–output data delay to predict the Clear Sky Index (CSI). The prediction results of both statistical schemes were evaluated to assess the performance of the AI models. Intraday models obtain slightly better prediction accuracy in average errors compared to those applied in the second-day-ahead
The disappearance of Indigenous languages results in a decrease in cultural diversity, hence making the preservation of these languages extremely important. Conventional methods of documentation are lengthy, and the p...
详细信息
暂无评论