Vehicle-to-everything (V2X) communication is crucial in Intelligent Transportation Systems (ITSs) for enhancing road safety, traffic efficiency, and convenience. To address the need for trust in V2X communications, a ...
详细信息
In recent days, a wireless body area network (WBAN) has been developed as part of the Internet of Things (IoT) with sensors and actuators in three different modes, building its network, i.e., in-body sensors, wearable...
详细信息
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop...
详细信息
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this ***,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its ***,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation ***,it is used toward secure communication application *** it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)***,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance.
With the exponential increase in data consumption from activities like streaming, gaming, and IoT applications, existing network infrastructure is under significant strain. To address the growing demand for higher dat...
详细信息
The non-intrusive detection of Autism Spectrum Disorder (ASD) marks a significant advancement in early diagnosis and intervention. This approach allows users to upload videos to a web interface, where visual and audit...
详细信息
The adoption of the technology of smart contracts to construct an e-appointment system has an array of advantages over conventional appointment systems. E-appointment system commitments can be instantly conducted and ...
详细信息
The landscape of the Internet of Things is evolving rapidly. The security and efficiency of data handling and device management are multifaceted and complex problems, which are only exacerbated by the huge volumes of ...
详细信息
ISBN:
(纸本)9798350387490
The landscape of the Internet of Things is evolving rapidly. The security and efficiency of data handling and device management are multifaceted and complex problems, which are only exacerbated by the huge volumes of data and the sprawling growth of IoT deployments. The goal of this paper is to outline innovative solutions to the most pressing issues in the field through the use of advanced cryptographic protocols and scalable management systems. The integrity and maintainability of IoT ecosystems face threats not only from quantum-capable attackers but also from vendor lock-in, which necessitates special attention. First, the Secure Data Retrieval Encryption system will be presented, which is based on the Learning with Errors assumptions, Self-Managed Public Key Infrastructure, Next-generation Hashed Elliptic Curve Protocol, and Dynamic Unclonable Physical Properties. In a single round of queries, SDRE enables forward security and efficient searches defined by authorized clients. This work presents a distinctive innovation. Initially, the search process was accelerated greatly, and the data being transmitted and decrypted was implemented based on secure computation. In addition, the Self-Managed Public Key Infrastructure protocol is a simple and standard-acquiescent answer for changing control between IoT service providers. SMS-PKI seeks to diminish this necessity of manual effort, especially in light of the massive upsurge in IoT deployments. SM-PKI also mechanizes the IoT PKI credentials updating and trusted domains process, allowing multiple domains to be run on one client apparatus. Tamarin is used to prove security and efficiency, which demonstrates the necessity of using SM-PKI to maintain desired security properties with the minimal cost and device overhead. Finally, a universal authentication scheme grounded on edge computing and involving Next-generation Hashed Elliptic Curve Protocol and Dynamic Unclonable Physical Properties will be shown. This approach
Gliomas are aggressive brain tumors known for their heterogeneity,unclear borders,and diverse locations on Magnetic Resonance Imaging(MRI)*** factors present significant challenges for MRI-based segmentation,a crucial...
详细信息
Gliomas are aggressive brain tumors known for their heterogeneity,unclear borders,and diverse locations on Magnetic Resonance Imaging(MRI)*** factors present significant challenges for MRI-based segmentation,a crucial step for effective treatment planning and monitoring of glioma *** study proposes a novel deep learning framework,ResNet Multi-Head Attention U-Net(ResMHA-Net),to address these challenges and enhance glioma segmentation ***-Net leverages the strengths of both residual blocks from the ResNet architecture and multi-head attention *** powerful combination empowers the network to prioritize informative regions within the 3D MRI data and capture long-range *** doing so,ResMHANet effectively segments intricate glioma sub-regions and reduces the impact of uncertain tumor *** rigorously trained and validated ResMHA-Net on the BraTS 2018,2019,2020 and 2021 ***,ResMHA-Net achieved superior segmentation accuracy on the BraTS 2021 dataset compared to the previous years,demonstrating its remarkable adaptability and robustness across diverse ***,we collected the predicted masks obtained from three datasets to enhance survival prediction,effectively augmenting the dataset *** features were then extracted from these predicted masks and,along with clinical data,were used to train a novel ensemble learning-based machine learning model for survival *** model employs a voting mechanism aggregating predictions from multiple models,leading to significant improvements over existing *** ensemble approach capitalizes on the strengths of various models,resulting in more accurate and reliable predictions for patient ***,we achieved an impressive accuracy of 73%for overall survival(OS)prediction.
Artificial intelligence (AI) applications in forestry as well as wildlife domains have become more feasible due to the advancements in data science and digital and satellite technologies. However, there is a serious g...
详细信息
The following paper proposes the SISRR framework for knowledge centric, semantically inclined, framework for software requirement recommendations. This framework is intelligent driven by integrating semantically incli...
详细信息
暂无评论