Manufacturers must be able to figure out the most suitable technique capable of generating rapid and accurate performance when developing a precise modelling approach for the development of an efficient machining proc...
详细信息
A Speech Emotion Recognition (SER) through voice is a topic of significant interest, particularly in the field of psychology. This is due to the considerable potential of SER. Machine learning algorithms are constantl...
详细信息
In this technology and automation era, blockchain technology travels in the direction of consistent studies and adoption in different sectors. Blockchain technology with a chain of the block provides security and esta...
详细信息
The traditional system of issue reporting has heavily relied on manual processes that require users to register their complaints with the authorities. This method is time-consuming and often results in inefficiencies ...
详细信息
In today’s fast-paced world, people have hectic lives. Almost everyone faces the challenge of taking their medicines on time, enduring lengthy waits for lab reports, people face challenges in managing their medical r...
详细信息
The rapid growth of smart cities, healthcare monitoring, and environmental sensing relies heavily on the real-time data processing capabilities of Wireless Sensor Networks (WSNs). However, these networks face signific...
详细信息
Credit card fraud detection is an increasingly critical issue due to the growth of digital transactions and the sophistication of fraudulent activities. This study proposes a hybrid framework combining Graph Neural Ne...
详细信息
Numerous disorders that cannot be diagnosed medically have emerged throughout the world, including Autism Spectrum Disorder (ASD). It impacts on the numerous aspects of behavior, such as social and language abilities ...
详细信息
Recently, cloud computing research, especially Virtual Machine based replication schemes and their applications, were becoming prevalent. A cloud data center (DC) comprises of hosts with an enormous of virtual machine...
详细信息
Nowadays,numerous applications are associated with cloud and user data gets collected globally and stored in cloud *** addition to shared data storage,cloud computing technique offers multiple advantages for the user ...
详细信息
Nowadays,numerous applications are associated with cloud and user data gets collected globally and stored in cloud *** addition to shared data storage,cloud computing technique offers multiple advantages for the user through different distribution designs like hybrid cloud,public cloud,community cloud and private *** cloud-based computing solutions are highly con-venient to the users,it also brings a challenge i.e.,security of the data ***,in current research paper,blockchain with data integrity authentication technique is developed for an efficient and secure operation with user authentica-tion *** technology is utilized in this study to enable efficient and secure operation which not only empowers cloud security but also avoids threats and ***,the data integrity authentication technique is also uti-lized to limit the unwanted access of data in cloud storage *** major objec-tive of the projected technique is to empower data security and user authentication in cloud computing *** improve the proposed authentication pro-cess,cuckoofilter and Merkle Hash Tree(MHT)are *** proposed meth-odology was validated using few performance metrics such as processing time,uploading time,downloading time,authentication time,consensus time,waiting time,initialization time,in addition to storage *** proposed method was compared with conventional cloud security techniques and the outcomes establish the supremacy of the proposed method.
暂无评论