Tomato plants are vulnerable to different types of diseases, which can lead to significant reductions in yield and quality. Accurate and early detection is therefore crucial to mitigate these losses. This research pro...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing ac...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing across the participating entities, a malicious agent may gain access to outsourced data from the cloud environment. A malicious agent is an entity that deliberately breaches the data. This information accessed might be misused or revealed to unauthorized parties. Therefore, data protection and prediction of malicious agents have become a demanding task that needs to be addressed appropriately. To deal with this crucial and challenging issue, this paper presents a Malicious Agent Identification-based Data Security (MAIDS) Model which utilizes XGBoost machine learning classification algorithm for securing data allocation and communication among different participating entities in the cloud system. The proposed model explores and computes intended multiple security parameters associated with online data communication or transactions. Correspondingly, a security-focused knowledge database is produced for developing the XGBoost Classifier-based Malicious Agent Prediction (XC-MAP) unit. Unlike the existing approaches, which only identify malicious agents after data leaks, MAIDS proactively identifies malicious agents by examining their eligibility for respective data access. In this way, the model provides a comprehensive solution to safeguard crucial data from both intentional and non-intentional breaches, by granting data to authorized agents only by evaluating the agent’s behavior and predicting the malicious agent before granting data. The performance of the proposed model is thoroughly evaluated by accomplishing extensive experiments, and the results signify that the MAIDS model predicts the malicious agents with high accuracy, precision, recall, and F1-scores up to 95.55%, 95.30%, 95.50%, and 95.20%, respectively. This enormously enhances the system’s sec
The pandemic creates a more complicated providence of medical assistance and diagnosis procedures. In the world, Covid-19, Severe Acute Respiratory Syndrome Coronavirus-2 (SARS Cov-2), and plague are widely known...
详细信息
The pandemic creates a more complicated providence of medical assistance and diagnosis procedures. In the world, Covid-19, Severe Acute Respiratory Syndrome Coronavirus-2 (SARS Cov-2), and plague are widely known pandemic disease desperations. Due to the recent COVID-19 pandemic tragedies, various medical diagnosis models and intelligent computing solutions are proposed for medical applications. In this era of computer-based medical environment, conventional clinical solutions are surpassed by many Machine Learning and Deep Learning-based COVID-19 diagnosis models. Anyhow, many existing models are developing lab-based diagnosis environments. Notably, the Gated Recurrent Unit-based Respiratory Data Analysis (GRU-RE), Intelligent Unmanned Aerial Vehicle-based Covid Data Analysis (Thermal Images) (I-UVAC), and Convolutional Neural Network-based computer Tomography Image Analysis (CNN-CT) are enriched with lightweight image data analysis techniques for obtaining mass pandemic data at real-time conditions. However, the existing models directly deal with bulk images (thermal data and respiratory data) to diagnose the symptoms of COVID-19. Against these works, the proposed spectacle thermal image data analysis model creates an easy and effective way of disease diagnosis deployment strategies. Particularly, the mass detection of disease symptoms needs a more lightweight equipment setup. In this proposed model, each patient's thermal data is collected via the spectacles of medical staff, and the data are analyzed with the help of a complex set of capsule network functions. Comparatively, the conventional capsule network functions are enriched in this proposed model using adequate sampling and data reduction solutions. In this way, the proposed model works effectively for mass thermal data diagnosis applications. In the experimental platform, the proposed and existing models are analyzed in various dimensions (metrics). The comparative results obtained in the experiments just
The growing realm of blockchain technology has captivated researchers and practitioners alike with its promise of decentralized, secure, and transparent transactions. This paper presents a comprehensive survey and ana...
详细信息
Long Short-Term Memory (LSTM) networks are particularly useful in recommender systems since user preferences change over time. Unlike traditional recommender models which assume static user-item interactions, LSTM mod...
详细信息
The scientific community is currently very concerned about information and communication technology security because any assault or network anomaly can have a remarkable collision on a number of areas, including natio...
详细信息
Diabetes is a common disease that causes complications in the eyes known as Diabetic Retinopathy (DR). It aids in discovering the DR and tends to be the main cause behind people’s blindness amidst the previous decade...
详细信息
In light of recent incidents involving the leakage of private photographs of Hollywood celebrities from iCloud, the need for robust methods to safeguard image content has gained paramount importance. This paper addres...
详细信息
In light of recent incidents involving the leakage of private photographs of Hollywood celebrities from iCloud, the need for robust methods to safeguard image content has gained paramount importance. This paper addresses this concern by introducing a novel framework for reversible image editing (RIT) supported by reversible data hiding with encrypted images (RDH-EI) techniques. Unlike traditional approaches vulnerable to hacking, this framework ensures both efficient and secure data embedding while maintaining the original image’s privacy. The framework leverages two established methods: secret writing and knowledge activity. While secret writing is susceptible to hacking due to the complex nature of cipher languages, RDH-EI-supported RIT adopts a more secure approach. It replaces the linguistic content of the original image with the semantics of a different image, rendering the encrypted image visually indistinguishable from a plaintext image. This novel substitution prevents cloud servers from detecting encrypted data, enabling the adoption of reversible data hiding (RDH) methods designed for plaintext images. The proposed framework offers several distinct advantages. Firstly, it ensures the confidentiality of sensitive information by concealing the linguistic content of the original image. Secondly, it supports reversible image editing, enabling the restoration of the original image from the encrypted version without any loss of data. Lastly, the integration of RDH techniques designed for plaintext images empowers the cloud server to embed supplementary data while preserving image quality. Incorporating convolutional neural network (CNN) and generative adversarial network (GAN) models, the framework ensures accurate data extraction and high-quality image restoration. The applications of this concealed knowledge are vast, spanning law enforcement, medical data privacy, and military communication. By addressing limitations of previous methods, it opens new avenues
Automatic guided vehicles(AGVs)are extensively employed in manufacturing workshops for their high degree of automation and *** paper investigates a limited AGV scheduling problem(LAGVSP)in matrix manufacturing worksho...
详细信息
Automatic guided vehicles(AGVs)are extensively employed in manufacturing workshops for their high degree of automation and *** paper investigates a limited AGV scheduling problem(LAGVSP)in matrix manufacturing workshops with undirected material flow,aiming to minimize both total task delay time and total task completion *** address this LAGVSP,a mixed-integer linear programming model is built,and a nondominated sorting genetic algorithm II based on dual population co-evolution(NSGA-IIDPC)is *** NSGA-IIDPC,a single population is divided into a common population and an elite population,and they adopt different evolutionary strategies during the evolution *** dual population co-evolution mechanism is designed to accelerate the convergence of the non-dominated solution set in the population to the Pareto front through information exchange and competition between the two *** addition,to enhance the quality of initial population,a minimum cost function strategy based on load balancing is *** local search operators based on ideal point are proposed to find a better local *** improve the global exploration ability of the algorithm,a dual population restart mechanism is *** tests and comparisons with other algorithms are conducted to demonstrate the effectiveness of NSGA-IIDPC in solving the LAGVSP.
The use of blockchain technology is meant to revolutionize the way in which traditional systems work. This technology has paved way for more secure solutions thereby leveraging the concepts of data privacy and authent...
详细信息
暂无评论