Worldwide Approximate count of 130 million babies were born per annum. Maintaining newborn babies is a great difficulty, mainly for first-time parents. However, intimations from experienced parents, books, and videos ...
详细信息
In telemedicine applications, it is crucial to ensure the authentication, confidentiality, and privacy of medical data due to its sensitive nature and the importance of the patient information it contains. Communicati...
详细信息
In telemedicine applications, it is crucial to ensure the authentication, confidentiality, and privacy of medical data due to its sensitive nature and the importance of the patient information it contains. Communication through open networks is insecure and has many vulnerabilities, making it susceptible to unauthorized access and misuse. Encryption models are used to secure medical data from unauthorized access. In this work, we propose a bit-level encryption model having three phases: preprocessing, confusion, and diffusion. This model is designed for different types of medical data including patient information, clinical data, medical signals, and images of different modalities. Also, the proposed model is effectively implemented for grayscale and color images with varying aspect ratios. Preprocessing has been applied based on the type of medical data. A random permutation has been used to scramble the data values to remove the correlation, and multilevel chaotic maps are fused with the cyclic redundancy check method. A circular shift is used in the diffusion phase to increase randomness and security, providing protection against potential attacks. The CRC method is further used at the receiver side for error detection. The performance efficiency of the proposed encryption model is proved in terms of histogram analysis, information entropy, correlation analysis, signal-to-noise ratio, peak signal-to-noise ratio, number of pixels changing rate, and unified average changing intensity. The proposed bit-level encryption model therefore achieves information entropy values ranging from 7.9669 to 8.000, which is close to the desired value of 8. Correlation coefficient values of the encrypted data approach to zero or are negative, indicating minimal correlation in encrypted data. Resistance against differential attacks is demonstrated by NPCR and UACI values exceeding 0.9960 and 0.3340, respectively. The key space of the proposed model is 1096, which is substantially mor
Agriculture encompasses a way of life and a profession for the general population. Most global traditions and cultures revolve around agriculture. With the help of advanced farming, agriculture may become more profita...
详细信息
Recent advancements in requirements engineering (RE) methods have increasingly leveraged machine learning (ML) algorithms to address challenging RE issues such as the identification and classification of software requ...
详细信息
Graph neural network (GNN) has gained increasing popularity in recent years owing to its capability and flexibility in modeling complex graph structure data. Among all graph learning methods, hypergraph learning is a ...
详细信息
As wafer circuit widths shrink less than 10 nm,stringent quality control is imposed on the wafer fabrication processes. Therefore, wafer residency time constraints and chamber cleaning operations are widely required i...
详细信息
As wafer circuit widths shrink less than 10 nm,stringent quality control is imposed on the wafer fabrication processes. Therefore, wafer residency time constraints and chamber cleaning operations are widely required in chemical vapor deposition, coating processes, etc. They increase scheduling complexity in cluster tools. In this paper, we focus on scheduling single-arm multi-cluster tools with chamber cleaning operations subject to wafer residency time constraints. When a chamber is being cleaned, it can be viewed as processing a virtual wafer. In this way, chamber cleaning operations can be performed while wafer residency time constraints for real wafers are not violated. Based on such a method, we present the necessary and sufficient conditions to analytically check whether a single-arm multi-cluster tool can be scheduled with a chamber cleaning operation and wafer residency time constraints. An algorithm is proposed to adjust the cycle time for a cleaning operation that lasts a long cleaning ***, algorithms for a feasible schedule are also *** an algorithm is presented for operating a multi-cluster tool back to a steady state after the cleaning. Illustrative examples are given to show the application and effectiveness of the proposed method.
Owing to massive technological developments in Internet of Things(IoT)and cloud environment,cloud computing(CC)offers a highly flexible heterogeneous resource pool over the network,and clients could exploit various re...
详细信息
Owing to massive technological developments in Internet of Things(IoT)and cloud environment,cloud computing(CC)offers a highly flexible heterogeneous resource pool over the network,and clients could exploit various resources on *** IoT-enabled models are restricted to resources and require crisp response,minimum latency,and maximum bandwidth,which are outside the *** was handled as a resource-rich solution to aforementioned *** high delay reduces the performance of the IoT enabled cloud platform,efficient utilization of task scheduling(TS)reduces the energy usage of the cloud infrastructure and increases the income of service provider via minimizing processing time of user ***,this article concentration on the design of an oppositional red fox optimization based task scheduling scheme(ORFOTSS)for IoT enabled cloud *** presented ORFO-TSS model resolves the problem of allocating resources from the IoT based cloud *** achieves the makespan by performing optimum TS procedures with various aspects of incoming *** designing of ORFO-TSS method includes the idea of oppositional based learning(OBL)as to traditional RFO approach in enhancing their efficiency.A wide-ranging experimental analysis was applied on the CloudSim *** experimental outcome highlighted the efficacy of the ORFO-TSS technique over existing approaches.
Video forgery detection has been necessary with recent spurt in fake videos like Deepfakes and doctored videos from multiple video capturing devices. In this paper, we provide a novel technique of detecting fake video...
详细信息
Fruit safety is a critical component of the global economy, particularly within the agricultural sector. There has been a recent surge in the incidence of diseases affecting fruits, leading to economic setbacks in agr...
详细信息
Multi-access edge computing has become an effective paradigm to provide offloading services for computation-intensive and delay-sensitive tasks on vehicles. However, high mobility of vehicles usually incurs spatio-tem...
详细信息
暂无评论