A key component of contemporary banking systems and e-commerce platforms is identifying fraud in online transactions. Traditional rule-based techniques are insufficient for preventing sophisticated fraud schemes becau...
详细信息
Privacy-preserving online disease prediction and diagnosis are critical issues in the emerging edge-cloud-based healthcare *** patient data pro-cessing from remote places may lead to severe privacy ***,the existing cl...
详细信息
Privacy-preserving online disease prediction and diagnosis are critical issues in the emerging edge-cloud-based healthcare *** patient data pro-cessing from remote places may lead to severe privacy ***,the existing cloud-based healthcare system takes more latency and energy consumption during diagnosis due to offloading of live patient data to remote cloud *** the privacy *** proposed research introduces the edge-cloud enabled privacy-preserving healthcare system by exploiting additive homomorphic encryption *** can help maintain the privacy preservation and confidentiality of patients’medical data during diagnosis of Parkinson’s *** addition,the energy and delay aware computational offloading scheme is proposed to minimize the uncertainty and energy consumption of end-user *** proposed research maintains the better privacy and robustness of live video data processing during prediction and diagnosis compared to existing health-care systems.
Background: The synthesis of reversible logic has gained prominence as a crucial research area, particularly in the context of post-CMOS computing devices, notably quantum computing. Objective: To implement the bitoni...
详细信息
The accurate identification of students in need is crucial for governments and colleges to allocate resources more effectively and enhance social equity and educational fairness. Existing approaches to identifying stu...
详细信息
In the current medical implications, one of the leading ocular diseases is Glaucoma which majorly damage the Optic Nerve Head (ONH) of the eye retina. The intraocular pressure of the eye leads to glaucoma, which may l...
详细信息
Photovoltaic(PV)arrays are usually installed in open areas;hence,they are vulnerable to lightning strikes that can result in cell degradation,complete damage,service disruption,and increased maintenance *** a result,i...
详细信息
Photovoltaic(PV)arrays are usually installed in open areas;hence,they are vulnerable to lightning strikes that can result in cell degradation,complete damage,service disruption,and increased maintenance *** a result,it is imperative to develop an effective and efficient lightning protection system by evaluating the transient behaviour of PV arrays during lightning *** aim is to evaluate the transient analysis of large-scale PV systems when subjected to lightning strikes using the finite difference time domain(FDTD)*** overvoltages are calculated at various points within the mounting *** optimise the FDTD method's execution time and make it more suitable for less powerful hardware,a variable cell size approach is ***,larger cell dimensions are used in the earthing system and smaller cell dimensions are used in the mounting *** FDTD method is utilised to calculate the temporal variation of transient overvoltages for large-scale PV systems under different scenarios,including variations in the striking point,soil resistivity,and the presence of a metal *** results indicate that the highest transient overvoltages occur at the striking point,and these values increase with the presence of a PV metal frame as well as with higher soil ***,a comparison is performed between the overvoltage results obtained from the FDTD approach and the partial element equivalent circuit(PEEC)method at the four corner points of the mounting systems to demonstrate the superior accuracy of the FDTD ***,a laboratory experiment is conducted on a small-scale PV system to validate the simulation *** calculated overvoltages obtained from the FDTD and PEEC methods are compared with the measured values,yielding a mean absolute error of 5%and 11%for the FDTD and PEEC methods,respectively,thereby confirming the accuracy of the FDTD simulation model.
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily *** IIoT brings us much convenience,a series of security and scalability issues r...
详细信息
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily *** IIoT brings us much convenience,a series of security and scalability issues related to permission operations rise to the surface during device ***,at present,a reliable and dynamic access control management system for IIoT is in urgent *** till now,numerous access control architectures have been proposed for ***,owing to centralized models and heterogeneous devices,security and scalability requirements still cannot be *** this paper,we offer a smart contract token-based solution for decentralized access control in IIoT ***,there are three smart contracts in our system,including the Token Issue Contract(TIC),User Register Contract(URC),and Manage Contract(MC).These three contracts collaboratively supervise and manage various events in IIoT *** also utilize the lightweight and post-quantum encryption algorithm-Nth-degree Truncated Polynomial Ring Units(NTRU)to preserve user privacy during the registration ***,to evaluate our proposed architecture's performance,we build a prototype platform that connects to the local ***,experiment results show that our scheme has achieved secure and dynamic access control for the IIoT system compared with related research.
The concept of making everything easily and widely accessible has revolutionized the network industry. Even with the rapid advancements in networks and information technology, we still have difficulty guarding against...
详细信息
Currently,e-learning is one of the most prevalent educational methods because of its need in today’s *** classrooms and web-based learning are becoming the new method of teaching *** students experience a lack of acc...
详细信息
Currently,e-learning is one of the most prevalent educational methods because of its need in today’s *** classrooms and web-based learning are becoming the new method of teaching *** students experience a lack of access to resources commonly the educational *** remote loca-tions,educational institutions face significant challenges in accessing various web-based materials due to bandwidth and network infrastructure *** objective of this study is to demonstrate an optimization and queueing tech-nique for allocating optimal servers and slots for users to access cloud-based e-learning *** proposed method provides the optimization and queue-ing algorithm for multi-server and multi-city constraints and considers where to locate the best *** optimal server selection,the Rider Optimization Algo-rithm(ROA)is utilized.A performance analysis based on time,memory and delay was carried out for the proposed methodology in comparison with the exist-ing *** proposed Rider Optimization Algorithm is compared to Par-ticle Swarm Optimization(PSO),Genetic Algorithm(GA)and Firefly Algorithm(FFA),the proposed method is more suitable and effective because the other three algorithms drop in local optima and are only suitable for small numbers of user *** the proposed method outweighs the conventional techniques by its enhanced performance over them.
Providing accurate and timely traffic information such as arriving time of train plays a significant part in intelligent train status prediction. Maximum-speed train status forecast is a significant topic as far as ra...
详细信息
暂无评论