The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE service...
详细信息
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the *** IoE-based cloud computing services are located at remote locations without the control of the data *** data owners mostly depend on the untrusted Cloud Service Provider(CSP)and do not know the implemented security *** lack of knowledge about security capabilities and control over data raises several security *** Acid(DNA)computing is a biological concept that can improve the security of IoE big *** IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol(StS KAP)and Feistel cipher *** paper proposed a DNA-based cryptographic scheme and access control model(DNACDS)to solve IoE big data security and access *** experimental results illustrated that DNACDS performs better than other DNA-based security *** theoretical security analysis of the DNACDS shows better resistance capabilities.
Roads, serving as vital transportation routes, undergo wear due to heavy usage and environmental factors, necessitating regular maintenance. However, neglect or the impracticality of monitoring every location often re...
详细信息
Images obtained from hyperspectral sensors provide information about the target area that extends beyond the visible portions of the electromagnetic ***,due to sensor limitations and imperfections during the image acq...
详细信息
Images obtained from hyperspectral sensors provide information about the target area that extends beyond the visible portions of the electromagnetic ***,due to sensor limitations and imperfections during the image acquisition and transmission phases,noise is introduced into the acquired image,which can have a negative impact on downstream analyses such as classification,target tracking,and spectral *** in hyperspectral images(HSI)is modelled as a combination from several sources,including Gaussian/impulse noise,stripes,and *** HSI restoration method for such a mixed noise model is ***,a joint optimisation framework is proposed for recovering hyperspectral data corrupted by mixed Gaussian-impulse noise by estimating both the clean data as well as the sparse/impulse noise ***,a hyper-Laplacian prior is used along both the spatial and spectral dimensions to express sparsity in clean image ***,to model the sparse nature of impulse noise,anℓ_(1)−norm over the impulse noise gradient is *** the proposed methodology employs two distinct priors,the authors refer to it as the hyperspectral dual prior(HySpDualP)*** the best of authors'knowledge,this joint optimisation framework is the first attempt in this *** handle the non-smooth and nonconvex nature of the generalℓ_(p)−norm-based regularisation term,a generalised shrinkage/thresholding(GST)solver is ***,an efficient split-Bregman approach is used to solve the resulting optimisation *** results on synthetic data and real HSI datacube obtained from hyperspectral sensors demonstrate that the authors’proposed model outperforms state-of-the-art methods,both visually and in terms of various image quality assessment metrics.
Analysing patterns/trends and associations from heterogeneous data coming at varied speeds and formats require data structures which can handle large and dynamic data efficiently. Bloom Filter (BF), a probabilistic da...
详细信息
In this paper,a robust and consistent COVID-19 emergency decision-making approach is proposed based on q-rung linear diophantine fuzzy set(q-RLDFS),differential evolutionary(DE)optimization principles,and evidential r...
详细信息
In this paper,a robust and consistent COVID-19 emergency decision-making approach is proposed based on q-rung linear diophantine fuzzy set(q-RLDFS),differential evolutionary(DE)optimization principles,and evidential reasoning(ER)*** proposed approach uses q-RLDFS in order to represent the evaluating values of the alternatives corresponding to the *** optimization is used to obtain the optimal weights of the attributes,and ER methodology is used to compute the aggregated q-rung linear diophantine fuzzy values(q-RLDFVs)of each *** the score values of alternatives are computed based on the aggregated *** alternative with the maximum score value is selected as a better *** applicability of the proposed approach has been illustrated in COVID-19 emergency decision-making system and sustainable energy planning ***,we have validated the proposed approach with a numerical ***,a comparative study is provided with the existing models,where the proposed approach is found to be robust to perform better and consistent in uncertain environments.
The rapid advancement and proliferation of Cyber-Physical Systems (CPS) have led to an exponential increase in the volume of data generated continuously. Efficient classification of this streaming data is crucial for ...
详细信息
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** the...
详细信息
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at *** have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in *** we propose a lightweight authentication protocol to provide proper access to such *** have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,*** define the architecture we used a three-layered model consisting of cloud,fog,and edge *** have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and *** also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human *** find that our protocol works the fastest when using ring learning with *** prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications *** conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment.
Voice biometric authentication has gained significant attention in recent years due to its non-intrusive and user-friendly nature. In this research paper, we present a comprehensive study on the effectiveness of three...
详细信息
A multi-secret image sharing (MSIS) scheme facilitates the secure distribution of multiple images among a group of participants. Several MSIS schemes have been proposed with a (n, n) structure that encodes secret...
详细信息
With the widespread increase in the use of social media platforms such as Twitter, Instagram, and Reddit, people are sharing their views on various topics. They have become more vocal on these platforms about their vi...
详细信息
暂无评论