The rise of the Internet of Things (IoT) paradigm has led to an interest in applying it not only in tasks for the general public but also to stringent domains such as healthcare. However, the developers of these next-...
详细信息
In the realm of cloud computing, querying on secured information has emerged as a technology of critical importance. These kinds of searches make it possible for the owner of the data to search through encrypted data ...
详细信息
ISBN:
(纸本)9798350361780
In the realm of cloud computing, querying on secured information has emerged as a technology of critical importance. These kinds of searches make it possible for the owner of the data to search through encrypted data that is kept in the cloud without revealing any pertinent information. Numerous strategies, the most of which concentrate on conjunctive and disjunctive keyword searches, have been presented by researchers in an effort to improve the quality of the search experience. On the other hand, a disjunction will provide an excessive number of results, but a conjunction of all the keywords could only produce a small number of results. It is tough to customize the relevance of the keywords given the present schemes, which makes it difficult to acquire the results that are required. For the purpose of resolving these issues, we offer a unique technique that we name the Secured Multiple Keyword Searching Scheme (SMKSS). This scheme allows for the search to be conducted with the user specifying the amount of keywords that are included in the search result. A cross-validation is performed between the proposed scheme and the traditional Ranked Keyword Searching Model (RKSM) in order to determine how effective the novel scheme is. This particular quantity, n, can be utilized to personalize the relevance of the term. Furthermore, as a consequence of this, the owner of the data might acquire the desired search results that include any n terms from a keyword collection. Not only does the proposed system allow the conventional disjunctive and conjunctive keyword searches, but it also supports these searches when n equals one or the size of the keyword collection, respectively. There is a possibility that the keyword will be critical. Initially, we provide a formal definition of its security, and then we demonstrate that the proposed scheme is safe against the adaptive selected keyword attack in the standard model, and that it is also capable of providing some degree of def
Time series anomaly detection is a technology that finds outliers in observed data over time, and is a significant research field associated with many applications or platforms. In this paper, we propose a method call...
详细信息
Voice analysis in Natural Language Processing (NLP) involves the processing of spoken language to develop applications such as speech recognition, synthesis, and speaker identification. This survey explores the phonet...
详细信息
The paper proposed a secured and efficient data aggregation mechanism leveraging the edge computing paradigm and homomorphic data encryption technique. The paper used a unique combination of Paillier cryptosystem and ...
详细信息
Plant disease causes a highly significant impact on production due to its destructive characteristics. A variety of chemical techniques should be applied to agriculture at different stages of disease infestation to en...
详细信息
Breast cancer in women is a significant public health concern worldwide, with many cases going undiagnosed until the advanced stages. Early detection is crucial for proper treatment and improved outcomes. There are so...
详细信息
Extracting text from an image using a Visual Question Answering (VQA) system is an application at the intersection of computer vision and Natural Language Processing (NLP) to help blind people better view and comprehe...
详细信息
Machine learning algorithms can be used to detect Alzheimer disease with RMI-images. One of the challenges of these algorithms is to clearly extract image features that show small variants of brain cells changes, whic...
详细信息
Automated analysis of breast cancer (BC) histopathology images is a challenging task due to the high resolution, multiple magnifications, color variations, the presence of image artifacts, and morphological variabilit...
详细信息
暂无评论