Monitoring sugar concentration during fermentation is crucial for producing high-quality alcoholic beverages. Traditional methods for measuring sugar concentration can be costly and time-consuming, especially for smal...
详细信息
A web-based platform created with Python, HTML, and CSS intended to offer useful crime data visualization for a particular city. Users of the platform can learn about crime patterns and trends through interactive visu...
详细信息
The Social Area networking Platform (S ANP) is a rapidly developing technology that allows users to meet friends, family, and others, who share their interests and express their personal feelings. The potential privac...
详细信息
Human detection in aerial images is incredibly challenging because of the characteristics aerial images possess. One of the main applications of human detection in aerial images is for search and rescue operations aft...
详细信息
The prerequisite for implementing incentive mechanisms and reliable participant selection schemes in federated learning is to obtain the contribution of each participant. Available evaluation methods for participant c...
详细信息
With the expansion of modern technologies and the Internet of Things (IoT), the concept of smart homes has gained tremendous popularity with a view to making people’s lives easier by ensuring a secured environment. S...
详细信息
With the increase in the number of vehicles on our roads, the number of road accidents is also increased drastically. One of the major reasons found for this mishappening is driver fatigue. By this proposed system, th...
详细信息
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backb...
详细信息
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519;and (ii): elliptic curve Diffie-Hellman (ECDH) based mutual authentication technique through a novel lightweight hash function. The proposed scheme attempts to efficiently counter all known perception layer security threats. Moreover, the pre-calculated key generation strategy resulted in cost-effective encryption with 192-bit curve security. It showed comparative efficiency in key strength, and curve strength compared with similar authentication schemes in terms of computational and memory cost, communication performance and encryption robustness.
Leukemia, a prevalent hematological malignancy, presents significant challenges in diagnosis and classification. Traditional diagnostic methods, often reliant on microscopic examination, suffer from subjectivity and i...
详细信息
Disease detection using iris recognition technology has emerged as a transformative paradigm in the realm of healthcare diagnostics. Leveraging the intricate patterns within the iris, this study explores the developme...
详细信息
暂无评论