With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this...
详细信息
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this research provides a Three-Layered Security Access model(TLSA)aligned to an intrusion detection mechanism,access control mechanism,and data encryption *** TLSA underlines the need for the protection of sensitive *** proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard(AES).For data transfer and storage,this encryption guarantees the data’s authenticity and ***,the solution employs the AES encryption algorithm to secure essential data before storing them in the Cloud to minimize unauthorized ***-based access control(RBAC)implements the second strategic level,which ensures specific personnel access certain data and *** RBAC,each user is allowed a specific role and *** implies that permitted users can access some data stored in the *** layer assists in filtering granular access to data,reducing the risk that undesired data will be discovered during the *** 3 deals with intrusion detection systems(IDS),which detect and quickly deal with malicious actions and intrusion *** proposed TLSA security model of e-commerce includes conventional levels of security,such as encryption and access control,and encloses an insight intrusion detection *** method offers integrated solutions for most typical security issues of cloud computing,including data secrecy,method of access,and *** extensive performance test was carried out to confirm the efficiency of the proposed three-tier security *** have been made with state-of-art techniques,including DES,RSA,and DUAL-RSA,keeping into account Accuracy,QILV,F-Measure,Sensitivity,MSE,PSNR,SSIM,and computation time,encryption time,and decryption *** proposed
The proliferation of deluding data such as fake news and phony audits on news web journals,online publications,and internet business apps has been aided by the availability of the web,cell phones,and social *** can qu...
详细信息
The proliferation of deluding data such as fake news and phony audits on news web journals,online publications,and internet business apps has been aided by the availability of the web,cell phones,and social *** can quickly fabricate comments and news on social *** most difficult challenge is determining which news is real or ***,tracking down programmed techniques to recognize fake news online is *** an emphasis on false news,this study presents the evolution of artificial intelligence techniques for detecting spurious social media *** study shows past,current,and possible methods that can be used in the future for fake news *** different publicly available datasets containing political news are utilized for performing *** supervised learning algorithms are used,and their results show that conventional Machine Learning(ML)algorithms that were used in the past perform better on shorter text *** contrast,the currently used Recurrent Neural Network(RNN)and transformer-based algorithms perform better on longer ***,a brief comparison of all these techniques is provided,and it concluded that transformers have the potential to revolutionize Natural Language Processing(NLP)methods in the near future.
The innovation for entrepreneurial systems and the advocacy to enact policies that institutionalise it had recently flooded the literature. Every system has fundamental principles responsible for their state, progress...
详细信息
This paper proposes a new population-based global optimization algorithm, Ọdịgbo Metaheuristic Optimization Algorithm–ỌMOA, for solving complex bounded-constraint/single objective real-parameter problems found in mos...
详细信息
Human pose estimation (HPE) from images or video is not only a major issue of computer vision, but also it plays a vital role in many real-world applications. The most challenging problems of human pose estimation are...
详细信息
This review paper explores emerging threats to information privacy and security within the dynamic landscape of Online Social Networks (OSNs), which serve as repositories of vast amounts of user data. The rise in soci...
详细信息
Railway accidents are an under-scrutinised cause of death in India. Train accidents are caused by various consequences of collisions, derailments, signal errors and so on. Furthermore, when train derailments become di...
详细信息
In the era of digital transformation, the hospitality industry faces unique challenges and opportunities. With travellers increasingly relying on online reviews to make informed decisions, the role of sentiment analys...
详细信息
The world of digitization is growing exponentially;data optimization, security of a network, and energy efficiency are becoming more prominent. The Internet of Things (IoT) is the core technology of modern society. Th...
详细信息
Agriculture is a key component of a nation's economy. In the traditional method, farmers rely on experience to determine the ideal climate and environment for a given crop. technology is advancing, and while the s...
详细信息
暂无评论