Technological advancements have brought a new era of growth for the healthcare industry. Nowadays, the security of healthcare data and the preservation of user privacy inside smart healthcare systems are being severel...
详细信息
With the prevalence of artificial intelligence, people collect data through numerous sensors and use machine learning to create models for intelligent services. However, data privacy and massive data issues are raised...
详细信息
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encrypt...
详细信息
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encryption and decryption algorithms are being *** cloud computation,data processing,storage,and transmission can be done through laptops andmobile *** Storing in cloud facilities is expanding each day and data is the most significant asset of *** important concern with the transmission of information to the cloud is security because there is no perceivability of the client’s *** have to be dependent on cloud service providers for assurance of the platform’s *** security and privacy issues reduce the progression of cloud computing and add ***;most of the data that is stored on cloud servers is in the form of images and photographs,which is a very confidential form of data that requires secured *** this research work,a public key cryptosystem is being implemented to store,retrieve and transmit information in cloud computation through a modified Rivest-Shamir-Adleman(RSA)algorithm for the encryption and decryption of *** implementation of a modified RSA algorithm results guaranteed the security of data in the cloud *** enhance the user data security level,a neural network is used for user authentication and ***;the proposed technique develops the performance of detection as a loss function of the bounding *** Faster Region-Based Convolutional Neural Network(Faster R-CNN)gets trained on images to identify authorized users with an accuracy of 99.9%on training.
In the present optical fog/cloud computing environment, optical line terminals and optical network units are used as the most promising optical fog devices (OFDs). The inherent characteristics of fog computing provide...
详细信息
In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential *** overcome these difficulties,different steganography and data encryption m...
详细信息
In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential *** overcome these difficulties,different steganography and data encryption methods have been proposed by researchers to secure *** of the proposed steganography techniques achieve higher embedding capacities without compromising visual imperceptibility using LSB *** this work,we have an approach that utilizes a combinationofMost SignificantBit(MSB)matching andLeast Significant Bit(LSB)*** proposed algorithm divides confidential messages into pairs of bits and connects them with the MSBs of individual pixels using pair matching,enabling the storage of 6 bits in one pixel by modifying a maximum of three *** proposed technique is evaluated using embedding capacity and Peak Signal-to-Noise Ratio(PSNR)score,we compared our work with the Zakariya scheme the results showed a significant increase in data concealment *** achieved results of ourwork showthat our algorithmdemonstrates an improvement in hiding capacity from11%to 22%for different data samples while maintaining a minimumPeak Signal-to-Noise Ratio(PSNR)of 37 *** findings highlight the effectiveness and trustworthiness of the proposed algorithm in securing the communication process and maintaining visual integrity.
One of the most significant and difficult tasks in the modern world is rainfall forecast. Rainfall is a complicated and nonlinear phenomenon that requires sophisticated computer modeling and simulation to anticipate w...
详细信息
With the enhanced usage of artificial-intelligence-driven applications, the researchers often face challenges in improving the accuracy of data classification models, while trading off the complexity. In this article,...
详细信息
The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized *** detection is one of the key methodologies utilized to ensure the security...
详细信息
The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized *** detection is one of the key methodologies utilized to ensure the security of the *** intrusion detection mechanisms have issues such as higher misclassification rates,increased model complexity,insignificant feature extraction,increased training time,increased run time complexity,computation overhead,failure to identify new attacks,increased energy consumption,and a variety of other factors that limit the performance of the intrusion system *** this research a security framework for WSN-IoT,through a deep learning technique is introduced using Modified Fuzzy-Adaptive DenseNet(MF_AdaDenseNet)and is benchmarked with datasets like NSL-KDD,UNSWNB15,CIDDS-001,Edge IIoT,Bot *** this,the optimal feature selection using Capturing Dingo Optimization(CDO)is devised to acquire relevant features by removing redundant *** proposed MF_AdaDenseNet intrusion detection model offers significant benefits by utilizing optimal feature selection with the CDO *** results in enhanced Detection Capacity with minimal computation complexity,as well as a reduction in False Alarm Rate(FAR)due to the consideration of classification error in the fitness *** a result,the combined CDO-based feature selection and MF_AdaDenseNet intrusion detection mechanism outperform other state-of-the-art techniques,achieving maximal Detection Capacity,precision,recall,and F-Measure of 99.46%,99.54%,99.91%,and 99.68%,respectively,along with minimal FAR and Mean Absolute Error(MAE)of 0.9%and 0.11.
Numerous neural network(NN)applications are now being deployed to mobile *** applications usually have large amounts of calculation and data while requiring low inference latency,which poses challenges to the computin...
详细信息
Numerous neural network(NN)applications are now being deployed to mobile *** applications usually have large amounts of calculation and data while requiring low inference latency,which poses challenges to the computing ability of mobile ***,devices’life and performance depend on ***,in many scenarios,such as industrial production and automotive systems,where the environmental temperatures are usually high,it is important to control devices’temperatures to maintain steady *** this paper,we propose a thermal-aware channel-wise heterogeneous NN inference *** contains two parts,the thermal-aware dynamic frequency(TADF)algorithm and the heterogeneous-processor single-layer workload distribution(HSWD)*** on a mobile device’s architecture characteristics and environmental temperature,TADF can adjust the appropriate running speed of the central processing unit and graphics processing unit,and then the workload of each layer in the NN model is distributed by HSWD in line with each processor’s running speed and the characteristics of the layers as well as heterogeneous *** experimental results,where representative NNs and mobile devices were used,show that the proposed method can considerably improve the speed of the on-device inference by 21%–43%over the traditional inference method.
This article discusses the importance of cloud-based multi-tenancy in private–public-private secure cloud environments, which is achieved through the isolation of end-user data and resources into tenants to ensure da...
详细信息
暂无评论