One of the challenges of treating lung tumors in radiation therapy is the patient's respiratory movements during the treatment, which lead to tumor motion. The goal of respiratory motion prediction is to predict t...
详细信息
The growing demand for real-time disease prediction in healthcare necessitates advanced AI frameworks capable of ensuring both computational efficiency and patient privacy. This study introduces an Edge-Assisted Feder...
详细信息
Dengue shock syndrome (DSS) is an infectious disease that affects millions of people every year all over the world. Early detection of DSS is essential for providing effective therapy and promoting patient recovery. I...
详细信息
Cancer detection and predetection are being highly researched and studied recently due to the high density spread of this disease. It occurs when abnormal cells divide continuously without limitation where it can spre...
详细信息
Software-Defined Networking(SDN)represents a significant paradigm shift in network architecture,separating network logic from the underlying forwarding devices to enhance flexibility and centralize ***-rently,the Inte...
详细信息
Software-Defined Networking(SDN)represents a significant paradigm shift in network architecture,separating network logic from the underlying forwarding devices to enhance flexibility and centralize ***-rently,the Internet of Things(IoT)connects numerous devices to the Internet,enabling autonomous interactions with minimal human ***,implementing and managing an SDN-IoT system is inherently complex,particularly for those with limited resources,as the dynamic and distributed nature of IoT infrastructures creates security and privacy challenges during SDN *** findings of this study underscore the primary security and privacy challenges across application,control,and data planes.A comprehensive review evaluates the root causes of these challenges and the defense techniques employed in prior works to establish sufficient secrecy and privacy *** investigations have explored cutting-edge methods,such as leveraging blockchain for transaction recording to enhance security and privacy,along with applying machine learning and deep learning approaches to identify and mitigate the impacts of Denial of Service(DoS)and Distributed DoS(DDoS)***,the analysis indicates that encryption and hashing techniques are prevalent in the data plane,whereas access control and certificate authorization are prominently considered in the control plane,and authentication is commonly employed within the application ***,this paper outlines future directions,offering insights into potential strategies and technological advancements aimed at fostering a more secure and privacy-conscious SDN-based IoT ecosystem.
Inadequate rainfall causes reduced harvesting, reduced availability of water, economic losses, environmental degradation, public health problems, decreased power generation, social unrest, and infrastructure destructi...
详细信息
The proliferation of Internet of Things (IoT) networks has significantly increased the complexity of software architectures, leading to heightened vulnerabilities and system inefficiencies. AI-infused Predictive Digit...
详细信息
By enabling a highly accurate examination of the chest x-ray, deep learning, for example, is changing the methods of recognizing lung disorders. In order to classify lung diseases, such as bacterial pneumonia, viral p...
详细信息
The ability to detect cardiac disease early is vital to saving lives. Heart attacks are one of the leading reasons for high death rates worldwide due to the high cost of identifying cardiac disorders, which is crucial...
详细信息
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management cons...
详细信息
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management console *** the increased use of Industrial IoT(IIoT)applications,the risk of brutal cyber-attacks also *** leads researchers worldwide to work on developing effective Intrusion Detection Systems(IDS)for IoT infrastructure against any malicious ***,this paper provides effective IDS to detect and classify unpredicted and unpredictable severe attacks in contradiction to the IoT infrastructure.A comprehensive evaluation examined on a new available benchmark TON_IoT dataset is *** data-driven IoT/IIoT dataset incorporates a label feature indicating classes of normal and attack-targeting IoT/IIoT ***,this data involves IoT/IIoT services-based telemetry data that involves operating systems logs and IoT-based traffic networks collected from a realistic medium-scale IoT *** is to classify and recognize the intrusion activity and provide the intrusion detection objectives in IoT environments in an efficient ***,several machine learning algorithms such as Logistic Regression(LR),Linear Discriminant Analysis(LDA),K-Nearest Neighbors(KNN),Gaussian Naive Bayes(NB),Classification and Regression Tree(CART),Random Forest(RF),and AdaBoost(AB)are used for the detection intent on thirteen different intrusion *** performance metrics like accuracy,precision,recall,and F1-score are used to estimate the proposed *** experimental results show that the CART surpasses the other algorithms with the highest accuracy values like 0.97,1.00,0.99,0.99,1.00,1.00,and 1.00 for effectively detecting the intrusion activities on the IoT/IIoT infrastructure on most of the employed *** addition,the proposed work accomplishes high performance compared to other recent rela
暂无评论