The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)netw...
详细信息
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)networks may be vulnerable to several routing ***’s why a network intrusion detection system(NIDS)is needed to guard against routing assaults on RPL-based IoT *** imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network ***,we propose in this paper a novel approach to balance the dataset classes based on metaheuristic optimization applied to locality-sensitive hashing and synthetic minority oversampling technique(LSH-SMOTE).The proposed optimization approach is based on a new hybrid between the grey wolf and dipper throated optimization *** prove the effectiveness of the proposed approach,a set of experiments were conducted to evaluate the performance of NIDS for three cases,namely,detection without dataset balancing,detection with SMOTE balancing,and detection with the proposed optimized LSHSOMTE *** results showed that the proposed approach outperforms the other approaches and could boost the detection *** addition,a statistical analysis is performed to study the significance and stability of the proposed *** conducted experiments include seven different types of attack cases in the RPL-NIDS17 *** on the 2696 CMC,2023,vol.74,no.2 proposed approach,the achieved accuracy is(98.1%),sensitivity is(97.8%),and specificity is(98.8%).
Pneumothorax is a life-threatening and urgent chest disease than can be detected using Chest X-Ray (CXR) image. CXR images are low resolution and diagnosis of pneumothorax based on them is error prone. Deep learning-b...
详细信息
Localization of sensor nodes in the internet of underwater things(IoUT)is of considerable significance due to its various applications,such as navigation,data tagging,and detection of underwater ***,in this paper,we p...
详细信息
Localization of sensor nodes in the internet of underwater things(IoUT)is of considerable significance due to its various applications,such as navigation,data tagging,and detection of underwater ***,in this paper,we propose a hybrid Bayesian multidimensional scaling(BMDS)based localization technique that can work on a fully hybrid IoUT network where the nodes can communicate using either optical,magnetic induction,and acoustic *** communication technologies are already used for communication in the underwater environment;however,lacking localization *** and magnetic induction communication achieves higher data rates for short *** the contrary,acoustic waves provide a low data rate for long-range underwater *** proposed method collectively uses optical,magnetic induction,and acoustic communication-based ranging to estimate the underwater sensor nodes’final ***,we also analyze the proposed scheme by deriving the hybrid Cramer-Rao lower bound(H-CRLB).Simulation results provide a complete comparative analysis of the proposed method with the literature.
A relatively recent technique for gathering data online is known as scraping. The automated process involves the exploration of e-commerce websites and obtaining certain data, such as pricing, reviews, quality feature...
详细信息
This article presents a simulation study on the use of LoRaWAN technology in autonomous vehicles. The research focuses on developing an Auto-Handover Gateway for Autonomous Vehicles, utilizing LoRaWAN parameters such ...
详细信息
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the priv...
详细信息
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the privacy of patients. As medical information becomes more widely available, security measures must be established to protect confidentiality, integrity, and availability. Image steganography was recently proposed as an extra data protection mechanism for medical records. This paper describes a data-hiding approach for DICOM medical pictures. To ensure secrecy, we use Adversarial Neural Cryptography with SHA-256 (ANC-SHA-256) to encrypt and conceal the RGB patient picture within the medical image's Region of Non-Interest (RONI). To ensure anonymity, we use ANC-SHA-256 to encrypt the RGB patient image before embedding. We employ a secure hash method with 256bit (SHA-256) to produce a digital signature from the information linked to the DICOM file to validate the authenticity and integrity of medical pictures. Many tests were conducted to assess visual quality using diverse medical datasets, including MRI, CT, X-ray, and ultrasound cover pictures. The LFW dataset was chosen as a patient hidden picture. The proposed method performs well in visual quality measures including the PSNR average of 67.55, the NCC average of 0.9959, the SSIM average of 0.9887, the UQI average of 0.9859, and the APE average of 3.83. It outperforms the most current techniques in these visual quality measures (PSNR, MSE, and SSIM) across six medical assessment categories. Furthermore, the proposed method offers great visual quality while being resilient to physical adjustments, histogram analysis, and other geometrical threats such as cropping, rotation, and scaling. Finally, it is particularly efficient in telemedicine applications with high achieving security with a ratio of 99% during remote transmission of Electronic Patient Records (EPR) over the Internet, which safeguards the patien
This study presents experimental results showing that weak, extremely low frequency electromagnetic (EM) fields influence the growth rates of HT-1080 fibrosarcoma cells in vitro and offers a theoretical explanation fo...
详细信息
The last several decades have seen a lot of activity in the medical image processing domain especially when it comes to the segmentation of liver and liver tumours. The survival rate of liver cancer is rather low when...
详细信息
This paper explores the extraction of modal association rules from non-tabular data using a novel algorithm, ModalFP-Growth. By extending the FP-Growth algorithm to modal logic, ModalFP-Growth processes instances repr...
详细信息
The COVID-19 pandemic has devastated our daily lives,leaving horrific repercussions in its *** to its rapid spread,it was quite difficult for medical personnel to diagnose it in such a big *** who test positive for Co...
详细信息
The COVID-19 pandemic has devastated our daily lives,leaving horrific repercussions in its *** to its rapid spread,it was quite difficult for medical personnel to diagnose it in such a big *** who test positive for Covid-19 are diagnosed via a nasal PCR *** comparison,polymerase chain reaction(PCR)findings take a few hours to a few *** PCR test is expensive,although the government may bear expenses in certain ***,subsets of the population resist invasive testing like ***,chest X-rays or computerized Vomography(CT)scans are preferred in most cases,and more importantly,they are non-invasive,inexpensive,and provide a faster response *** advances in Artificial Intelligence(AI),in combination with state-of-the-art methods,have allowed for the diagnosis of COVID-19 using chest *** article proposes a method for classifying COVID-19 as positive or negative on a decentralized dataset that is based on the Federated learning *** order to build a progressive global COVID-19 classification model,two edge devices are employed to train the model on their respective localized dataset,and a 3-layered custom Convolutional Neural Network(CNN)model is used in the process of training the model,which can be deployed from the *** two edge devices then communicate their learned parameter and weight to the server,where it aggregates and updates the *** proposed model is trained using an image dataset that can be found on *** are more than 13,000 X-ray images in Kaggle Database collection,from that collection 9000 images of Normal and COVID-19 positive images are *** edge node possesses a different number of images;edge node 1 has 3200 images,while edge node 2 has *** is no association between the datasets of the various nodes that are included in the *** doing it in this manner,each of the nodes will have access to a separate image collection that has no correl
暂无评论