Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security *** security technology based on the physi...
详细信息
Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security *** security technology based on the physicalmechanism has attracted extensive *** to improve the key generation rate has always been one of the urgent problems to be solved in the security technology based on the physical *** this paper,superlattice technology is introduced to the security field of Internet of things,and a high-speed symmetric key generation scheme based on superlattice for Internet of things is *** order to ensure the efficiency and privacy of data transmission,we also combine the superlattice symmetric key and compressive sensing technology to build a lightweight data transmission scheme that supports data compression and data encryption at the same *** analysis and experimental evaluation results show that the proposed scheme is superior to the most closely related work.
Concept drift is a main security issue that has to be resolved since it presents a significant barrier to the deployment of machine learning(ML)*** to attackers’(and/or benign equivalents’)dynamic behavior changes,t...
详细信息
Concept drift is a main security issue that has to be resolved since it presents a significant barrier to the deployment of machine learning(ML)*** to attackers’(and/or benign equivalents’)dynamic behavior changes,testing data distribution frequently diverges from original training data over time,resulting in substantial model *** to their dispersed and dynamic nature,distributed denial-of-service attacks pose a danger to cybersecurity,resulting in attacks with serious consequences for users and *** paper proposes a novel design for concept drift analysis and detection of malware attacks like Distributed Denial of Service(DDOS)in the *** goal of this architecture combination is to accurately represent data and create an effective cyber security prediction *** intrusion detection system and concept drift of the network has been analyzed using secure adaptive windowing with website data authentication protocol(SAW_WDA).The network has been analyzed by authentication protocol to avoid malware *** data of network users will be collected and classified using multilayer perceptron gradient decision tree(MLPGDT)*** on the classification output,the decision for the detection of attackers and authorized users will be *** experimental results show output based on intrusion detection and concept drift analysis systems in terms of throughput,end-end delay,network security,network concept drift,and results based on classification with regard to accuracy,memory,and precision and F-1 score.
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the *** cookies are expl...
详细信息
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the *** cookies are exploited to carry client patterns observed by a *** client patterns facilitate the particular client’s future visit to the corresponding ***,security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the *** protocols have been introduced that maintain HTTP cookies,but many of those fail to achieve the required security,or require a lot of resource *** this article,we have introduced a lightweight Elliptic Curve Cryptographic(ECC)based protocol for authenticating client and server transactions to maintain the privacy and security of HTTP *** proposed protocol uses a secret key embedded within a *** proposed protocol ismore efficient and lightweight than related protocols because of its reduced computation,storage,and communication ***,the analysis presented in this paper confirms that proposed protocol resists various known attacks.
Disease identification for fruits and leaves in the field of agriculture is important for estimating production,crop yield,and earnings for *** the specific case of pomegranates,this is challenging because of the wide...
详细信息
Disease identification for fruits and leaves in the field of agriculture is important for estimating production,crop yield,and earnings for *** the specific case of pomegranates,this is challenging because of the wide range of possible diseases and their effects on the plant and the *** study presents an adaptive histogram-based method for solving this *** method describe is domain independent in the sense that it can be easily and efficiently adapted to other similar smart agriculture *** approach explores colour spaces,namely,Red,Green,and Blue along with *** histograms of colour spaces and grey space are analysed based on the notion that as the disease changes,the colour also *** proximity between the histograms of grey images with individual colour spaces is estimated to find the closeness of *** the grey image is the average of colour spaces(R,G,and B),it can be considered a reference *** estimating the distance between grey and colour spaces,the proposed approach uses a Chi-Square distance ***,the method uses an Artificial Neural Network for *** effectiveness of our approach is demonstrated by testing on a dataset of fruit and leaf images affected by different *** results show that the method outperforms existing techniques in terms of average classification rate.
The rapid expansion of cloud computing e-learning systems has empowered educators to reach learners worldwide. However, a critical study gap exists: the impact of lecturers’ technological anxiety on their adoption in...
详细信息
Pre-trained language models (PrLMs) demonstrate impressive performance on the sentiment analysis task. However, the large number of trainable parameters brings about heavy computational costs, which become more seriou...
详细信息
The widespread adoption of cloud computing has underscored the critical importance of efficient resource allocation and management, particularly in task scheduling, which involves assigning tasks to computing resource...
详细信息
The widespread adoption of cloud computing has underscored the critical importance of efficient resource allocation and management, particularly in task scheduling, which involves assigning tasks to computing resources for optimized resource utilization. Several meta-heuristic algorithms have shown effectiveness in task scheduling, among which the relatively recent Willow Catkin Optimization (WCO) algorithm has demonstrated potential, albeit with apparent needs for enhanced global search capability and convergence speed. To address these limitations of WCO in cloud computing task scheduling, this paper introduces an improved version termed the Advanced Willow Catkin Optimization (AWCO) algorithm. AWCO enhances the algorithm’s performance by augmenting its global search capability through a quasi-opposition-based learning strategy and accelerating its convergence speed via sinusoidal mapping. A comprehensive evaluation utilizing the CEC2014 benchmark suite, comprising 30 test functions, demonstrates that AWCO achieves superior optimization outcomes, surpassing conventional WCO and a range of established meta-heuristics. The proposed algorithm also considers trade-offs among the cost, makespan, and load balancing objectives. Experimental results of AWCO are compared with those obtained using the other meta-heuristics, illustrating that the proposed algorithm provides superior performance in task scheduling. The method offers a robust foundation for enhancing the utilization of cloud computing resources in the domain of task scheduling within a cloud computing environment.
This study introduces a novel benchmark dataset designed for Cricket Sentiment Analysis on Bangla social media posts, emphasizing a low-resource setting. The dataset was meticulously curated through manual collection ...
详细信息
Admissions examinations are crucial in shaping students' academic and career paths. Machine learning (ML) offers a promising avenue for transforming the assessment process in universities, schools, and colleges. T...
详细信息
Dynamic functional connectivity network (FCN) can effectively mine meta-stable state transition within the period of data acquisition time, which is related to neurological diseases. However, conventional FCN directly...
详细信息
暂无评论