The paper describes the implementation of a watermarking embedding and retrieval technique using a conceptual approach of bio-inspired algorithm e.g. ant colony optimization (ACO). The essential construct of ACO is ph...
详细信息
Managing software packages in a scientific computing environment is a challenging task, especially in the case of heterogeneous systems. It is error prone when installing and updating software packages in a sophistica...
详细信息
Managing software packages in a scientific computing environment is a challenging task, especially in the case of heterogeneous systems. It is error prone when installing and updating software packages in a sophisticated computing environment. Testing and performance evaluation in an on-the-fly manner is also a troublesome task for a production system. In this paper, we discuss a package management scheme based on containers. The newly developed method can ease the maintenance complexity and reduce human mistakes. We can benefit from the self-containing and isolation features of container technologies for maintaining the software packages among intricately connected clusters. By deploying the Super Computing application Strore(SCStore) over the WAN connected world-largest clusters, it proved that it can greatly reduce the effort for maintaining the consistency of software environment and bring benefit to achieve automation.
Multiple time series (MTS), which describes an object in multi-dimensions, is based on single time series and has been proved to be useful. In this paper, a new analytical method called α/β-Dominant-Skyline on MTS...
详细信息
Multiple time series (MTS), which describes an object in multi-dimensions, is based on single time series and has been proved to be useful. In this paper, a new analytical method called α/β-Dominant-Skyline on MTS and a formal definition of the α/β-dominant skyline MTS are given. Also, three algorithms, called NL, BC and MFB, are proposed to address the α/β-dominant skyline queries over MTS. Finally experimental results on both synthetic and real data verify the correctness and effectiveness of the proposed method and algorithms.
The challenge of bankruptcy prediction, critical for averting financial sector losses, is amplified by the prevalence of imbalanced datasets, which often skew prediction models. Addressing this, our study introduces t...
详细信息
The African continent has long benefited from adopting OSS in its private and public organizations that have changed their way of development, the use and how to acquire proprietary software. This frequency of adaptat...
详细信息
Classification, which involves finding rules that partition a given dataset into disjoint groups, is one class of data mining problems. Approaches proposed so far for mining classification rules from databases are mai...
详细信息
This systematic literature review delves into the dynamic realm of graphical passwords, focusing on the myriad security attacks they face and the diverse countermeasures devised to mitigate these threats. The core obj...
详细信息
Decisions related to education are complex and have long-term consequences. For higher education students, most of these decisions are made when students are young and with little academic experience;these decisions c...
详细信息
Nowadays, the most important risk and challenge in online system are online scam and phishing attacks. Phishing attacks have been always used to steal important information of users. In this kind of scam, attacker dir...
详细信息
Nowadays, the most important risk and challenge in online system are online scam and phishing attacks. Phishing attacks have been always used to steal important information of users. In this kind of scam, attacker direct victim to fake pages using social engineering techniques, then, starts stealing users' important information such as passwords. In order to confronting these attacks, numerous techniques have been invented which have the ability to confront different kinds of these attacks. Our goal in this paper is to introducing new kind of phishing attacks which are not identifiable by techniques and methods which have been invented to confronting phishing attacks. Unlike other kinds of phishing attacks which target all kinds of users, researchers are the victims of these kinds of journal phishing attacks. Finally, we'll introduce an approach based on classification algorithms to identify these kind of journal phishing attacks and then we'll check our suggested approach in error rate.
The Internet of Things(IoT)is where almost anything can be controlled and managed remotely by means of *** the IoT evolution led to quality of life enhancement,many of its devices are *** lack of robust key management...
详细信息
The Internet of Things(IoT)is where almost anything can be controlled and managed remotely by means of *** the IoT evolution led to quality of life enhancement,many of its devices are *** lack of robust key management systems,efficient identity authentication,low fault tolerance,and many other issues lead to IoT devices being easily targeted by *** this paper we propose a new authentication protocol called Authenblue that improve the authentication process of IoT devices and Coordinators of Personal Area Network(CPANs)in an Industrial IoT(IIoT)*** study proposed Authenblue protocol as a new Blockchainbased authentication *** enhance the authentication process and make it more secure,Authenblue modified the way of generating IIoT identifiers and the shared secret keys used by the IIoT devices to raise the efficiency of the authentication *** enhance the authentication protocol that other models rely on by enhancing the approach used to generate the User Identifier(UI).The UI values changed from being static values,sensors MAC addresses,to be generated values in the inception *** approach makes the process of renewing the sensor keys more secure by renewing their UI values instead of changing the secret *** this study,Authenblue has been simulated in the Network Simulator 3(NS3).Simulation results show an improved performance compared to the related work.
暂无评论