Gene expression analysis plays a crucial role in understanding biological processes and diseases. However, the high-dimensional nature of gene expression data poses challenges for its analysis and interpretation. Clus...
详细信息
Participatory budgeting refers to the practice of allocating public resources by collecting and aggregating individual preferences. Most existing studies in this field often assume an additive utility function, where ...
详细信息
In recent years, fog computing has extended cloud services to the network edge, lowering network latency and congestion and overcoming cloud computing restrictions. Many hurdles, however, must be overcome before the b...
详细信息
Smart grids are at risk of cyber-attacks due to more connected devices being introduced. Different kinds of attacks may incur different consequences in the operation of smart grids. Attackers have identified different...
详细信息
One of the greatest developments in computerscience is undoubtedly quantum computing. It has demonstrated to give various benefits over the classical algorithms, particularly in the significant reduction of processin...
详细信息
Block interception attack, also known as block withholding attack, is an attack method in the blockchain. The attacker penetrates the target mining pool for passive mining to destroy the target mining pool. This paper...
详细信息
Walking while engaging in distracting activities affects our perception of changes happening on the road, leading to exposure to hazardous conditions. This study aimed to evidence that pedestrians who become distracte...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote *** attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are *** paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic *** employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA *** proposed voting classifier categorizes the network intrusions robustly and *** assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack *** dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and *** achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this ***,given the limitations of computers,it becomes evenmore important to employ efficient and ...
详细信息
Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this ***,given the limitations of computers,it becomes evenmore important to employ efficient and fast image encryption *** 1D chaotic maps offer a practical approach to real-time image encryption,their limited flexibility and increased vulnerability restrict their practical *** this research,we have utilized a 3DHindmarsh-Rosemodel to construct a secure *** randomness of the chaotic map is assessed through standard *** proposed system enhances security by incorporating an increased number of system parameters and a wide range of chaotic parameters,as well as ensuring a uniformdistribution of chaotic signals across the entire value ***,a fast image encryption technique utilizing the new chaotic system is *** novelty of the approach is confirmed through time complexity *** further strengthen the resistance against cryptanalysis attacks and differential attacks,the SHA-256 algorithm is employed for secure key *** results through a number of parameters demonstrate the strong cryptographic performance of the proposed image encryption approach,highlighting its exceptional suitability for secure ***,the security of the proposed scheme has been compared with stateof-the-art image encryption schemes,and all comparison metrics indicate the superior performance of the proposed scheme.
Fingerprint authentication blends biometric precision with user convenience, leveraging unique ridge patterns for fast, reliable, and tamper-resistant identity verification. However, it remains vulnerable to spoofing ...
详细信息
暂无评论