IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication, processing, and real-time monitoring across diverse applications. Due to their heterogeneous nature and const...
详细信息
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a signifi...
详细信息
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a significant *** development of secure communication methods that keep recipient-only data transmissions secret has always been an area of ***,several approaches,including steganography,have been developed by researchers over time to enable safe data *** this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,*** have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)*** this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this *** encoding the data and embedding it into a carry image,this review verifies that it has been ***,embedded text in photos conveys crucial signals about the *** review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data *** the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE service...
详细信息
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the *** IoE-based cloud computing services are located at remote locations without the control of the data *** data owners mostly depend on the untrusted Cloud Service Provider(CSP)and do not know the implemented security *** lack of knowledge about security capabilities and control over data raises several security *** Acid(DNA)computing is a biological concept that can improve the security of IoE big *** IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol(StS KAP)and Feistel cipher *** paper proposed a DNA-based cryptographic scheme and access control model(DNACDS)to solve IoE big data security and access *** experimental results illustrated that DNACDS performs better than other DNA-based security *** theoretical security analysis of the DNACDS shows better resistance capabilities.
Most of the search-based software remodularization(SBSR)approaches designed to address the software remodularization problem(SRP)areutilizing only structural information-based coupling and cohesion quality ***,in prac...
详细信息
Most of the search-based software remodularization(SBSR)approaches designed to address the software remodularization problem(SRP)areutilizing only structural information-based coupling and cohesion quality ***,in practice apart from these quality criteria,there require other aspects of coupling and cohesion quality criteria such as lexical and changed-history in designing the modules of the software ***,consideration of limited aspects of software information in the SBSR may generate a sub-optimal modularization ***,such modularization can be good from the quality metrics perspective but may not be acceptable to the *** produce a remodularization solution acceptable from both quality metrics and developers’perspectives,this paper exploited more dimensions of software information to define the quality criteria as modularization ***,these objectives are simultaneously optimized using a tailored manyobjective artificial bee colony(MaABC)to produce a remodularization *** assess the effectiveness of the proposed approach,we applied it over five software *** obtained remodularization solutions are evaluated with the software quality metrics and developers view of *** demonstrate that the proposed software remodularization is an effective approach for generating good quality modularization solutions.
Automatic Speech Recognition systems that convert language into written text have greatly transformed human–machine interaction. Although these systems have achieved results, in languages building accurate and reliab...
详细信息
Cloud computing has drastically changed the delivery and consumption of live streaming *** designs,challenges,and possible uses of cloud computing for live streaming are studied.A comprehensive overview of the technic...
详细信息
Cloud computing has drastically changed the delivery and consumption of live streaming *** designs,challenges,and possible uses of cloud computing for live streaming are studied.A comprehensive overview of the technical and business issues surrounding cloudbased live streaming is provided,including the benefits of cloud computing,the various live streaming architectures,and the challenges that live streaming service providers face in delivering high‐quality,real‐time *** different techniques used to improve the performance of video streaming,such as adaptive bit‐rate streaming,multicast distribution,and edge computing are discussed and the necessity of low‐latency and high‐quality video transmission in cloud‐based live streaming is *** such as improving user experience and live streaming service performance using cutting‐edge technology,like artificial intelligence and machine learning are *** addition,the legal and regulatory implications of cloud‐based live streaming,including issues with network neutrality,data privacy,and content moderation are *** future of cloud computing for live streaming is examined in the section that follows,and it looks at the most likely new developments in terms of trends and *** technology vendors,live streaming service providers,and regulators,the findings have major policy‐relevant *** on how stakeholders should address these concerns and take advantage of the potential presented by this rapidly evolving sector,as well as insights into the key challenges and opportunities associated with cloud‐based live streaming are provided.
The rapid advancement of technology has given rise to medical cyber-physical systems (MCPS), a subset of cyber-physical systems (CPS) specifically tailored for patient care and healthcare providers. MCPS generate subs...
详细信息
Images, habits, rituals, beliefs, cultures, information, arts, crafts, music, and artefacts specific to a place are all included in heritage. The cultural, natural and mixed heritage of India is very diverse, complica...
详细信息
Cloud Datacenter Network(CDN)providers usually have the option to scale their network structures to allow for far more resource capacities,though such scaling options may come with exponential costs that contradict th...
详细信息
Cloud Datacenter Network(CDN)providers usually have the option to scale their network structures to allow for far more resource capacities,though such scaling options may come with exponential costs that contradict their utility ***,besides the cost of the physical assets and network resources,such scaling may also imposemore loads on the electricity power grids to feed the added nodes with the required energy to run and cool,which comes with extra costs ***,those CDNproviders who utilize their resources better can certainly afford their services at lower price-units when compared to others who simply choose the scaling *** utilization is a quite challenging process;indeed,clients of CDNs usually tend to exaggerate their true resource requirements when they lease their *** providers are committed to their clients with Service Level Agreements(SLAs).Therefore,any amendment to the resource allocations needs to be approved by the clients *** this work,we propose deploying a Stackelberg leadership framework to formulate a negotiation game between the cloud service providers and their client *** this,the providers seek to retrieve those leased unused resources from their *** is not expected from the clients,and they may ask high price units to return their extra resources to the provider’s ***,to motivate cooperation in such a non-cooperative game,as an extension to theVickery auctions,we developed an incentive-compatible pricingmodel for the returned ***,we also proposed building a behavior belief function that shapes the way of negotiation and compensation for each *** to other benchmark models,the assessment results showthat our proposed models provide for timely negotiation schemes,allowing for better resource utilization rates,higher utilities,and grid-friend CDNs.
In order to support the learning of novice students in Java programming, the web-based Java Programming Learning Assistant System (JPLAS) has been developed. JPLAS offers several types of exercise problems to foster c...
详细信息
暂无评论