The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web o...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web of challenges, prominently centered around potential threats and data security implications. Recent cryptography techniques, such as DNA-based cryptography, 3D chaos-based cryptography, and optical cryptography, face challenges including large encryption times, high energy consumption, and suboptimal rather than optimal performance. Particularly, the burden of long encryption cycles strains the energy resources of typical low-power and compact IoT devices. These challenges render the devices vulnerable to unauthorized breaches, despite large storage capacities. The hallmark of the IoT ecosystem, characterized by its low-power compact devices, is the burgeoning volume of data they generate. This escalating data influx, while necessitating expansive storage, remains vulnerable to unauthorized access and breaches. Historically, encryption algorithms, with their multifaceted architectures, have been the bulwark against such intrusions. However, their inherently-complex nature, entailing multiple encryption cycles, strains the limited energy reserves of typical IoT devices. In response to this intricate dilemma, we present a hybrid lightweight encryption strategy. Our algorithm innovatively leverages both one-dimensional (1D) and two-dimensional (2D) chaotic key generators. Furthermore, it amalgamates a classical encryption philosophy, harmonizing the strengths of Feistel and substitution-permutation networks. The centerpiece of our strategy is achieving effective encryption in merely three rounds, tailored expressly for compressed Three-Dimensional Video (3DV) frames, ensuring their unwavering integrity. Our workflow commences with the H.264/MVC compression algorithm, setting the stage for the subsequent encryption phase. Through rigorous MATLAB simulations,
To address the need for summarizing and extracting information efficiently, this paper highlights the growing challenge posed by the increasing number of PDF files. Reading lengthy documents is a tedious and time-cons...
详细信息
The manual analysis of job resumes poses specific challenges, including the time-intensive process and the high likelihood of human error, emphasizing the need for automation in content-based recommendations. Recent a...
详细信息
Chest x-ray studies can be automatically detected and their locations located using artificial intelligence (AI) in healthcare. To detect the location of findings, additional annotation in the form of bounding boxes i...
详细信息
Nowadays, high energy amount is being wasted by computing servers and personal electronic devices, which produce a high amount of carbon dioxide. Thus, it is required to decrease energy usage and pollution. Many appli...
详细信息
With the breakthrough of convolutional neural networks, deep hashing methods have demonstrated remarkable performance in large-scale image retrieval tasks. However, existing deep supervised hashing methods, which rely...
详细信息
Thunderstorm detection based on the Atmospheric Electric Field(AEF)has evolved from time-domain models to space-domain *** is especially important to evaluate and determine the particularly Weather Attribute(WA),which...
详细信息
Thunderstorm detection based on the Atmospheric Electric Field(AEF)has evolved from time-domain models to space-domain *** is especially important to evaluate and determine the particularly Weather Attribute(WA),which is directly related to the detection reliability and *** this paper,a strategy is proposed to integrate three currently competitive WA's evaluation ***,a conventional evaluation method based on AEF statistical indicators is *** evaluation approaches include competing AEF-based predicted value intervals,and AEF classification based on fuzzy *** AEF attributes contribute to a more accurate AEF classification to different *** resulting dynamic weighting applied to these attributes improves the classification *** evaluation method is applied to evaluate the WA of a particular AEF,to obtain the corresponding evaluation *** integration in the proposed strategy takes the form of a score *** cumulative score levels correspond to different final WA *** imaging is performed to visualize thunderstorm activities using those AEFs already evaluated to exhibit thunderstorm *** results confirm that the proposed strategy effectively and reliably images thunderstorms,with a 100%accuracy of WA *** is the first study to design an integrated thunderstorm detection strategy from a new perspective of WA evaluation,which provides promising solutions for a more reliable and flexible thunderstorm detection.
Video forgery is one of the most serious problems affecting the credibility and reliability of video content. Therefore, detecting video forgery presents a major challenge for researchers due to the diversity of forge...
详细信息
Social media platforms serve as significant spaces for users to have conversations, discussions and express their opinions. However, anonymity provided to users on these platforms allows the spread of hate speech and ...
详细信息
作者:
Gote, Pradnyawant M.Kumar, PraveenVerma, PrateekYesankar, PrajyotPawar, AdeshSaratkar, Saniya
Faculty of Engineering and Technology Department of Computer Science & Design Maharashtra Wardha442001 India
Faculty of Engineering and Technology Department of Computer Science & Medical Engineering Maharashtra Wardha442001 India
Faculty of Engineering and Technology Department of Artificial Intelligence & Machine Learning Maharashtra Wardha442001 India
Faculty of Engineering and Technology Department of Artificial Intelligence & Data Science Maharashtra Wardha442001 India
The swift progression of wireless communication technologies-specifically from 5G to 6G is an approach that could be the most significant revolutionary leap towards changing connectivity and data transmission forever....
详细信息
暂无评论