The current cyber-attack environment has put even the most protected systems at risk as the hackers are nowmodifying technologies to exploit even the tiniest of weaknesses and infiltrate *** this situation,it’s criti...
详细信息
The current cyber-attack environment has put even the most protected systems at risk as the hackers are nowmodifying technologies to exploit even the tiniest of weaknesses and infiltrate *** this situation,it’s critical to design and construct software that is both secure and *** security is the most well-defined aspect of health information software systems,it is equally significant to prioritise sustainability because any health information software system will be more effective if it provides both security and sustainability to the customers at the same *** this league,it is crucial to determine those characteristics in the systems that can help in the accurate assessment of the sustainable-security of the health information software during the development *** research work employed the Fuzzy Analytic Network Process(Fuzzy ANP)to estimate the impact of the overall sustainable-security of health information software systems and their characteristics in order to achieve a high level of ***,the study validates the efficacy of the Fuzzy ANP procedure by testing it on five different versions of a health information software system through Fuzzy Technique for Order of Preference by Similarity to Ideal Solutions(Fuzzy TOPSIS).Despite the sensitivity of the health information software systems,this study employedmultiple versions of health information software *** compared with the existing procedures for testing the sustainable-security of health information software systems,the outcomes were conclusive and significantly more *** saving time and resources,the mechanism suggested in this research work aims to establish an outline that software practitioners can follow to enhance the sustainablesecurity of health information software systems.
Speech emotion recognition(SER)is an important research problem in human-computer interaction *** representation and extraction of features are significant challenges in SER *** the promising results of recent studies...
详细信息
Speech emotion recognition(SER)is an important research problem in human-computer interaction *** representation and extraction of features are significant challenges in SER *** the promising results of recent studies,they generally do not leverage progressive fusion techniques for effective feature representation and increasing receptive *** mitigate this problem,this article proposes DeepCNN,which is a fusion of spectral and temporal features of emotional speech by parallelising convolutional neural networks(CNNs)and a convolution layer-based *** parallel CNNs are applied to extract the spectral features(2D-CNN)and temporal features(1D-CNN)representations.A 2D-convolution layer-based transformer module extracts spectro-temporal features and concatenates them with features from parallel *** learnt low-level concatenated features are then applied to a deep framework of convolutional blocks,which retrieves high-level feature representation and subsequently categorises the emotional states using an attention gated recurrent unit and classification *** fusion technique results in a deeper hierarchical feature representation at a lower computational cost while simultaneously expanding the filter depth and reducing the feature *** Berlin Database of Emotional Speech(EMO-BD)and Interactive Emotional Dyadic Motion Capture(IEMOCAP)datasets are used in experiments to recognise distinct speech *** efficient spectral and temporal feature representation,the proposed SER model achieves 94.2%accuracy for different emotions on the EMO-BD and 81.1%accuracy on the IEMOCAP dataset *** proposed SER system,DeepCNN,outperforms the baseline SER systems in terms of emotion recognition accuracy on the EMO-BD and IEMOCAP datasets.
Software-Defined Networking (SDN) represents a significant shift in network architecture, providing exceptional programmability, flexibility, and simplified management. However, this paradigm shift introduces a unique...
详细信息
In an era marked by escalating cybersecurity threats,our study addresses the challenge of malware variant detection,a significant concern for amultitude of sectors including petroleum and mining *** paper presents an ...
详细信息
In an era marked by escalating cybersecurity threats,our study addresses the challenge of malware variant detection,a significant concern for amultitude of sectors including petroleum and mining *** paper presents an innovative Application Programmable Interface(API)-based hybrid model designed to enhance the detection performance of malware *** model integrates eXtreme Gradient Boosting(XGBoost)and an Artificial Neural Network(ANN)classifier,offering a potent response to the sophisticated evasion and obfuscation techniques frequently deployed by malware *** model’s design capitalizes on the benefits of both static and dynamic analysis to extract API-based features,providing a holistic and comprehensive view of malware *** these features,we construct two XGBoost predictors,each of which contributes a valuable perspective on the malicious activities under *** outputs of these predictors,interpreted as malicious scores,are then fed into an ANN-based classifier,which processes this data to derive a final *** strength of the proposed model lies in its capacity to leverage behavioral and signature-based features,and most importantly,in its ability to extract and analyze the hidden relations between these two types of *** efficacy of our proposed APIbased hybrid model is evident in its performance *** outperformed other models in our tests,achieving an impressive accuracy of 95%and an F-measure of 93%.This significantly improved the detection performance of malware variants,underscoring the value and potential of our approach in the challenging field of cybersecurity.
Brain tumors are considered as most fatal *** reduce the risk of death,early identification of the disease is *** of the best available methods to evaluate brain tumors is Magnetic resonance Images(MRI).Brain tumor de...
详细信息
Brain tumors are considered as most fatal *** reduce the risk of death,early identification of the disease is *** of the best available methods to evaluate brain tumors is Magnetic resonance Images(MRI).Brain tumor detection and segmentation are tough as brain tumors may vary in size,shape,and *** makes manual detection of brain tumors by exploring MRI a tedious job for radiologists and doctors’.So an automated brain tumor detection and segmentation is *** work suggests a Region-based Convolution Neural Network(RCNN)approach for automated brain tumor identification and segmentation using MR images,which helps solve the difficulties of brain tumor identification efficiently and *** methodology is based on the accurate and efficient selection of tumorous *** reduces computational complexity and *** have validated the designed experimental setup on a standard dataset,BraTS *** used binary evaluation matrices based on Dice Similarity Coefficient(DSC)and Mean Average Precision(mAP).The segmentation results are compared with state-of-the-art methodologies to demonstrate the effectiveness of the proposed *** suggested approach attained an averageDSC of 0.92 andmAP 0.92 for 10 patients,while on the whole dataset,the scores are DSC 0.89 and mAP *** following results clearly show the performance efficiency of the proposed methodology.
This paper deals with the consensus tracking of multi-agent systems in the presence of some Byzantine agents. Steering the agents toward a predefined reference via model predictive control and, besides, encountering t...
详细信息
Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last *** achieves safe access to systems using biometrics instead of the traditional *** utilization of a biometric in it...
详细信息
Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last *** achieves safe access to systems using biometrics instead of the traditional *** utilization of a biometric in its original format makes it usable only ***,a cancelable biometric template should be used,so that it can be replaced when it is *** biometrics aims to enhance the security and privacy of biometric *** encryption is an efficient technique to be used in order to generate cancelable biometric *** this paper,a highly-secure encryption algorithm is proposed to ensure secure biometric data in verification *** considered biometric in this paper is the speech *** speech signal is transformed into its ***,the spectrogram is encrypted using two cascaded optical encryption *** first algorithm is the Optical Scanning Holography(OSH)for its efficiency as an encryption *** OSH encrypted spectrogram is encrypted using Double Random Phase Encoding(DRPE)by implementing two Random Phase Masks(RPMs).After the two cascaded optical encryption algorithms,the cancelable template is *** verification is implemented through correlation estimation between enrolled and test templates in their encrypted *** the correlation value is larger than a threshold value,the user is *** threshold value can be determined from the genuine and imposter correlation distribution curves as the midpoint between the two *** implementation of optical encryption is adopted using its software rather than the optical *** efficiency of the proposed cancelable biometric algorithm is illustrated by the simulation *** can improve the biometric data security without deteriorating the recognition *** results give close-to-zero This values for the Equal Error Rate(EER)and close-to-one values for the Area under Receiver Operator Charact
Deep learning-based hyperspectral image (HSI) compression has recently attracted great attention in remote sensing due to the growth of hyperspectral data archives. Most of the existing models achieve either spectral ...
详细信息
This elaboration presents the synthesis of the Takagi-Sugeno type Fuzzy Logic controller realizing the programmable parameters of the state feedback controller together with the steady state current for the active mag...
详细信息
Autonomous vehicles, lifestyles, and businesses related to the tourism industry are facing a lot of security issues when the digital revolution is considered in the digital version of security management. The aim of t...
详细信息
暂无评论