This research motive is to present more realistic results through the fractional order derivatives of the Robots mathematical system (FORMS), which is used to detect the coronavirus-positive cases. This nonlinear FORM...
详细信息
Health care visualization through Internet of Things(IoT)over wireless sensor network(WSN)becomes a current research attention due to medical sensor evolution of *** digital technology-based communication system is wi...
详细信息
Health care visualization through Internet of Things(IoT)over wireless sensor network(WSN)becomes a current research attention due to medical sensor evolution of *** digital technology-based communication system is widely used in all *** of medical thing(IoMT)assisted health-care application ensures the continuous health monitoring of a patient and provides the early awareness of the one who is suffered without human *** smart medical devices may consume with limited resources and also the data generated by these devices are large in *** IoMT based applications suffer from the issues such as security,anonymity,privacy,and *** overcome these issues,data aggregation methods are the solution that can concatenate the data generated by the sensors and forward it into the base station through fog node with efficient encryption and *** article proposed a well-organized data aggregation and secured transmission *** data generated by the sensor are collected and *** nodes(AN)received the compressed data and concatenate *** concatenated and encrypted data is forward to fog node using the enhanced Paillier cryptogra-phy-based encryption with Message Authentication code(MAC).Fog node extracts the forwarded data from AN using Fog message extractor method(FME)with *** proposed system ensures data integrity,security and also protects from security *** proposed model is simulated in Net-work Simulator 2.35 and the evaluated simulation results proves that the aggregation with MAC code will ensures the security,privacy and also reduces the communication *** node usages in between Aggregator and base station,will reduce the cloud server/base station computational overhead and storage *** proposed ideology is compared with existing data aggregation schemes in terms of computational cost,storage cost,communication cost and energy *** of communica
In order to overcome the challenges caused by flash memories and also to protect against errors related to reading information stored in DNA molecules in the shotgun sequencing method, the rank modulation method has b...
详细信息
Recent progress made in the prediction,characterisation,and mitigation of multipactor discharge is reviewed for single‐and two‐surface ***,an overview of basic concepts including secondary electron emission,electron...
详细信息
Recent progress made in the prediction,characterisation,and mitigation of multipactor discharge is reviewed for single‐and two‐surface ***,an overview of basic concepts including secondary electron emission,electron kinetics under the force law,multipactor susceptibility,and saturation mechanisms is provided,followed by a discus-sion on multipactor mitigation *** strategies are categorised into two broad areas–mitigation by engineered devices and engineered radio frequency(rf)*** approach is useful in different *** advances in multipactor physics and engineering during the past decade,such as novel multipactor prediction methods,un-derstanding space charge effects,schemes for controlling multipacting particle trajec-tories,frequency domain analysis,high frequency effects,and impact on rf signal quality are *** addition to vacuum electron multipaction,multipactor‐induced ioni-zation breakdown is also reviewed,and the recent advances are summarised.
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by each of these devices can jeopardize the security of the entire ***,they can allow malicious software installed on end nodes to penetrate the *** paper presents a parallel ensemble model for threat hunting based on anomalies in the behavior of IIoT edge *** proposed model is flexible enough to use several state-of-the-art classifiers as the basic learner and efficiently classifies multi-class anomalies using the Multi-class AdaBoost and majority *** evaluations using a dataset consisting of multi-source normal records and multi-class anomalies demonstrate that our model outperforms existing approaches in terms of accuracy,F1 score,recall,and precision.
The concept of smart houses has grown in prominence in recent *** challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device **...
详细信息
The concept of smart houses has grown in prominence in recent *** challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device *** home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical *** paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in *** have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT *** system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing *** have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache *** feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time *** is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation ***,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber *** trial results support the proposed system and demonstrate its potential for use in everyday life.
The acquisition of medical images from various modalities can provide a number of practical challenges that can be addressed through medical image registration. Intensity-based registration methods, which are used in ...
详细信息
In this paper,a two-step iteration method is established which can be viewed as a generalization of the existing modulus-based methods for vertical linear complementarity problems given by He and Vong(***.134:108344,2...
详细信息
In this paper,a two-step iteration method is established which can be viewed as a generalization of the existing modulus-based methods for vertical linear complementarity problems given by He and Vong(***.134:108344,2022).The convergence analysis of the proposed method is established,which can improve the existing *** examples show that the proposed method is efficient with the two-step technique.
In computer vision applications like surveillance and remote sensing,to mention a few,deep learning has had considerable *** imaging still faces a number of difficulties,including intra-class similarity,a scarcity of ...
详细信息
In computer vision applications like surveillance and remote sensing,to mention a few,deep learning has had considerable *** imaging still faces a number of difficulties,including intra-class similarity,a scarcity of training data,and poor contrast skin lesions,notably in the case of skin *** optimisation-aided deep learningbased system is proposed for accurate multi-class skin lesion *** sequential procedures of the proposed system start with preprocessing and end with *** preprocessing step is where a hybrid contrast enhancement technique is initially proposed for lesion identification with healthy *** of flipping and rotating data,the outputs from the middle phases of the hybrid enhanced technique are employed for data augmentation in the next ***,two pre-trained deep learning models,MobileNetV2 and NasNet Mobile,are trained using deep transfer learning on the upgraded enriched ***,a dual-threshold serial approach is employed to obtain and combine the features of both *** next step was the variance-controlled Marine Predator methodology,which the authors proposed as a superior optimisation *** top features from the fused feature vector are classified using machine learning *** experimental strategy provided enhanced accuracy of 94.4%using the publicly available dataset ***,the proposed framework is evaluated compared to current approaches,with remarkable results.
The advancement of deep learning models has led to the creation of novel techniques for image and video synthesis. One such technique is the deepfake, which swaps faces among persons and then produces hyper-realistic ...
详细信息
暂无评论