Optoelectronic synapses that integrate visual perception and pre-processing hold significant potential for neuromorphic vision systems(NVSs). However, due to a lack of wavelength sensitivity, existing NVS mainly foc...
详细信息
Optoelectronic synapses that integrate visual perception and pre-processing hold significant potential for neuromorphic vision systems(NVSs). However, due to a lack of wavelength sensitivity, existing NVS mainly focuses on gray-scale image processing, making it challenging to recognize color images. Additionally, the high power consumption of optoelectronic synapses, compared to the 10 fJ energy consumption of biological synapses, limits their broader application. To address these challenges, an energy-efficient NVS capable of color target recognition in a noisy environment was developed,utilizing a MoS2optoelectronic synapse with wavelength sensitivity. Benefiting from the distinct photon capture capabilities of 450, 535, and 650 nm light, the optoelectronic synapse exhibits wavelength-dependent synaptic plasticity, including excitatory postsynaptic current(EPSC), paired-pulse facilitation(PPF), and long-term plasticity(LTP). These properties can effectively mimic the visual memory and color discrimination functions of the human vision system. Results demonstrate that the NVS, based on MoS2optoelectronic synapses, can eliminate the color noise at the sensor level, increasing color image recognition accuracy from 50% to 90%. Importantly, the optoelectronic synapse operates at a low voltage spike of0.0005 V, consuming only 0.075 fJ per spike, surpassing the energy efficiency of both existing optoelectronic and biological synapses. This ultra-low power, color-sensitive device eliminates the need for color filters and offers great promise for future deployment in filter-free NVS.
Open networks and heterogeneous services in the Internet of Vehicles(IoV)can lead to security and privacy *** key requirement for such systems is the preservation of user privacy,ensuring a seamless experience in driv...
详细信息
Open networks and heterogeneous services in the Internet of Vehicles(IoV)can lead to security and privacy *** key requirement for such systems is the preservation of user privacy,ensuring a seamless experience in driving,navigation,and *** privacy needs are influenced by various factors,such as data collected at different intervals,trip durations,and user *** address this,the paper proposes a Support Vector Machine(SVM)model designed to process large amounts of aggregated data and recommend privacy preserving *** model analyzes data based on user demands and interactions with service providers or neighboring *** aims to minimize privacy risks while ensuring service continuity and *** SVMmodel helps validate the system’s reliability by creating a hyperplane that distinguishes between maximum and minimum privacy *** results demonstrate the effectiveness of the proposed SVM model in enhancing both privacy and service performance.
The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network *** environments pose significant challenges in maintaining privacy and *** approaches,such as IDS,have be...
详细信息
The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network *** environments pose significant challenges in maintaining privacy and *** approaches,such as IDS,have been developed to tackle these ***,most conventional Intrusion Detection System(IDS)models struggle with unseen cyberattacks and complex high-dimensional *** fact,this paper introduces the idea of a novel distributed explainable and heterogeneous transformer-based intrusion detection system,named INTRUMER,which offers balanced accuracy,reliability,and security in cloud settings bymultiplemodulesworking together within *** traffic captured from cloud devices is first passed to the TC&TM module in which the Falcon Optimization Algorithm optimizes the feature selection process,and Naie Bayes algorithm performs the classification of *** selected features are classified further and are forwarded to the Heterogeneous Attention Transformer(HAT)*** this module,the contextual interactions of the network traffic are taken into account to classify them as normal or malicious *** classified results are further analyzed by the Explainable Prevention Module(XPM)to ensure trustworthiness by providing interpretable *** the explanations fromthe classifier,emergency alarms are transmitted to nearby IDSmodules,servers,and underlying cloud devices for the enhancement of preventive *** experiments on benchmark IDS datasets CICIDS 2017,Honeypots,and NSL-KDD were conducted to demonstrate the efficiency of the INTRUMER model in detecting network trafficwith high accuracy for different *** outperforms state-of-the-art approaches,obtaining better performance metrics:98.7%accuracy,97.5%precision,96.3%recall,and 97.8%*** results validate the robustness and effectiveness of INTRUMER in securing diverse cloud environments against sophisticated cyber threats.
Diabetes is a serious health condition that can cause several issues in human body organs such as the heart and kidney as well as a serious eye disease called diabetic retinopathy(DR).Early detection and treatment are...
详细信息
Diabetes is a serious health condition that can cause several issues in human body organs such as the heart and kidney as well as a serious eye disease called diabetic retinopathy(DR).Early detection and treatment are crucial to prevent complete blindness or partial vision *** detection methods,which involve ophthalmologists examining retinal fundus images,are subjective,expensive,and ***,this study employs artificial intelligence(AI)technology to perform faster and more accurate binary classifications and determine the presence of *** this regard,we employed three promising machine learning models namely,support vector machine(SVM),k-nearest neighbors(KNN),and Histogram Gradient Boosting(HGB),after carefully selecting features using transfer learning on the fundus images of the Asia Pacific Tele-Ophthalmology Society(APTOS)(a standard dataset),which includes 3662 images and originally categorized DR into five levels,now simplified to a binary format:No DR and DR(Classes 1-4).The results demonstrate that the SVM model outperformed the other approaches in the literature with the same dataset,achieving an excellent accuracy of 96.9%,compared to 95.6%for both the KNN and HGB *** approach is evaluated by medical health professionals and offers a valuable pathway for the early detection of DR and can be successfully employed as a clinical decision support system.
The utilization of Data-Driven Machine Learning (DDML) models in the healthcare sector poses unique challenges due to the crucial nature of clinical decision-making and its impact on patient outcomes. A primary concer...
详细信息
Wireless sensor networks (WSNs) have found extensive applications across various fields, significantly enhancing the convenience in our daily lives. Hence, an in-creasing number of researchers are directing their atte...
详细信息
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the priv...
详细信息
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the privacy of patients. As medical information becomes more widely available, security measures must be established to protect confidentiality, integrity, and availability. Image steganography was recently proposed as an extra data protection mechanism for medical records. This paper describes a data-hiding approach for DICOM medical pictures. To ensure secrecy, we use Adversarial Neural Cryptography with SHA-256 (ANC-SHA-256) to encrypt and conceal the RGB patient picture within the medical image's Region of Non-Interest (RONI). To ensure anonymity, we use ANC-SHA-256 to encrypt the RGB patient image before embedding. We employ a secure hash method with 256bit (SHA-256) to produce a digital signature from the information linked to the DICOM file to validate the authenticity and integrity of medical pictures. Many tests were conducted to assess visual quality using diverse medical datasets, including MRI, CT, X-ray, and ultrasound cover pictures. The LFW dataset was chosen as a patient hidden picture. The proposed method performs well in visual quality measures including the PSNR average of 67.55, the NCC average of 0.9959, the SSIM average of 0.9887, the UQI average of 0.9859, and the APE average of 3.83. It outperforms the most current techniques in these visual quality measures (PSNR, MSE, and SSIM) across six medical assessment categories. Furthermore, the proposed method offers great visual quality while being resilient to physical adjustments, histogram analysis, and other geometrical threats such as cropping, rotation, and scaling. Finally, it is particularly efficient in telemedicine applications with high achieving security with a ratio of 99% during remote transmission of Electronic Patient Records (EPR) over the Internet, which safeguards the patien
Digitization offers a solution to the challenges associated with managing and retrieving paper-based documents. However, these paper-based documents must be converted into a format that digital machines can comprehend...
详细信息
Desertification greatly affects land deterioration, farming efficiency, economic growth, and health, especially in Gulf nations. Climate change has worsened desertification, making developmental issues in the area eve...
详细信息
Desertification greatly affects land deterioration, farming efficiency, economic growth, and health, especially in Gulf nations. Climate change has worsened desertification, making developmental issues in the area even more difficult. This research presents an enhanced framework utilizing the Internet of Things (IoT) for ongoing monitoring, data gathering, and analysis to evaluate desertification patterns. The framework utilizes Bayesian Belief Networks (BBN) to categorize IoT data, while a low-latency processing method on edge computing platforms enables effective detection of desertification trends. The classified data is subsequently analyzed using an Artificial Neural Network (ANN) optimized with a Genetic Algorithm (GA) for forecasting decisions. Using cloud computing infrastructure, the ANN-GA model examines intricate data connections to forecast desertification risk elements. Moreover, the Autoregressive Integrated Moving Average (ARIMA) model is employed to predict desertification over varied time intervals. Experimental simulations illustrate the effectiveness of the suggested framework, attaining enhanced performance in essential metrics: Temporal Delay (103.68 s), Classification Efficacy—Sensitivity (96.44 %), Precision (95.56 %), Specificity (96.97 %), and F-Measure (96.69 %)—Predictive Efficiency—Accuracy (97.76 %) and Root Mean Square Error (RMSE) (1.95 %)—along with Reliability (93.73 %) and Stability (75 %). The results of classification effectiveness and prediction performance emphasize the framework's ability to detect high-risk zones and predict the severity of desertification. This innovative method improves the comprehension of desertification processes and encourages sustainable land management practices, reducing the socio-economic impacts of desertification and bolstering at-risk ecosystems. The results of the study hold considerable importance for enhancing regional efforts in combating desertification, ensuring food security, and formulatin
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the *** technology has been widely used and has developed rapidly in big data systems across ...
详细信息
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the *** technology has been widely used and has developed rapidly in big data systems across various *** increasing number of users are participating in application systems that use blockchain as their underlying *** the number of transactions and the capital involved in blockchain grow,ensuring information security becomes *** the verification of transactional information security and privacy has emerged as a critical ***-based verification methods can effectively eliminate the need for centralized third-party ***,the efficiency of nodes in storing and verifying blockchain data faces unprecedented *** address this issue,this paper introduces an efficient verification scheme for transaction ***,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all ***,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous *** analyses and simulation experiments conclusively demonstrate the superior performance of this *** verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional *** findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of *** scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.
暂无评论