Distributed Denial of Service (DDoS) attacks pose a significant threat to network infrastructures, leading to service disruptions and potential financial losses. In this study, we propose an ensemble-based approach fo...
详细信息
Preserving privacy is imperative in the new unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC)architecture to ensure that sensitive information is protected and kept secure throughout the ***,efficiency ...
详细信息
Preserving privacy is imperative in the new unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC)architecture to ensure that sensitive information is protected and kept secure throughout the ***,efficiency must be considered while developing such a privacy-preserving scheme because the devices involved in these architectures are resource *** study proposes a lightweight and efficient authentication scheme for *** proposed scheme is a hardware-based password-less authentication mechanism that is based on the fact that temporal and memory-related efficiency can be significantly improved while maintaining the data security by adopting a hardwarebased solution with a simple *** proposed scheme works in four stages:system initialization,EU registration,EU authentication,and session *** is implemented as a single hardware chip comprising registers and XOR gates,and it can run the entire process in one clock ***,the proposed scheme has significantly higher efficiency in terms of runtime and memory consumption compared to other prevalent methods in the *** are conducted to evaluate the proposed authentication *** results show that the scheme has an average execution time of 0.986 ms and consumes average memory of 34 *** hardware execution time is approximately 0.39 ns,which is a significantly less than the prevalent schemes,whose execution times range in ***,the security of the proposed scheme is examined,and it is resistant to brute-force *** 1.158×10^(77) trials are required to overcome the system’s security,which is not feasible using fastest available processors.
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encrypt...
详细信息
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encryption and decryption algorithms are being *** cloud computation,data processing,storage,and transmission can be done through laptops andmobile *** Storing in cloud facilities is expanding each day and data is the most significant asset of *** important concern with the transmission of information to the cloud is security because there is no perceivability of the client’s *** have to be dependent on cloud service providers for assurance of the platform’s *** security and privacy issues reduce the progression of cloud computing and add ***;most of the data that is stored on cloud servers is in the form of images and photographs,which is a very confidential form of data that requires secured *** this research work,a public key cryptosystem is being implemented to store,retrieve and transmit information in cloud computation through a modified Rivest-Shamir-Adleman(RSA)algorithm for the encryption and decryption of *** implementation of a modified RSA algorithm results guaranteed the security of data in the cloud *** enhance the user data security level,a neural network is used for user authentication and ***;the proposed technique develops the performance of detection as a loss function of the bounding *** Faster Region-Based Convolutional Neural Network(Faster R-CNN)gets trained on images to identify authorized users with an accuracy of 99.9%on training.
Autism spectrum disorder (ASD) is a complex neurodevelopmental condition characterized by challenges in social interaction, communication difficulties, repetitive behaviors, and a range of strengths and differences in...
详细信息
Autism spectrum disorder (ASD) is a complex neurodevelopmental condition characterized by challenges in social interaction, communication difficulties, repetitive behaviors, and a range of strengths and differences in cognitive abilities. Early ASD diagnosis using machine learning and deep learning techniques is crucial for preventing its severity and long-term effects. The articles published in this area have only applied different machine learning algorithms, and a notable gap observed is the absence of an in-depth analysis in terms of hyperparameter tuning and the type of dataset used in this context. This study investigated predictive modeling for ASD traits by leveraging two distinct datasets: (i) a raw CSV dataset with tabular data and (ii) an image dataset with facial expression. This study aims to conduct an in-depth analysis of ASD trait prediction in adults and toddlers by doing hyper optimized and interpreting the result through explainable AI. In the CSV dataset, a comprehensive exploration of machine learning and deep learning algorithms, including decision trees, Naive Bayes, random forests, support vector machines (SVM), k-nearest neighbors (KNN), logistic regression, XGBoost, and ANN, was conducted. XGBoost emerged as the most effective machine learning algorithm, achieving an accuracy of 96.13%. The deep learning ANN model outperformed the traditional machine learning algorithms with an accuracy of 99%. Additionally, an ensemble model combining a decision tree, random forest, SVM, KNN, and logistic regression demonstrated superior performance, yielding an accuracy of 96.67%. The XGBoost model, utilized in hyperparameter optimization for CSV data, exhibited a substantial accuracy increase, reaching 98%. For the image dataset, advanced deep learning models, such as ResNet50, VGG16, Boosting, and Bagging, were employed. The bagging model outperformed the others, achieving an impressive accuracy of 99%. Subsequent hyperparameter optimization was conduct
Task scheduling, which is important in cloud computing, is one of the most challenging issues in this area. Hence, an efficient and reliable task scheduling approach is needed to produce more efficient resource employ...
详细信息
Infrared imaging technology is capable of capturing the thermal radiation emitted by the human body in conditions with insufficient visible light. Consequently, infrared behavior recognition leverages this capability ...
详细信息
The exchange of multimedia data is secured using watermarking. Typically, embedding a watermark involves optimising scheme parameters, frequently by using meta-heuristic optimization methods. Despite the fact that DNN...
详细信息
The proliferation of physical objects and intelligent systems, along with their inherent differences, such as levels of device mobility, generated data volume, required storage memory, and complexity in data processin...
详细信息
Dear Editor,This letter presents a new transfer learning framework for the deep multi-agent reinforcement learning(DMARL) to reduce the convergence difficulty and training time when applying DMARL to a new scenario [1...
详细信息
Dear Editor,This letter presents a new transfer learning framework for the deep multi-agent reinforcement learning(DMARL) to reduce the convergence difficulty and training time when applying DMARL to a new scenario [1], [2].
Internet of Things(IoT)is the most widespread and fastest growing technology *** to the increasing of IoT devices connected to the Internet,the IoT is the most technology under security *** IoT devices are not designe...
详细信息
Internet of Things(IoT)is the most widespread and fastest growing technology *** to the increasing of IoT devices connected to the Internet,the IoT is the most technology under security *** IoT devices are not designed with security because they are resource constrained ***,having an accurate IoT security system to detect security attacks is *** Detection Systems(IDSs)using machine learning and deep learning techniques can detect security attacks *** paper develops an IDS architecture based on Convolutional Neural Network(CNN)and Long Short-Term Memory(LSTM)deep learning *** implement our model on the UNSW-NB15 dataset which is a new network intrusion dataset that cate-gorizes the network traffic into normal and attacks *** this work,interpolation data preprocessing is used to compute the missing ***,the imbalanced data problem is solved using a synthetic data generation *** experiments have been implemented to compare the performance results of the proposed model(CNN+LSTM)with a basic model(CNN only)using both balanced and imbalanced ***,with some state-of-the-art machine learning classifiers(Decision Tree(DT)and Random Forest(RF))using both balanced and imbalanced *** results proved the impact of the balancing *** proposed hybrid model with the balance technique can classify the traffic into normal class and attack class with reasonable accuracy(92.10%)compared with the basic CNN model(89.90%)and the machine learning(DT 88.57%and RF 90.85%)***,comparing the proposed model results with the most related works shows that the proposed model gives good results compared with the related works that used the balance techniques.
暂无评论