Wearable technology is expanding rapidly in recent year. It is used in many applications in various domains, including affective computing. Affective computing is all about understanding and responding to human emotio...
详细信息
Wireless Sensor Network(WSN)technology is the real-time applica-tion that is growing rapidly as the result of smart *** power is one of the most significant resources in *** enhancing a power factor,the clustering tech...
详细信息
Wireless Sensor Network(WSN)technology is the real-time applica-tion that is growing rapidly as the result of smart *** power is one of the most significant resources in *** enhancing a power factor,the clustering techniques are *** the forward of data in WSN,more power is *** the existing system,it works with Load Balanced Cluster-ing Method(LBCM)and provides the lifespan of the network with scalability and *** the existing system,it does not deal with end-to-end delay and deliv-ery of *** overcoming these issues in WSN,the proposed Genetic Algo-rithm based on Chicken Swarm Optimization(GA-CSO)with Load Balanced Clustering Method(LBCM)is *** Algorithm generates chromosomes in an arbitrary method then the chromosomes values are calculated using Fitness *** Swarm Optimization(CSO)helps to solve the complex opti-mization ***,it consists of chickens,hens,and *** divides the chicken into *** Balanced Clustering Method(LBCM)maintains the energy during communication among the sensor nodes and also it balances the load in the *** proposed GA-CSO with LBCM improves the life-span of the ***,it minimizes the energy consumption and also bal-ances the load over the *** proposed method outperforms by using the following metrics such as energy efficiency,ratio of packet delivery,throughput of the network,lifetime of the sensor ***,the evaluation result shows the energy efficiency that has achieved 83.56%and the delivery ratio of the packet has reached 99.12%.Also,it has attained linear standard deviation and reduced the end-to-end delay as 97.32 ms.
Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden *** property makes it difficult for steganalysts’powerful data extraction t...
详细信息
Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden *** property makes it difficult for steganalysts’powerful data extraction tools to detect the hidden data and ensures high-quality stego image ***,using a seed key to generate non-repeated sequential numbers takes a long time because it requires specific mathematical *** addition,these numbers may cluster in certain *** hidden data in these clustered pixels will reduce the image quality,which steganalysis tools can ***,this paper proposes a data structure that safeguards the steganographic model data and maintains the quality of the stego *** paper employs the AdelsonVelsky and Landis(AVL)tree data structure algorithm to implement the randomization pixel selection technique for data *** AVL tree algorithm provides several advantages for image ***,it ensures balanced tree structures,which leads to efficient data retrieval and insertion ***,the self-balancing nature of AVL trees minimizes clustering by maintaining an even distribution of pixels,thereby preserving the stego image *** data structure employs the pixel indicator technique for Red,Green,and Blue(RGB)channel *** green channel serves as the foundation for building a balanced binary ***,the sender identifies the colored cover image and secret *** sender will use the two least significant bits(2-LSB)of RGB channels to conceal the data’s size and associated *** next step is to create a balanced binary tree based on the green *** the channel pixel indicator on the LSB of the green channel,we can conceal bits in the 2-LSB of the red or blue *** first four levels of the data structure tree will mask the data size,while subsequent levels will conceal the remaining digits of secret *** embedding the bits i
Uncompressed digital images need huge storage space and large transmission bandwidth for the transmission over the network. Image compression reduces the image size and enables the efficient storage and transmission o...
详细信息
Mycobacterium tuberculosis, the causal agent of tuberculosis, is a major global health concern. The most widely studied strain for understanding the mechanism of drug resistance is H37Rv. To identify possible therapeu...
详细信息
In neurosurgery to remove brain tumors, DICOM data, a medical imaging standard, is generated preoperatively using CT and MRI. This data is used for surgical planning. However, brain deformation problems, known as brai...
详细信息
Seamless communication between authorities, people, and smart devices is crucial in today's globally interconnected world. Unprecedented demands on software design result from the advent of ubiquitous connectivity...
详细信息
In this paper,we combine decision fusion methods with four metaheuristic algorithms(Particle Swarm Optimization(PSO)algorithm,Cuckoo search algorithm,modification of Cuckoo Search(CS McCulloch)algorithm and Genetic al...
详细信息
In this paper,we combine decision fusion methods with four metaheuristic algorithms(Particle Swarm Optimization(PSO)algorithm,Cuckoo search algorithm,modification of Cuckoo Search(CS McCulloch)algorithm and Genetic algorithm)in order to improve the image *** proposed technique based on fusing the data from Particle Swarm Optimization(PSO),Cuckoo search,modification of Cuckoo Search(CS McCulloch)and Genetic algorithms are obtained for improving magnetic resonance images(MRIs)*** algorithms are used to compute the accuracy of each method while the outputs are passed to fusion *** order to obtain parts of the points that determine similar membership values,we apply the different rules of incorporation for these *** proposed approach is applied to challenging applications:MRI images,gray matter/white matter of brain segmentations and original black/white images Behavior of the proposed algorithm is provided by applying to different medical *** is shown that the proposed method gives accurate results;due to the decision fusion produces the greatest improvement in classification accuracy.
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the...
详细信息
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the challenges of security risks and data analysis *** IIoT grows,cyber-attacks become more diverse and complex,making existing anomaly detection models less effective to *** this paper,an ensemble deep learning model that uses the benefits of the Long Short-Term Memory(LSTM)and the AutoEncoder(AE)architecture to identify out-of-norm activities for cyber threat hunting in IIoT is *** this model,the LSTM is applied to create a model on normal time series of data(past and present data)to learn normal data patterns and the important features of data are identified by AE to reduce data *** addition,the imbalanced nature of IIoT datasets has not been considered in most of the previous literature,affecting low accuracy and *** solve this problem,the proposed model extracts new balanced data from the imbalanced datasets,and these new balanced data are fed into the deep LSTM AE anomaly detection *** this paper,the proposed model is evaluated on two real IIoT datasets-Gas Pipeline(GP)and Secure Water Treatment(SWaT)that are imbalanced and consist of long-term and short-term dependency on *** results are compared with conventional machine learning classifiers,Random Forest(RF),Multi-Layer Perceptron(MLP),Decision Tree(DT),and Super Vector Machines(SVM),in which higher performance in terms of accuracy is obtained,99.3%and 99.7%based on GP and SWaT datasets,***,the proposed ensemble model is compared with advanced related models,including Stacked Auto-Encoders(SAE),Naive Bayes(NB),Projective Adaptive Resonance Theory(PART),Convolutional Auto-Encoder(C-AE),and Package Signatures(PS)based LSTM(PS-LSTM)model.
Wireless sensor network is a rapidly growing and challenging field as they are constrained by energy utilization, computation cost, network capacity, and security. Hence conventional network security schemes cannot be...
详细信息
暂无评论