K-means algorithm is one of the well-known unsupervised machine learning algorithms. The algorithm typically finds out distinct non-overlapping clusters in which each point is assigned to a group. The minimum squared ...
详细信息
In this paper, a semantic information retrieval framework is presented to improve the precision of search results by concentrating on the context of concepts is presented. Instead of the keyword matching technique, th...
详细信息
The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT *** Channel Attacks(SCA)are one of the major *** prime objective of SCA is to acquire the information by observing th...
详细信息
The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT *** Channel Attacks(SCA)are one of the major *** prime objective of SCA is to acquire the information by observing the power consumption,electromagnetic(EM)field,timing analysis,and acoustics of the ***,the attackers perform statistical functions to recover the *** Encryption Standard(AES)algorithm has proved to be a good security solution for constrained IoT *** paper implements a simulation model which is used to modify theAES algorithm using logicalmasking *** invariant of the AES algorithm hides the array of bits during substitution byte transformation of *** model is used against SCAand particularly Power Analysis Attacks(PAAs).Simulation model is designed on MATLAB *** will give better solution by hiding power profiles of the IoT devices against *** future,the lightweight AES algorithm with false key mechanisms and power reduction techniques such as wave dynamic differential logic(WDDL)will be used to safeguard IoT devices against side channel attacks by using Arduino and field programmable gate array(FPGA).
Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable se...
详细信息
Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable security *** spam detection techniques often struggle to keep pace with the evolving tactics employed by spammers,resulting in user dissatisfaction and potential data *** address this issue,we introduce the Divide and Conquer-Generative Adversarial Network Squeeze and Excitation-Based Framework(DaC-GANSAEBF),an innovative deep-learning model designed to identify spam *** framework incorporates cutting-edge technologies,such as Generative Adversarial Networks(GAN),Squeeze and Excitation(SAE)modules,and a newly formulated Light Dual Attention(LDA)mechanism,which effectively utilizes both global and local attention to discern intricate patterns within textual *** approach significantly improves efficiency and accuracy by segmenting scanned email content into smaller,independently evaluated *** model underwent training and validation using four publicly available benchmark datasets,achieving an impressive average accuracy of 98.87%,outperforming leading methods in the *** findings underscore the resilience and scalability of DaC-GANSAEBF,positioning it as a viable solution for contemporary spam detection *** framework can be easily integrated into existing technologies to enhance user security and reduce the risks associated with spam.
Addressing data imbalance is a critical difficulty in the setting of a heavily skewed dataset because the dominant class disproportionately influences classifier accuracy, especially when inadequate data impede the le...
详细信息
Recently, the Internet of Things (IoT) has been considered for its applications in diverse settings, such as intelligent urban environments, advanced manufacturing facilities, and environmental surveillance. However, ...
详细信息
Recently, the Internet of Things (IoT) has been considered for its applications in diverse settings, such as intelligent urban environments, advanced manufacturing facilities, and environmental surveillance. However, significant obstacles exist in the implementation of these IoT solutions due to various issues, such as heterogeneity, diverse application requirements, restricted resources, and massive connectivity. To tackle these issues, merging satellite-based networks with conventional ground-based networks has been proposed as an effective and affordable option for enhancing IoT device connectivity.
Wireless sensor network (WSN) applications are added day by day owing to numerous global uses (by the military, for monitoring the atmosphere, in disaster relief, and so on). Here, trust management is a main challenge...
详细信息
Medical image encryption is a mandatory process in various healthcare, Internet of Medical Things (IoMT) and cloud services. This paper provides a robust cryptosystem based on a 3D chaotic map for the medical image en...
详细信息
Underwater wireless sensor networks can monitor ocean information, which provides a new approach to marine environmental monitoring, disaster warning and resource exploration. However, the development of underwater wi...
详细信息
In the ever-evolving landscape of urban development, innovative solutions are constantly sought to improve the quality of life of residents. Moving away from conventional static street lighting, one such transformativ...
详细信息
暂无评论