The rapid evolution of healthcare technology, no-tably the integration of the Internet of Medical Things (loMT), has revolutionized patient care, diagnosis, and treatment method-ologies. However, this progress introdu...
详细信息
To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task *** this purpose,authen-tication protocol plays a vital role in web communication which securely transfers data from on...
详细信息
To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task *** this purpose,authen-tication protocol plays a vital role in web communication which securely transfers data from one party to *** authentication works via OpenID,Kerberos,password authentication protocols,***,there are still some limitations present in the reported security *** this paper,the presented anticipated strategy secures both Web-based attacks by leveraging encoded emails and a novel password form pattern *** proposed OpenID-based encrypted Email’s Authentication,Authorization,and Accounting(EAAA)protocol ensure security by relying on the email authenticity and a Special Secret Encrypted Alphanumeric String(SSEAS).This string is deployed on both the relying party and the email server,which is unique and *** first authentication,OpenID Uniform Resource Locator(URL)identity,is performed on the identity provider side.A second authentication is carried out by the hidden Email’s server side and receives a third authentication *** Email’s third SSEAS authentication link manages on the relying party(RP).Compared to existing cryptographic single sign-on protocols,the EAAA protocol ensures that an OpenID URL’s identity is secured from MITM and phishing *** study manages two attacks such as MITM and phishing attacks and gives 339 ms response time which is higher than the already reported methods,such as Single Sign-On(SSO)and *** experimental sites were examined by 72 information technology(IT)specialists,who found that 88.89%of respondents successfully validated the user authorization provided to them via *** proposed EAAA protocol minimizes the higher-level risk of MITM and phishing attacks in an OpenID-based atmosphere.
Smartphones have grown popular in the current digital era among people. Map-based applications are one of many that are used daily by people to acquire information about specific locations. Google Maps and Waze are tw...
详细信息
Indian agriculture is striving to achieve sustainable intensification,the system aiming to increase agricultural yield per unit area without harming natural resources and the *** farming employs technology to improve ...
详细信息
Indian agriculture is striving to achieve sustainable intensification,the system aiming to increase agricultural yield per unit area without harming natural resources and the *** farming employs technology to improve *** and accurate analysis and diagnosis of plant disease is very helpful in reducing plant diseases and improving plant health and food crop *** disease experts are not available in remote areas thus there is a requirement of automatic low-cost,approachable and reliable solutions to identify the plant diseases without the laboratory inspection and expert’s *** learning-based computer vision techniques like Convolutional Neural Network(CNN)and traditional machine learning-based image classification approaches are being applied to identify plant *** this paper,the CNN model is proposed for the classification of rice and potato plant leaf *** leaves are diagnosed with bacterial blight,blast,brown spot and tungro *** leaf images are classified into three classes:healthy leaves,early blight and late blight *** leaf dataset with 5932 images and 1500 potato leaf images are used in the *** proposed CNN model was able to learn hidden patterns from the raw images and classify rice images with 99.58%accuracy and potato leaves with 97.66%*** results demonstrate that the proposed CNN model performed better when compared with other machine learning image classifiers such as Support Vector Machine(SVM),K-Nearest Neighbors(KNN),Decision Tree and Random Forest.
Finding materials with specific properties is a hot topic in materials *** materials design relies on empirical and trial-and-error methods,requiring extensive experiments and time,resulting in high *** the developmen...
详细信息
Finding materials with specific properties is a hot topic in materials *** materials design relies on empirical and trial-and-error methods,requiring extensive experiments and time,resulting in high *** the development of physics,statistics,computerscience,and other fields,machine learning offers opportunities for systematically discovering new *** through machine learning-based inverse design,machine learning algorithms analyze the mapping relationships between materials and their properties to find materials with desired *** paper first outlines the basic concepts of materials inverse design and the challenges faced by machine learning-based approaches to materials inverse ***,three main inverse design methods—exploration-based,model-based,and optimization-based—are analyzed in the context of different application ***,the applications of inverse design methods in alloys,optical materials,and acoustic materials are elaborated on,and the prospects for materials inverse design are *** authors hope to accelerate the discovery of new materials and provide new possibilities for advancing materials science and innovative design methods.
Music recommendation systems have evolved from simple playlist curation techniques to sophisticated AI-driven models capable of analyzing human emotions for personalized song suggestions. Emotion-based music recommend...
详细信息
The paper proposes 'AdaptVR' a virtual reality (VR) system designed to enhance dental training through realistic real tile simulations and adaptive learning environment, to overcome traditional training challe...
详细信息
Traffic blockage is described as the transport system's condition, characterized by the automobiles' low speed. It is also because of roads, climatic conditions, particular zones, temperature, the number of ev...
详细信息
The Multi-Way Number Partitioning (MWNP) problem is to divide a multiset of n numbers into k subsets in such a way that the largest subset sum is minimized. MWNP is an NP-hard combinatorial optimization problem which ...
详细信息
Dual connectivity (DC) can increase network capacity by allowing a user to simultaneously connect to more than one Radio Access Technology (RAT) at the same time. Although it offers higher network capacity, power mana...
详细信息
暂无评论