Remote sensing images present classification challenges due to the complexity of their structural and spatial patterns. This research explores a hybrid approach that combines convolutional neural network (CNN) and att...
详细信息
作者:
Khadse, ShrikantGourshettiwar, PalashPawar, Adesh
Faculty of Engineering and Technology Wardha442001 India
Faculty of Engineering and Technology Department of Computer Science and Medical Engineering Wardha442001 India
Department of Computer Science and Medical Engineering Maharashtra Wardha442001 India
Meta-learning aims to create Artificial Intelligence (AI) systems that can adapt to new tasks and improve their performance over time without extensive retraining. The advent of meta-learning paradigms has fundamental...
详细信息
This research explores the use of haptic technology in heavy vehicle driving safety, focusing on its potential to enhance driver assistance systems and improve driving experience. The study addresses driver-induced ca...
详细信息
作者:
Petkar, Taniya G.Kumar, PraveenSarate, Kirtiksha U.
Faculty of Engineering and Technology Department of Computer Science & Medical Engineering Maharashtra Sawangi Wardha442001 India
Faculty of Engineering and Technology Department of Computer Science and Design Maharashtra Sawangi Wardha442001 India
By enabling precise, individualized, and effective treatments, the integration of artificial intelligence (AI) and machine learning (ML) into wound and skin healing is revolutionizing healthcare. Artificial intelligen...
详细信息
作者:
Warbhe, Mohan K.Bore, Joy JordanChaudari, Shiv Nath
Faculty of Engineering and Technology Department of Computer Science and Design Maharashtra Sawangi Wardha442001 India
Faculty of Engineering and Technology Department of Computer Science and Medical Engineering MaharashtraSawangi Wardha442001 India
The proposed web application for tomato leaf disease detection exemplifies the transformative power of Artificial Intelligence and computer Vision in modern agriculture. Addressing the critical issue of early and accu...
详细信息
Artificial Intelligence (AI) and Big Data Analytics are greatly transforming the healthcare scenario by facilitating the early detection of diseases, personalized medicine, and improved public health interventions. AI...
详细信息
This article studies the natural convection in an annular porous microchannel in case of one wall being heated and another being cooled. For the first time, such a problem was solved using discrete symmetries of the N...
详细信息
The Internet has been enhanced recently by blockchain and Internet of Things(IoT)*** Internet of Things is a network of various sensor-equipped *** gradually integrates the Internet,sensors,and cloud *** is based on e...
详细信息
The Internet has been enhanced recently by blockchain and Internet of Things(IoT)*** Internet of Things is a network of various sensor-equipped *** gradually integrates the Internet,sensors,and cloud *** is based on encryption algorithms,which are shared database technologies on the *** technology has grown significantly because of its features,such as flexibility,support for integration,anonymity,decentralization,and independent *** nodes in the blockchain network are used to verify online ***,this integration creates scalability,interoperability,and security *** the last decade,several advancements in blockchain technology have drawn attention fromresearch communities and *** technology helps IoT networks become more reliable and enhance security and *** also removes single points of failure and lowers the *** recent years,there has been an increasing amount of literature on IoT and blockchain technology *** paper extensively examines the current state of blockchain technologies,focusing specifically on their integration into the Internet of ***,it highlights the benefits,drawbacks,and opportunities of recent studies on security issues based on blockchain solutions into *** survey examined various research papers fromdifferent types of ***,a review of the other IoT applications has been included,focusing on the security requirements and challenges in IoT-based *** research directions are gathered for the effective integration of Blockchain and IoT.
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web o...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web of challenges, prominently centered around potential threats and data security implications. Recent cryptography techniques, such as DNA-based cryptography, 3D chaos-based cryptography, and optical cryptography, face challenges including large encryption times, high energy consumption, and suboptimal rather than optimal performance. Particularly, the burden of long encryption cycles strains the energy resources of typical low-power and compact IoT devices. These challenges render the devices vulnerable to unauthorized breaches, despite large storage capacities. The hallmark of the IoT ecosystem, characterized by its low-power compact devices, is the burgeoning volume of data they generate. This escalating data influx, while necessitating expansive storage, remains vulnerable to unauthorized access and breaches. Historically, encryption algorithms, with their multifaceted architectures, have been the bulwark against such intrusions. However, their inherently-complex nature, entailing multiple encryption cycles, strains the limited energy reserves of typical IoT devices. In response to this intricate dilemma, we present a hybrid lightweight encryption strategy. Our algorithm innovatively leverages both one-dimensional (1D) and two-dimensional (2D) chaotic key generators. Furthermore, it amalgamates a classical encryption philosophy, harmonizing the strengths of Feistel and substitution-permutation networks. The centerpiece of our strategy is achieving effective encryption in merely three rounds, tailored expressly for compressed Three-Dimensional Video (3DV) frames, ensuring their unwavering integrity. Our workflow commences with the H.264/MVC compression algorithm, setting the stage for the subsequent encryption phase. Through rigorous MATLAB simulations,
Temporal motifs are compact subgraph patterns that recur frequently within a sequence of timestamps. They reveal implicit insights in the graph data and guide informed decision-making. However, current methods for exa...
详细信息
暂无评论