Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological *** provide a mechanism for collecting,storing,and transmitting physiological data to healthcare ***,the open ...
详细信息
Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological *** provide a mechanism for collecting,storing,and transmitting physiological data to healthcare ***,the open wireless channel and limited resources of sensors bring security *** ensure physiological data security,this paper provides an efficient Certificateless Public Key Infrastructure Heterogeneous Ring Signcryption(CP-HRSC)scheme,in which sensors are in a certificateless cryptosystem(CLC)environment,and the server is in a public key infrastructure(PKI)*** could solve the limitations of key escrow in identity-based cryptography(IBC)and certificate management for public keys in *** PKI is suited for the server because it is widely used on the ***,this paper designs a ring signcryption method that allows the controller to anonymously encrypt physiological data on behalf of a set of sensors,but the server does not exactly know who the sensor *** construction of this paper can achieve anonymity,confidentiality,authentication,non-repudiation,and integrity in a logically single *** the computational Diffie-Hellman(CDH)problem,the formal security proof is provided in the random oracle model(ROM).This paper demonstrates that this scheme has indistinguishability against adaptive chosen ciphertext attacks(IND-CCA2)and existential unforgeability against adaptive chosen message attacks(EUF-CMA).In terms of computational cost and energy usage,a comprehensive performance analysis demonstrates that the proposed scheme is the most *** to the three existing schemes,the computational cost of this paper’s scheme is reduced by about 49.5%,4.1%,and 8.4%,and the energy usage of our scheme is reduced by about 49.4%,3.7%,and 14.2%,respectively.
This study focuses on the task of Persian numeral classification within image data, employing the Vision Transformer (ViT) architecture to predict numerals akin to the MNIST dataset, but adapted to the Persian script....
详细信息
Visual information decoding aims to infer the visual content perceived by a subject based on their brain responses, representing a cutting-edge area of neuroscience research. Functional magnetic resonance imaging (fMR...
详细信息
The optimal dosage of insulin for diabetic patients using MLR and PCA introduces an advanced method for predicting optimal insulin doses for individuals with diabetes by leveraging machine learning techniques. Our app...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security desig...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security ***,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of *** decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing *** this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their ***,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security ***,we discuss the challenges posed by BGP security problems and outline prospects for future research.
Machine Learning (ML) models, particularly Deep Learning (DL), have made rapid progress and achieved significant milestones across various applications, including numerous safety-critical contexts. However, these mode...
详细信息
The extreme learning machine is a fast neural network with outstanding performance. However, the selection of an appropriate number of hidden nodes is time-consuming, because training must be run for several values, a...
详细信息
The hemispherical resonator gyro (HRG) is a type of precision inertial sensor that has the advantages of direct angle measurement and unlimited dynamic range. The overall accuracy of the HRG is due to the quality of i...
详细信息
Forecasting river flow is crucial for optimal planning,management,and sustainability using freshwater *** machine learning(ML)approaches have been enhanced to improve streamflow *** techniques have been viewed as a vi...
详细信息
Forecasting river flow is crucial for optimal planning,management,and sustainability using freshwater *** machine learning(ML)approaches have been enhanced to improve streamflow *** techniques have been viewed as a viable method for enhancing the accuracy of univariate streamflow estimation when compared to standalone *** researchers have also emphasised using hybrid models to improve forecast ***,this paper conducts an updated literature review of applications of hybrid models in estimating streamflow over the last five years,summarising data preprocessing,univariate machine learning modelling strategy,advantages and disadvantages of standalone ML techniques,hybrid models,and performance *** study focuses on two types of hybrid models:parameter optimisation-based hybrid models(OBH)and hybridisation of parameter optimisation-based and preprocessing-based hybridmodels(HOPH).Overall,this research supports the idea thatmeta-heuristic approaches precisely improveML ***’s also one of the first efforts to comprehensively examine the efficiency of various meta-heuristic approaches(classified into four primary classes)hybridised with ML *** study revealed that previous research applied swarm,evolutionary,physics,and hybrid metaheuristics with 77%,61%,12%,and 12%,***,there is still room for improving OBH and HOPH models by examining different data pre-processing techniques and metaheuristic algorithms.
Face authentication is an important biometric authentication method commonly used in security *** is vulnerable to different types of attacks that use authorized users’facial images and videos captured from social me...
详细信息
Face authentication is an important biometric authentication method commonly used in security *** is vulnerable to different types of attacks that use authorized users’facial images and videos captured from social media to perform spoofing attacks and dynamic movements for penetrating secur-ity *** paper presents an innovative challenge-response emotions authentication model based on the horizontal ensemble *** proposed model provides high accurate face authentication process by challenging the authorized user using a random sequence of emotions to provide a specific response for every authentication trial with a different sequence of *** proposed model is applied to the KDEF dataset using 10-fold *** improvements are made to the proposed ***,the VGG16 model is applied to the seven common ***,the system usability is enhanced by analyzing and selecting only the four common and easy-to-use ***,the horizontal ensemble technique is applied to enhance the emotion recognition accuracy and minimize the error during authen-tication ***,the Horizontal Ensemble Best N-Losses(HEBNL)is applied using challenge-response emotion to improve the authentication effi-ciency and minimize the computational *** successive improvements implemented on the proposed model led to an improvement in the accuracy from 92.1%to 99.27%.
暂无评论