Individuals who are younger and have dementia often start experiencing its symptoms before they turn 65, with cases even documented in people as young as their thirties. Researchers strive for accurate dementia diagno...
详细信息
A data stream exhibits as a massive unbounded sequence of data elements continuously generated at a high rate. Stream databases raise new challenges for query processing due to both the streaming nature of data which ...
详细信息
This study focuses on the task of Persian numeral classification within image data, employing the Vision Transformer (ViT) architecture to predict numerals akin to the MNIST dataset, but adapted to the Persian script....
详细信息
Machine Learning (ML) models, particularly Deep Learning (DL), have made rapid progress and achieved significant milestones across various applications, including numerous safety-critical contexts. However, these mode...
详细信息
Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological *** provide a mechanism for collecting,storing,and transmitting physiological data to healthcare ***,the open ...
详细信息
Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological *** provide a mechanism for collecting,storing,and transmitting physiological data to healthcare ***,the open wireless channel and limited resources of sensors bring security *** ensure physiological data security,this paper provides an efficient Certificateless Public Key Infrastructure Heterogeneous Ring Signcryption(CP-HRSC)scheme,in which sensors are in a certificateless cryptosystem(CLC)environment,and the server is in a public key infrastructure(PKI)*** could solve the limitations of key escrow in identity-based cryptography(IBC)and certificate management for public keys in *** PKI is suited for the server because it is widely used on the ***,this paper designs a ring signcryption method that allows the controller to anonymously encrypt physiological data on behalf of a set of sensors,but the server does not exactly know who the sensor *** construction of this paper can achieve anonymity,confidentiality,authentication,non-repudiation,and integrity in a logically single *** the computational Diffie-Hellman(CDH)problem,the formal security proof is provided in the random oracle model(ROM).This paper demonstrates that this scheme has indistinguishability against adaptive chosen ciphertext attacks(IND-CCA2)and existential unforgeability against adaptive chosen message attacks(EUF-CMA).In terms of computational cost and energy usage,a comprehensive performance analysis demonstrates that the proposed scheme is the most *** to the three existing schemes,the computational cost of this paper’s scheme is reduced by about 49.5%,4.1%,and 8.4%,and the energy usage of our scheme is reduced by about 49.4%,3.7%,and 14.2%,respectively.
The optimal dosage of insulin for diabetic patients using MLR and PCA introduces an advanced method for predicting optimal insulin doses for individuals with diabetes by leveraging machine learning techniques. Our app...
详细信息
The extreme learning machine is a fast neural network with outstanding performance. However, the selection of an appropriate number of hidden nodes is time-consuming, because training must be run for several values, a...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral *** characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in ***,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate ***,we review the literature on the use of AI in physiological characteristics recognition pub-lished after *** use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their *** also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions.
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security desig...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security ***,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of *** decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing *** this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their ***,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security ***,we discuss the challenges posed by BGP security problems and outline prospects for future research.
The main task of this work is to establish the consumption of energy from renewable sources such as solar and wind energy for the production of such a combustible substance as hydrogen, and further optimal calculation...
详细信息
暂无评论