In this internet era, cloud computing and there are various problems in the cloud computing, where the consumers as well as the service providers facing in their day to day cloud activities. Job scheduling problem pla...
详细信息
The Internet of Medical Things(IoMT)is an emerging technology that combines the Internet of Things(IoT)into the healthcare sector,which brings remarkable benefits to facilitate remote patient monitoring and reduce tre...
详细信息
The Internet of Medical Things(IoMT)is an emerging technology that combines the Internet of Things(IoT)into the healthcare sector,which brings remarkable benefits to facilitate remote patient monitoring and reduce treatment *** IoMT devices become more scalable,Smart Healthcare systems(SHS)have become increasingly vulnerable to *** Detection systems(IDS)play a crucial role in maintaining network *** IDS monitors systems or networks for suspicious activities or potential threats,safeguarding internal *** paper presents the development of an IDS based on deep learning techniques utilizing benchmark *** propose a multilayer perceptron-based framework for intrusion detection within the smart healthcare *** primary objective of our work is to protect smart healthcare devices and networks from malicious attacks and security *** employ the NSL-KDD and UNSW-NB15 intrusion detection datasets to evaluate our proposed security *** proposed framework achieved an accuracy of 95.0674%,surpassing that of comparable deep learning models in smart healthcare while also reducing the false positive *** results indicate the feasibility of using a multilayer perceptron,achieving superior performance against cybersecurity threats in the smart healthcare domain.
Stress is a state of mental or emotional strain due to adversative or challenging situations. A human may undergo bad life experiences or events, and it is a significant issue to be dealt in today's society. It co...
详细信息
This research discusses the application of the KNearest Neighbor (K-NN) algorithm in sentiment analysis, specifically in classifying positive, negative, or neutral sentiments from ChatGPT user opinions collected from ...
详细信息
A substitution box(S-Box)is a crucial component of contemporary cryptosystems that provide data protection in block *** the moment,chaotic maps are being created and extensively used to generate these SBoxes as a chao...
详细信息
A substitution box(S-Box)is a crucial component of contemporary cryptosystems that provide data protection in block *** the moment,chaotic maps are being created and extensively used to generate these SBoxes as a chaotic map assists in providing disorder and resistance to combat cryptanalytical *** this paper,the construction of a dynamic S-Box using a cipher key is proposed using a novel chaotic map and an innovative tweaking *** projected chaotic map and the proposed tweak approach are presented for the first time and the use of parameters in their workingmakes both of these dynamic in *** tweak approach employs cubic polynomials while permuting the values of an initial S-Box to enhance its cryptographic *** of the parameters are provided using the cipher key and a small variation in values of these parameters results in a completely different unique *** analysis and exploration confirmed that the projected chaoticmap exhibits a significant amount of chaotic *** security assessment in terms of bijectivity,nonlinearity,bits independence,strict avalanche,linear approximation probability,and differential probability criteria are utilized to critically investigate the effectiveness of the proposed S-Box against several *** proposed S-Box’s cryptographic performance is comparable to those of recently projected S-Boxes for its adaption in real-world security *** comparative scrutiny pacifies the genuine potential of the proposed S-Box in terms of its applicability for data security.
Innovation is the center of the enterprise development, which is the main driving force of enterprises’ competitiveness. To evaluate the enterprises’ innovation ability, we firstly establish an index system which ai...
详细信息
Innovation is the center of the enterprise development, which is the main driving force of enterprises’ competitiveness. To evaluate the enterprises’ innovation ability, we firstly establish an index system which aims at analyzing the enterprise innovation ability. We also retrieve the data of the listed companies in Wind database from 2015 to 2019 and label them using factor analysis method. Then, a new deep learning classificational framework with attention mechanism and LSTM is established. The results show that when attention mechanism and LSTM are added into the convolutional neural network(CNN), the model’s prediction performance is better improved, and the accuracy, recall, precision and F-score are 0.914, 0.914, 0.916 and 0.915, respectively. This indicates the strong generalization ability of our new model. Finally, we also find that patents and R &D expenditures are the most important factor affecting the corporate innovation ability through SHapley Additive exPlanations(SHAP). Companies with more patents and R &D expenditures are generally considered to be more innovative.
Secret sharing (SS) is a threshold technology that shares a secret value by generating and distributing n shares in the way that a set of any k shares can recover the secret. On the other hand, blockchain is a decentr...
详细信息
The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent *** sensing layer of IIoT comprises the edge converge...
详细信息
The application of Intelligent Internet of Things(IIoT)in constructing distribution station areas strongly supports platform transformation,upgrade,and intelligent *** sensing layer of IIoT comprises the edge convergence layer and the end sensing layer,with the former using intelligent fusion terminals for real-time data collection and ***,the influx of multiple low-voltage in the smart grid raises higher demands for the performance,energy efficiency,and response speed of the substation fusion ***,it brings significant security risks to the entire distribution substation,posing a major challenge to the smart *** response to these challenges,a proposed dynamic and energy-efficient trust measurement scheme for smart grids aims to address these *** scheme begins by establishing a hierarchical trust measurement model,elucidating the trust relationships among smart IoT *** then incorporates multidimensional measurement factors,encompassing static environmental factors,dynamic behaviors,and energy *** comprehensive approach reduces the impact of subjective factors on trust ***,the scheme incorporates a detection process designed for identifying malicious low-voltage end sensing units,ensuring the prompt identification and elimination of any malicious ***,in turn,enhances the security and reliability of the smart grid *** effectiveness of the proposed scheme in pinpointing malicious nodes has been demonstrated through simulation ***,the scheme outperforms established trust metric models in terms of energy efficiency,showcasing its significant contribution to the field.
Several people suffer from irregular sleep patterns, a problem that negatively affects their daily lives. It presents a multitude of challenges, including daytime distress, disturbances in sleep-wake patterns, feeling...
详细信息
Many search-based algorithms have been successfully applied in sev-eral software engineering *** algorithms(GAs)are the most used in the scientific domains by scholars to solve software testing *** imi-tate the theory ...
详细信息
Many search-based algorithms have been successfully applied in sev-eral software engineering *** algorithms(GAs)are the most used in the scientific domains by scholars to solve software testing *** imi-tate the theory of natural selection and *** harmony search algorithm(HSA)is one of the most recent search algorithms in the last *** imitates the behavior of a musician tofind the best *** have estimated the simi-larities and the differences between genetic algorithms and the harmony search algorithm in diverse research *** test data generation process represents a critical task in software ***,there is no work comparing the performance of genetic algorithms and the harmony search algorithm in the test data generation *** paper studies the similarities and the differences between genetic algorithms and the harmony search algorithm based on the ability and speed offinding the required test *** current research performs an empirical comparison of the HSA and the GAs,and then the significance of the results is estimated using the *** study investigates the efficiency of the harmony search algorithm and the genetic algorithms according to(1)the time performance,(2)the significance of the generated test data,and(3)the adequacy of the generated test data to satisfy a given testing *** results showed that the harmony search algorithm is significantly faster than the genetic algo-rithms because the t-Test showed that the p-value of the time values is 0.026<α(αis the significance level=0.05 at 95%confidence level).In contrast,there is no significant difference between the two algorithms in generating the adequate test data because the t-Test showed that the p-value of thefitness values is 0.25>α.
暂无评论