As the Internet of Things(IoT)and mobile devices have rapidly proliferated,their computationally intensive applications have developed into complex,concurrent IoT-based workflows involving multiple interdependent *** ...
详细信息
As the Internet of Things(IoT)and mobile devices have rapidly proliferated,their computationally intensive applications have developed into complex,concurrent IoT-based workflows involving multiple interdependent *** exploiting its low latency and high bandwidth,mobile edge computing(MEC)has emerged to achieve the high-performance computation offloading of these applications to satisfy the quality-of-service requirements of workflows and *** this study,we propose an offloading strategy for IoT-based workflows in a high-performance MEC *** proposed task-based offloading strategy consists of an optimization problem that includes task dependency,communication costs,workflow constraints,device energy consumption,and the heterogeneous characteristics of the edge *** addition,the optimal placement of workflow tasks is optimized using a discrete teaching learning-based optimization(DTLBO)*** experimental evaluations demonstrate that the proposed offloading strategy is effective at minimizing the energy consumption of mobile devices and reducing the execution times of workflows compared to offloading strategies using different metaheuristics,including particle swarm optimization and ant colony optimization.
We developed an information system using an object-oriented programming language and a distributed database (DDB) consisting of multiple interconnected databases across a computer network, managed by a distributed dat...
详细信息
This proposal outlines a research on user experience evaluation frameworks, specifically for the Malaysian e-government mobile applications. The primary objective is to propose a comprehensive framework for user exper...
详细信息
Autism Spectrum Disorder (ASD) is a very complex nervous growth syndrome that can manifest in different forms. Timely diagnosis and suitable medical intervention can significantly enhance the daily functioning of chil...
详细信息
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the priv...
详细信息
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the privacy of patients. As medical information becomes more widely available, security measures must be established to protect confidentiality, integrity, and availability. Image steganography was recently proposed as an extra data protection mechanism for medical records. This paper describes a data-hiding approach for DICOM medical pictures. To ensure secrecy, we use Adversarial Neural Cryptography with SHA-256 (ANC-SHA-256) to encrypt and conceal the RGB patient picture within the medical image's Region of Non-Interest (RONI). To ensure anonymity, we use ANC-SHA-256 to encrypt the RGB patient image before embedding. We employ a secure hash method with 256bit (SHA-256) to produce a digital signature from the information linked to the DICOM file to validate the authenticity and integrity of medical pictures. Many tests were conducted to assess visual quality using diverse medical datasets, including MRI, CT, X-ray, and ultrasound cover pictures. The LFW dataset was chosen as a patient hidden picture. The proposed method performs well in visual quality measures including the PSNR average of 67.55, the NCC average of 0.9959, the SSIM average of 0.9887, the UQI average of 0.9859, and the APE average of 3.83. It outperforms the most current techniques in these visual quality measures (PSNR, MSE, and SSIM) across six medical assessment categories. Furthermore, the proposed method offers great visual quality while being resilient to physical adjustments, histogram analysis, and other geometrical threats such as cropping, rotation, and scaling. Finally, it is particularly efficient in telemedicine applications with high achieving security with a ratio of 99% during remote transmission of Electronic Patient Records (EPR) over the Internet, which safeguards the patien
Any number that can be uniquely determined by a graph is called graph *** the most recent twenty years’innumerable numerical graph invariants have been described and used for correlation *** the fast and advanced env...
详细信息
Any number that can be uniquely determined by a graph is called graph *** the most recent twenty years’innumerable numerical graph invariants have been described and used for correlation *** the fast and advanced environment of manufacturing of networks and other products which used different networks,no dependable assessment has been embraced to choose,how much these invariants are connected with a network graph or molecular *** this paper,it will talk about three distinct variations of bridge networks with great capability of expectation in the field of computerscience,chemistry,physics,drug industry,informatics,and mathematics in setting with physical and synthetic constructions and networks,since K-Banhatti invariants are newly introduced and have various forecast characteristics for various variations of bridge graphs or *** review settled the topology of bridge graph/networks of three unique sorts with three types of K-Banhatti *** concluded outcomes can be utilized for the modeling of interconnection networks of Personal computers(PC),networks like Local area network(LAN),Metropolitan area network(MAN)and Wide area network(WAN),the spine of internet and different networks/designs of PCs,power generation interconnection,bio-informatics and chemical structures.
The Fourth Industrial Revolution (IR4.0) has shifted the mindsets of engineering students on the importance of IT skills for current and future engineering related jobs. Nowadays, programming is the most fundamental s...
详细信息
The rapid growth of smart technologies and services has intensified the challenges surrounding identity authenti-cation *** credentials are increasingly being used for verification due to their advantages over traditi...
详细信息
The rapid growth of smart technologies and services has intensified the challenges surrounding identity authenti-cation *** credentials are increasingly being used for verification due to their advantages over traditional methods,making it crucial to safeguard the privacy of people’s biometric data in various *** paper offers an in-depth exploration for privacy-preserving techniques and potential threats to biometric *** proposes a noble and thorough taxonomy survey for privacy-preserving techniques,as well as a systematic framework for categorizing the field’s existing *** review the state-of-the-art methods and address their advantages and limitations in the context of various biometric modalities,such as face,fingerprint,and eye *** survey encompasses various categories of privacy-preserving mechanisms and examines the trade-offs between security,privacy,and recognition performance,as well as the issues and future research *** aims to provide researchers,professionals,and decision-makers with a thorough understanding of the existing privacy-preserving solutions in biometric recognition systems and serves as the foundation of the development of more secure and privacy-preserving biometric technologies.
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported w...
详细信息
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported worldwide ***,there is a pressing need to employ diverse landmine detection techniques for their *** effective approach for landmine detection is UAV(Unmanned Aerial Vehicle)based AirborneMagnetometry,which identifies magnetic anomalies in the local terrestrial magnetic *** can generate a contour plot or heat map that visually represents the magnetic field *** the effectiveness of this approach,landmine removal remains a challenging and resource-intensive task,fraughtwith *** computing,on the other hand,can play a crucial role in critical drone monitoring applications like landmine *** processing data locally on a nearby edge server,edge computing can reduce communication latency and bandwidth requirements,allowing real-time analysis of magnetic field *** enables faster decision-making and more efficient landmine detection,potentially saving lives and minimizing the risks involved in the ***,edge computing can provide enhanced security and privacy by keeping sensitive data close to the source,reducing the chances of data exposure during *** paper introduces the MAGnetometry Imaging based Classification System(MAGICS),a fully automated UAV-based system designed for landmine and buried object detection and *** have developed an efficient deep learning-based strategy for automatic image classification using magnetometry dataset *** simulating the proposal in various network scenarios,we have successfully detected landmine signatures present in themagnetometry *** trained models exhibit significant performance improvements,achieving a maximum mean average precision value of 97.8%.
Emerging telemedicine trends,such as the Internet of Medical Things(IoMT),facilitate regular and efficient interactions between medical devices and computing *** importance of IoMT comes from the need to continuously ...
详细信息
Emerging telemedicine trends,such as the Internet of Medical Things(IoMT),facilitate regular and efficient interactions between medical devices and computing *** importance of IoMT comes from the need to continuously monitor patients’health conditions in real-time during normal daily activities,which is realized with the help of various wearable devices and *** major health problem is workplace stress,which can lead to cardiovascular disease or psychiatric ***,real-time monitoring of employees’stress in the workplace is *** levels and the source of stress could be detected early in the fog layer so that the negative consequences can be mitigated ***,overwhelming the fog layer with extensive data will increase the load on fog nodes,leading to computational *** study aims to reduce fog computation by proposing machine learning(ML)models with two *** first phase of theMLmodel assesses the priority of the situation based on the stress *** the second phase,a classifier determines the cause of stress,which was either interruptions or time pressure while completing a *** approach reduced the computation cost for the fog node,as only high-priority records were transferred to the ***-priority records were forwarded to the *** MLapproaches were compared in terms of accuracy and prediction speed:Knearest neighbors(KNN),a support vector machine(SVM),a bagged tree(BT),and an artificial neural network(ANN).In our experiments,ANN performed best in both phases because it scored an F1 score of 99.97% and had the highest prediction speed compared with KNN,SVM,and BT.
暂无评论