Imperfections in requirement specification can cause serious issues during software development life cycle. It might bring about inferior quality products due to missing attributes, for example, security. Specifically...
详细信息
Hard hearing and deaf people are communicating with other people using the sign language. This is the only way of communication of such people to convey Since this is the only means by which these individuals can comm...
详细信息
The aim of this work is to examine the application of FHE-SMPC as a viable security model for protecting the tenant isolation in multi-tenant cloud model. In multi-tenant environments, where various customers use the ...
详细信息
With a steady increase in the adoption of cloud storage systems, the client's data are at risk of being leaked. There are several methods of encrypting data which are quite useful but they lack some of the feature...
详细信息
The studies in this research are focused on the mix of homomorphic encryption mechanisms and the Cuckoo Search Optimization Algorithm to promote the security of the healthcare data in the cloud computing system. I hav...
详细信息
This research aims to explore the use of modern complex defensive machine learning algorithms in the provision of predictive analytics for health improvement. Incorporating electronic health records, medical image inf...
详细信息
The research is aimed at improvement of multi-spectral image analysis for remote sensing and monitoring the environment at various ecosystems. A combined spectral imagery encompasses several spectrums at a time compar...
详细信息
Electroencephalogram(EEG)is a medical imaging technology that can measure the electrical activity of the scalp produced by the brain,measured and recorded chronologically the surface of the scalp from the *** recorded...
详细信息
Electroencephalogram(EEG)is a medical imaging technology that can measure the electrical activity of the scalp produced by the brain,measured and recorded chronologically the surface of the scalp from the *** recorded signals from the brain are rich with useful *** inference of this useful information is a challenging *** paper aims to process the EEG signals for the recognition of human emotions specifically happiness,anger,fear,sadness,and surprise in response to audiovisual *** EEG signals are recorded by placing neurosky mindwave headset on the subject’s scalp,in response to audiovisual stimuli for the mentioned *** a bandpass filter with a bandwidth of 1-100 Hz,recorded raw EEG signals are *** preprocessed signals then further analyzed and twelve selected features in different domains are *** Random forest(RF)and multilayer perceptron(MLP)algorithms are then used for the classification of the emotions through extracted *** proposed audiovisual stimuli based EEG emotion classification system shows an average classification accuracy of 80%and 88%usingMLP and RF classifiers respectively on hybrid features for experimental signals of different *** proposed model outperforms in terms of cost and accuracy.
Electroencephalography (EEG) is a well-known modality in neuroscience and is widely used in identifying and classifying neurological disorders. This paper investigates how EEG data can be used along with knowledge dis...
详细信息
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ...
详细信息
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.
暂无评论