The paper proposed a secured and efficient data aggregation mechanism leveraging the edge computing paradigm and homomorphic data encryption technique. The paper used a unique combination of Paillier cryptosystem and ...
详细信息
The formidable growth of the Internet of Things and quality of service requirements accelerate demands for edge-based data-driven services, a major goal of Industry 4.0 and Society 5.0. However, big data analysis (BDA...
详细信息
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi...
详细信息
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapid development of *** technology has immutability,decentralization,and autonomy,which can greatly improve the inherent defects of the *** the traditional blockchain,data is stored in a Merkle *** data continues to grow,the scale of proofs used to validate it grows,threatening the efficiency,security,and reliability of blockchain-based ***,this paper first analyzes the inefficiency of the traditional blockchain structure in verifying the integrity and correctness of *** solve this problem,a new Vector Commitment(VC)structure,Partition Vector Commitment(PVC),is proposed by improving the traditional VC ***,this paper uses PVC instead of the Merkle tree to store big data generated by *** can improve the efficiency of traditional VC in the process of commitment and ***,this paper uses PVC to build a blockchain-based IIoT data security storage mechanism and carries out a comparative analysis of *** mechanism can greatly reduce communication loss and maximize the rational use of storage space,which is of great significance for maintaining the security and stability of blockchain-based IIoT.
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with *** best way ...
详细信息
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with *** best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they *** needs to be more protection for the VANET *** effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of *** research proposes a VANET-based data outsourcingsystem to fix the *** keep data outsourcing secure,the suggested model takes cryptography models *** will keep the generated keys for the purpose of vehicle *** controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages *** proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in *** proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide *** proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled *** curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations.
In the field of object detection for remote sensing images, especially in applications such as environmental monitoring and urban planning, significant progress has been made. This paper addresses the common challenge...
详细信息
The Information Retrieval system aims to discover relevant documents and display them as query responses. However, the ever-changing nature of user queries poses a substantial research problem in defining the necessar...
详细信息
The Information Retrieval system aims to discover relevant documents and display them as query responses. However, the ever-changing nature of user queries poses a substantial research problem in defining the necessary data to respond accurately. The Major intention for this study is for enhance the retrieval of relevant information in response to user queries. The aim to develop an advanced IR system that adapts to changing user requirements. By introducing WMO_DBN, we seek to improve the efficiency and accuracy of information retrieval, catering to both general and specific user searches. The proposed methodology comprises three important steps: pre-processing, feature choice, and categorization. Initially, unstructured data subject to pre-processing to transform it into a structured format. Subsequently, relevant features are selected to optimize the retrieval process. The final step involves the utilization of WMO_DBN, a novel deep learning model designed for information retrieval based on the query data. Additionally, similarity calculation is employed to improve the effectiveness for the network training model. The investigational evaluation for the suggested model was conducted, and its performance is measured regarding the metrics of recall, precision, accuracy, and F1 score, the present discourse concerns their significance within the academic realm. The results prove the superiority of WMO_DBN in retrieving relevant information compared to traditional approaches. This research introduces novel method for addressing the challenges in information retrieval with the integration of WMO_DBN. By applying pre-processing, feature selection, and a deep belief neural network, the proposed system achieves more accurate and efficient retrieval of relevant information. The study contributes to the advancement of information retrieval systems and emphasizes the importance of adapting to users' evolving search queries. The success of WMO_DBN in retrieving relevant inform
This study presents a sustainable and effective approach for obtaining land uses and land covers (LULC) details utilizing remote sensing images. The modified Convolutional Neural Network (CNN), Inception-Resnet V2, is...
详细信息
The advent of Extremely Large Antenna Arrays (ELAA) is crucial for meeting the performance demands of future sixth-generation (6G) wireless networks. However, ELAA introduces significant Near-Field Communication (NFC)...
详细信息
Secure authentication and accurate localization among Internet of Things(IoT)sensors are pivotal for the functionality and integrity of IoT *** authentication and localization are intricate and symbiotic,impacting bot...
详细信息
Secure authentication and accurate localization among Internet of Things(IoT)sensors are pivotal for the functionality and integrity of IoT *** authentication and localization are intricate and symbiotic,impacting both the security and operational functionality of IoT ***,accurate localization and lightweight authentication on resource-constrained IoT devices pose several *** overcome these challenges,recent approaches have used encryption techniques with well-known key ***,these methods are inefficient due to the increasing number of data breaches in their localization *** proposed research efficiently integrates authentication and localization processes in such a way that they complement each other without compromising on security or *** proposed framework aims to detect active attacks within IoT networks,precisely localize malicious IoT devices participating in these attacks,and establish dynamic implicit authentication *** integrated framework proposes a Correlation Composition Awareness(CCA)model,which explores innovative approaches to device correlations,enhancing the accuracy of attack detection and ***,this framework introduces the Pair Collaborative Localization(PCL)technique,facilitating precise identification of the exact locations of malicious IoT *** address device authentication,a Behavior and Performance Measurement(BPM)scheme is developed,ensuring that only trusted devices gain access to the *** work has been evaluated across various environments and compared against existing *** results prove that the proposed methodology attains 96%attack detection accuracy,84%localization accuracy,and 98%device authentication accuracy.
Early detection at the premalignant stage is desirable to prevent Squamous cell carcinoma (SCC) tongue morbidity and death. An automated method for oral cancer identification was developed because conventional early d...
详细信息
暂无评论