Renewable energy such as solar power has been widely adopted lately due to its sustainability and cost-effectiveness. However, due to the intermittent nature of photovoltaic systems, accurate solar forecasting is vita...
详细信息
Cervical cancer, which is ranked fourth among cancers affecting women, is highly treatable when detected early through the pap smear test. Deep Learning (DL) models, particularly Convolutional Neural Networks (CNNs), ...
详细信息
The increasing threat of poaching continues to endanger global biodiversity, calling for innovative and timely measures in detection as well as interventions. In response, this study presents a novel approach to metho...
详细信息
The implementation of intelligent systems in the retail industry is still limited in various regions of the world. Amazon Go currently has four stores, located in the Seattle area, and has received customer reviews ba...
详细信息
Identifying linguistic differences between dialects of a language often requires expert knowledge and meticulous human analysis. This is largely due to the complexity and nuance involved in studying various dialects. ...
详细信息
This research aims to use hyperspectral picture analysis to research the integrity of irrigation systems, hoping to reduce power and water utilization. Traditional methods for measuring irrigation integrity are timein...
详细信息
When it comes to delivering IT services to businesses or consumers, the cloud provides a scalable, reliable, and cost-effective option. However, there is an increased risk associated with cloud computing due to the fa...
详细信息
ISBN:
(纸本)9798350305708
When it comes to delivering IT services to businesses or consumers, the cloud provides a scalable, reliable, and cost-effective option. However, there is an increased risk associated with cloud computing due to the fact that critical operations frequently go to another organization, making it more difficult to preserve privacy and security of data, sustain data and availability, and prove compliance. It is a difficult issue in cloud computing to ensure the security of outsourced data. Data integrity should be verified by the client or an external auditor before being outsourced. Many methods using various techniques, including Proof of Retrievability, proved data ownership, privacy preservation, etc., have been developed for this goal. Various security strategies to address the current security vulnerabilities have been offered in the literature by researchers and impacted companies. Security and privacy concerns in cloud computing are also well reviewed in the literature. Unfortunately, the literature presented works lack the adaptability to counter diverse attacks without undermining cloud security goals. As a corollary, the literature has highlighted security and privacy vulnerabilities without giving suitable technological techniques to alleviate both security and privacy risks. However, studies that provide technological responses to security issues have not provided enough reasoning for the existence of these dangers. The purpose of this article is to discuss potential cloud security and privacy challenges that might arise and need a flexible approach to finding a workable solution. This study provides a comprehensive review of the relevant literature, discussing how safe cloud conflicts have made the suggested models from prior works obsolete while also taking into consideration the works' adaptability to handle future threats. The STRIDE methodology is then used to convey, from the user's point of view, the security concerns associated with cloud computing.
On the transmission line,the invasion of foreign objects such as kites,plastic bags,and balloons and the damage to electronic components are common transmission line *** these faults is of great significance for the s...
详细信息
On the transmission line,the invasion of foreign objects such as kites,plastic bags,and balloons and the damage to electronic components are common transmission line *** these faults is of great significance for the safe operation of power ***,a YOLOv5 target detection method based on a deep convolution neural network is *** this paper,Mobilenetv2 is used to replace Cross Stage Partial(CSP)-Darknet53 as the *** structure uses depth-wise separable convolution to reduce the amount of calculation and parameters;improve the detection *** the same time,to compensate for the detection accuracy,the Squeeze-and-Excitation Networks(SENet)attention model is fused into the algorithm framework and a new detection scale suitable for small targets is added to improve the significance of the fault target area in the *** pictures of foreign matters such as kites,plastic bags,balloons,and insulator defects of transmission lines,and sort theminto a data *** experimental results on datasets show that themean Accuracy Precision(mAP)and recall rate of the algorithm can reach 92.1%and 92.4%,*** the same time,by comparison,the detection accuracy of the proposed algorithm is higher than that of other methods.
Cryptography is crucial for ensuring the data security in wireless sensor networks. The real data is altered or concealed using several hashing techniques before transmission across the network. But, these traditional...
详细信息
暂无评论