This research aims to develop an expert system for initial diagnoses of skin diseases in cats using the Decision Tree method. It assists cat owners in identifying skin diseases based on observed symptoms. Data from ex...
详细信息
Heart disease is the highest cause of death in the world. Arrhythmia is an abnormality in the rhythm of the heartbeat. The heart beats too fast, too slow, or irregularly. Arrhythmias are not always dangerous, e.g., so...
详细信息
The tourism industry in Indonesia experienced a decrease in the number of tourist visits that occurred at the end of 2020. This was due to the outbreak of the COVID-19 outbreak that occurred at the end of January 2020...
详细信息
This paper addresses the critical challenge of privacy in Online Social Networks(OSNs),where centralized designs compromise user *** propose a novel privacy-preservation framework that integrates blockchain technology...
详细信息
This paper addresses the critical challenge of privacy in Online Social Networks(OSNs),where centralized designs compromise user *** propose a novel privacy-preservation framework that integrates blockchain technology with deep learning to overcome these *** methodology employs a two-tier architecture:the first tier uses an elitism-enhanced Particle Swarm Optimization and Gravitational Search Algorithm(ePSOGSA)for optimizing feature selection,while the second tier employs an enhanced Non-symmetric Deep Autoencoder(e-NDAE)for anomaly ***,a blockchain network secures users’data via smart contracts,ensuring robust data *** tested on the NSL-KDD dataset,our framework achieves 98.79%accuracy,a 10%false alarm rate,and a 98.99%detection rate,surpassing existing *** integration of blockchain and deep learning not only enhances privacy protection in OSNs but also offers a scalable model for other applications requiring robust security measures.
Information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data commu...
详细信息
Information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data communication across various ***,IoT devices,typically low-powered,are susceptible to cyber ***,blockchain has emerged as a robust solution to secure these devices due to its decentralised ***,the fusion of blockchain and IoT technologies is challenging due to performance bottlenecks,network scalability limitations,and blockchain-specific security ***,on the other hand,is a recently emerged information security solution that has great potential to secure low-powered IoT *** study aims to identify blockchain-specific vulnerabilities through changes in network behaviour,addressing a significant research gap and aiming to mitigate future cybersecurity *** blockchain and IoT technologies presents challenges,including performance bottlenecks,network scalability issues,and unique security *** paper analyses potential security weaknesses in blockchain and their impact on network *** developed a real IoT test system utilising three prevalent blockchain applications to conduct *** results indicate that Distributed Denial of Service(DDoS)attacks on low-powered,blockchain-enabled IoT sensor networks cause measurable anomalies in network and device performance,specifically:(1)an average increase in CPU core usage to 34.32%,(2)a reduction in hash rates by up to 66%,(3)an increase in batch timeout by up to 14.28%,and(4)an increase in block latency by up to 11.1%.These findings suggest potential strategies to counter future DDoS attacks on IoT networks.
Several digital dangers were investigated. Malware dominated analysis with 45 attacks. We found 30 phishing attacks. 22 data breaches, 15 cyber espionage, 18 identity theft. This indicates the kind and frequency of ha...
详细信息
Human–computer interaction (HCI) improved via voice detection of emotions. Speech Emotion Recognition (SER) software typically detects the appearance of various feelings in the speaker. However, there are signif...
详细信息
Hidden capacity,concealment,security,and robustness are essential indicators of hiding ***,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the *** ...
详细信息
Hidden capacity,concealment,security,and robustness are essential indicators of hiding ***,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the *** practical applications,the container can suffer from damage caused by noise,cropping,and other attacks during transmission,resulting in challenging or even impossible complete recovery of the secret *** image hiding algorithm based on dynamic region attention in the multi-scale wavelet domain is proposed to address this issue and enhance the robustness of hiding *** this proposed algorithm,a secret image of size 256×256 is first decomposed using an eight-level Haar wavelet *** wavelet transform generates one coefficient in the approximation component and twenty-four detail bands,which are then embedded into the carrier image via a hiding *** the recovery process,the container image is divided into four non-overlapping parts,each employed to reconstruct a low-resolution secret *** lowresolution secret images are combined using densemodules to obtain a high-quality secret *** experimental results showed that even under destructive attacks on the container image,the proposed algorithm is successful in recovering a high-quality secret image,indicating that the algorithm exhibits a high degree of robustness against various *** proposed algorithm effectively addresses the robustness issue by incorporating both spatial and channel attention mechanisms in the multi-scale wavelet domain,making it suitable for practical *** conclusion,the image hiding algorithm introduced in this study offers significant improvements in robustness compared to existing *** ability to recover high-quality secret images even in the presence of destructive attacksmakes it an attractive option for various *** research and experimentation can explore the algorith
Phasor Measurement Units(PMUs)provide Global Positioning System(GPS)time-stamped synchronized measurements of voltage and current with the phase angle of the system at certain points along with the grid *** synchroniz...
详细信息
Phasor Measurement Units(PMUs)provide Global Positioning System(GPS)time-stamped synchronized measurements of voltage and current with the phase angle of the system at certain points along with the grid *** synchronized data measurements are extracted in the form of amplitude and phase from various locations of the power grid to monitor and control the power system condition.A PMU device is a crucial part of the power equipment in terms of the cost and operative point of ***,such ongoing development and improvement to PMUs’principal work are essential to the network operators to enhance the grid quality and the operating *** paper introduces a proposed method that led to lowcost and less complex techniques to optimize the performance of PMU using Second-Order Kalman *** is based on the Asyncrhophasor technique resulting in a phase error minimization when receiving the signal from an access point or from the main access *** MATLAB model has been created to implement the proposed method in the presence of Gaussian and *** results have shown the proposed method which is Second-Order Kalman Filter outperforms the existing *** results were tested usingMean Square Error(MSE).The proposed Second-Order Kalman Filter method has been replaced with a synchronization unit into thePMUstructure to clarify the significance of the proposed new PMU.
Facial expressions are a vital component of human communication, conveying emotional information that enhances the social experience. However, for individuals with visual impairments, perceiving and interpreting facia...
详细信息
暂无评论