Anomaly detection stands as a critical element in securing space information networks (SINs). This paper delves into the realm of anomaly detection within dynamic networks, shedding light on established methodologies....
详细信息
With the advent of various mobile IoT devices, a large amount of e-health record (EHR) data has been generated. This data has great potential to improve medical research. However, there are many challenges regarding t...
详细信息
With the popularity of the Internet and the massive increase of content production, users are faced with massive information and content, and it is often difficult to accurately and efficiently find the content that m...
详细信息
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical t...
详细信息
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical tools to thoroughly investigate the dynamics of the chaotic map,which allows us to select optimal parameter configurations for the encryption *** findings indicate that the proposed sine-cosine map is capable of generating a rich variety of chaotic attractors,an essential characteristic for effective *** encryption technique is based on bit-plane decomposition,wherein a plain image is divided into distinct bit *** planes are organized into two matrices:one containing the most significant bit planes and the other housing the least significant *** subsequent phases of chaotic confusion and diffusion utilize these matrices to enhance *** auxiliary matrix is then generated,comprising the combined bit planes that yield the final encrypted *** results demonstrate that our proposed technique achieves a commendable level of security for safeguarding sensitive patient information in medical *** a result,image quality is evaluated using the Structural Similarity Index(SSIM),yielding values close to zero for encrypted images and approaching one for decrypted ***,the entropy values of the encrypted images are near 8,with a Number of Pixel Change Rate(NPCR)and Unified Average Change Intensity(UACI)exceeding 99.50%and 33%,***,quantitative assessments of occlusion attacks,along with comparisons to leading algorithms,validate the integrity and efficacy of our medical image encryption approach.
software-Defined Network (SDN) is an emerging networking paradigm and provides the cost-effective scalability and flexibility required for an IoT environment. Here, wireless SDN is supposed to efficiently use limited ...
详细信息
The TrickBot Botnet, emerging in late 2016, has been a significant cybersecurity threat, leveraging sophisticated attack vectors such as phishing emails, network vulnerabilities, and secondary payloads. This paper pro...
详细信息
Cooperative perception has been shown an effective approach to address the perception limitation problem faced by the individual perception in the era of autonomous driving. Considering a two-source two-hop cooperativ...
详细信息
There is an emerging interest in using agile methodologies in Global software Development(GSD)to get the mutual benefits of both *** is currently admired by many development teams as an agile most known meth-odology a...
详细信息
There is an emerging interest in using agile methodologies in Global software Development(GSD)to get the mutual benefits of both *** is currently admired by many development teams as an agile most known meth-odology and considered adequate for collocated *** the same time,stake-holders in GSD are dispersed by geographical,temporal,and socio-cultural *** to the controversial nature of Scrum and GSD,many significant challenges arise that might restrict the use of Scrum in *** conducted a Sys-tematic Literature Review(SLR)by following Kitchenham guidelines to identify the challenges that limit the use of Scrum in GSD and to explore the mitigation strategies adopted by practitioners to resolve the *** validate our reviewfindings,we conducted an industrial survey of 305 *** results of our study are consolidated into a research *** framework represents current best practices and recommendations to mitigate the identified distributed scrum challenges and is validated byfive experts of distributed *** of the expert review were found supportive,reflecting that the framework will help the stakeholders deliver sustainable products by effectively mitigating the identified challenges.
In this paper we consider the problem of training a Support Vector Machine (SVM) online using a stream of data in random order. We provide a fast online training algorithm for general SVM on very large datasets. Based...
详细信息
In this paper we consider the following 2-Central Path Problem (2CPP): Given a set of m polygonal curves = {P1,P2,...,Pm} in the plane, find two curves Pu and Pl, called 2-central paths, that best represent all curves...
详细信息
暂无评论