The advancements in technology have substantially grown the size of image *** image encryption algorithms have limited capabilities to deal with the emerging challenges in big data,including compression and noise *** ...
详细信息
The advancements in technology have substantially grown the size of image *** image encryption algorithms have limited capabilities to deal with the emerging challenges in big data,including compression and noise *** image encryption method that is based on chaotic maps and orthogonal matrix is proposed in this *** proposed scheme is built on the intriguing characteristics of an orthogonal *** Schmidt disperses the values of pixels in a plaintext image by generating a random orthogonal matrix using logistic chaotic *** the diffusion process,a block-wise random permutation of the data is performed using *** proposed scheme provides sufficient security and resilience to JPEG compression and channel noise through a series of experiments and security *** enables Partial Encryption(PE)for faster processing as well as complete encryption for increased *** higher values of the number of pixels change rates and unified average change intensity confirm the security of the encryption *** contrast to other schemes,the proposed approach can perform full and partial encryption depending on security requirements.
In this work, we introduce a new approach to model group actions in autoencoders. Diverging from prior research in this domain, we propose to learn the group actions on the latent space rather than strictly on the dat...
Parkinson’s disease is one of the most prevalent and harmful neurodegenerative conditions (PD). Even today, PD diagnosis and monitoring remain pricy and inconvenient processes. With the unprecedented progress of arti...
详细信息
Even though various features have been investigated in the detection of figurative language, oxymoron features have not been considered in the classification of sarcastic content. The main objective of this work is to...
详细信息
IOUT (Internet of Underwater Things) relies on underwater acoustic sensors, which have limited resources such as battery power and bandwidth. The exchange of data among these sensors faces challenges like propagation ...
详细信息
IOUT (Internet of Underwater Things) relies on underwater acoustic sensors, which have limited resources such as battery power and bandwidth. The exchange of data among these sensors faces challenges like propagation delay, node displacement, and environmental errors, making network maintenance difficult. The objective of this study is to address the energy efficiency and performance issues in IOUT networks by proposing and evaluating an energy-efficient routing protocol called Efficient Cost Wakeup Routing Protocol (ECWRP). To achieve the objective, the study focuses on two key parameters: Cost and Duty Cycle. The Duty Cycle parameter helps in reducing undesirable impacts during underwater communications, improving the performance of the routing protocol. The Cost parameter is utilized to select the most efficient path for data transmission, considering factors such as transmitting power levels. The protocol is applied to a multi-hop mesh-based network. The proposed ECWRP routing protocol is assessed through simulations, demonstrating its superior efficiency compared to the Ride algorithm. By eliminating unnecessary handshaking and optimizing route selection, ECWRP significantly enhances energy efficiency and overall performance within the IoUT network. The study's findings on the enhanced energy efficiency and performance improvements achieved by the ECWRP protocol hold promising implications for the design and optimization of IoUT networks, paving the way for more sustainable and effective communication systems in underwater environments. In conclusion, the study demonstrates the effectiveness of the Efficient Cost Wakeup Routing Protocol (ECWRP) in enhancing energy efficiency and performance in multi-hop mesh-based IoUT networks. The protocol's utilization of the Duty Cycle parameter reduces undesirable impacts, while the Cost parameter enables the selection of the most efficient path for data transmission. The results confirm the superiority of the ECWRP protoc
Image retargeting aims to alter the size of the image with attention to the contents. One of the main obstacles to training deep learning models for image retargeting is the need for a vast labeled dataset. Labeled da...
详细信息
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop...
详细信息
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this ***,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its ***,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation ***,it is used toward secure communication application *** it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)***,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance.
With the exponential rise in global air traffic,ensuring swift passenger processing while countering potential security threats has become a paramount concern for aviation *** X-ray baggage monitoring is now standard,...
详细信息
With the exponential rise in global air traffic,ensuring swift passenger processing while countering potential security threats has become a paramount concern for aviation *** X-ray baggage monitoring is now standard,manual screening has several limitations,including the propensity for errors,and raises concerns about passenger *** address these drawbacks,researchers have leveraged recent advances in deep learning to design threatsegmentation ***,these models require extensive training data and labour-intensive dense pixelwise annotations and are finetuned separately for each dataset to account for inter-dataset ***,this study proposes a semi-supervised contour-driven broad learning system(BLS)for X-ray baggage security threat instance segmentation referred to as *** research methodology involved enhancing representation learning and achieving faster training capability to tackle severe occlusion and class imbalance using a single training routine with limited baggage *** proposed framework was trained with minimal supervision using resource-efficient image-level labels to localize illegal items in multi-vendor baggage *** specifically,the framework generated candidate region segments from the input X-ray scans based on local intensity transition cues,effectively identifying concealed prohibited items without entire baggage *** multi-convolutional BLS exploits the rich complementary features extracted from these region segments to predict object categories,including threat and benign *** contours corresponding to the region segments predicted as threats were then utilized to yield the segmentation *** proposed C-BLX system was thoroughly evaluated on three highly imbalanced public datasets and surpassed other competitive approaches in baggage-threat segmentation,yielding 90.04%,78.92%,and 59.44%in terms of mIoU on GDXray,SIXray,and Compass-XP,***,the lim
Protein structure prediction is one of the main research areas in the field of Bio-informatics. The importance of proteins in drug design attracts researchers for finding the accurate tertiary structure of the protein...
详细信息
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern *** detection systems often struggle to mitigate such attacks in convention...
详细信息
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern *** detection systems often struggle to mitigate such attacks in conventional and software-defined networking(SDN)*** Machine Learning(ML)models can distinguish between benign and malicious traffic,their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent *** this paper,we propose a novel DDoS detection framework that combines Machine Learning(ML)and Ensemble Learning(EL)techniques to improve DDoS attack detection and mitigation in SDN *** model leverages the“DDoS SDN”dataset for training and evaluation and employs a dynamic feature selection mechanism that enhances detection accuracy by focusing on the most relevant *** adaptive approach addresses the limitations of conventional ML models and provides more accurate detection of various DDoS attack *** proposed ensemble model introduces an additional layer of detection,increasing reliability through the innovative application of ensemble *** proposed solution significantly enhances the model’s ability to identify and respond to dynamic threats in *** provides a strong foundation for proactive DDoS detection and mitigation,enhancing network defenses against evolving *** comprehensive runtime analysis of Simultaneous Multi-Threading(SMT)on identical configurations shows superior accuracy and efficiency,with significantly reduced computational time,making it ideal for real-time DDoS detection in dynamic,rapidly changing *** results demonstrate that our model achieves outstanding performance,outperforming traditional algorithms with 99%accuracy using Random Forest(RF)and K-Nearest Neighbors(KNN)and 98%accuracy using XGBoost.
暂无评论