Advanced Search
Displaying 591-600 on page 60 of 13096. Per Page  

Articles / Online

  • A Multi-Factor Authentication-Based Framework for Identity Management in Cloud Applications
  • Abstract User's data is considered as a vital asset of several organizations. Migrating data to the cloud computing is not an easy decision for any organization due to the privacy and security concerns. Service providers must ensure that both data and applications that will be stored on the cloud should be protected in a secure environment. The data stored on the public cloud will be vulnerable to outside and inside attacks. This paper provides interactive multi-layer authentication frameworks for securing user identities on the cloud. Different access control policies are applied for verifying users on the cloud. A security mechanism is…
  • More
  •   Views:301       Downloads:274        Download PDF
  • Intelligent Model for Predicting the Quality of Services Violation
  • Abstract Cloud computing is providing IT services to its customer based on Service level agreements (SLAs). It is important for cloud service providers to provide reliable Quality of service (QoS) and to maintain SLAs accountability. Cloud service providers need to predict possible service violations before the emergence of an issue to perform remedial actions for it. Cloud users’ major concerns; the factors for service reliability are based on response time, accessibility, availability, and speed. In this paper, we, therefore, experiment with the parallel mutant-Particle swarm optimization (PSO) for the detection and predictions of QoS violations in terms of response time, speed,…
  • More
  •   Views:299       Downloads:274        Download PDF
  • An Experimental Simulation of Addressing Auto-Configuration Issues for Wireless Sensor Networks
  • Abstract Applications of Wireless Sensor devices are widely used by various monitoring sections such as environmental monitoring, industrial sensing, habitat modeling, healthcare and enemy movement detection systems. Researchers were found that 16 bytes packet size (payload) requires Media Access Control (MAC) and globally unique network addresses overheads as more as the payload itself which is not reasonable in most situations. The approach of using a unique address isn't preferable for most Wireless Sensor Networks (WSNs) applications as well. Based on the mentioned drawbacks, the current work aims to fill the existing gap in the field area by providing two strategies. First,…
  • More
  •   Views:263       Downloads:263        Download PDF
  • An Enhanced Privacy Preserving, Secure and Efficient Authentication Protocol for VANET
  • Abstract Vehicular ad hoc networks (VANETs) have attracted growing interest in both academia and industry because they can provide a viable solution that improves road safety and comfort for travelers on roads. However, wireless communications over open-access environments face many security and privacy issues that may affect deployment of large-scale VANETs. Researchers have proposed different protocols to address security and privacy issues in a VANET, and in this study we cryptanalyze some of the privacy preserving protocols to show that all existing protocols are vulnerable to the Sybil attack. The Sybil attack can be used by malicious actors to create fake…
  • More
  •   Views:297       Downloads:275        Download PDF
  • Continuous Tracking of GPS Signals with Data Wipe-Off Method
  • Abstract The decentralized pre-filter based vector tracking loop (VTL) configuration with data wipe-off (DWO) method of the Global Positioning System (GPS) receiver is proposed for performance enhancement. It is a challenging task to continuously track the satellites’ signals in weak signal environment for the GPS receiver. VTL is a very attractive technique as it can provide tracking capability in signal-challenged environments. In the VTL, each channel will not form a loop independently. On the contrary, the signals in the channels of VTL are shared with each other; the navigation processor in turn predicts the code phases. Thus, the receiver can successfully…
  • More
  •   Views:239       Downloads:256        Download PDF
  • An IoT-Based Intrusion Detection System Approach for TCP SYN Attacks
  • Abstract The success of Internet of Things (IoT) deployment has emerged important smart applications. These applications are running independently on different platforms, almost everywhere in the world. Internet of Medical Things (IoMT), also referred as the healthcare Internet of Things, is the most widely deployed application against COVID-19 and offering extensive healthcare services that are connected to the healthcare information technologies systems. Indeed, with the impact of the COVID-19 pandemic, a large number of interconnected devices designed to create smart networks. These networks monitor patients from remote locations as well as tracking medication orders. However, IoT may be jeopardized by attacks…
  • More
  •   Views:506       Downloads:412        Download PDF
  • Image Dehazing Based on Pixel Guided CNN with PAM via Graph Cut
  • Abstract Image dehazing is still an open research topic that has been undergoing a lot of development, especially with the renewed interest in machine learning-based methods. A major challenge of the existing dehazing methods is the estimation of transmittance, which is the key element of haze-affected imaging models. Conventional methods are based on a set of assumptions that reduce the solution search space. However, the multiplication of these assumptions tends to restrict the solutions to particular cases that cannot account for the reality of the observed image. In this paper we reduce the number of simplified hypotheses in order to attain…
  • More
  •   Views:267       Downloads:254        Download PDF
  • Object Detection for Cargo Unloading System Based on Fuzzy C Means
  • Abstract With the recent increase in the utilization of logistics and courier services, it is time for research on logistics systems fused with the fourth industry sector. Algorithm studies related to object recognition have been actively conducted in convergence with the emerging artificial intelligence field, but so far, algorithms suitable for automatic unloading devices that need to identify a number of unstructured cargoes require further development. In this study, the object recognition algorithm of the automatic loading device for cargo was selected as the subject of the study, and a cargo object recognition algorithm applicable to the automatic loading device is…
  • More
  •   Views:275       Downloads:289        Download PDF
  • Correlation Analysis of Energy Consumption of Agricultural Rotorcraft
  • Abstract With the rapid development of unmanned aerial vehicle technology, unmanned aerial vehicles (UAVs) have been widely used in the field of agricultural plant protection. Compared with fuel-driven UAVs, electrically driven rotorcrafts have many advantages such as lower cost, simpler operation, good maneuverability and cleaner power, which them popular in the plant protection. However, electrical rotorcrafts still face battery problems in actual operation, which limits its working time and application. Aiming at this issue, this paper studied the influence of rotorcraft flight parameters on energy consumption through series of carefully designed flight experiments. First of all, the linear motion experiments have…
  • More
  •   Views:234       Downloads:248        Download PDF
  • Computational Algorithms for the Analysis of Cancer Virotherapy Model
  • Abstract Cancer is a common term for many diseases that can affect any part of the body. In 2020, ten million people will die due to cancer. A worldwide leading cause of death is cancer by the World Health Organization (WHO) report. Interaction of cancer cells, viral therapy, and immune response are identified in this model. Mathematical and computational modeling is an effective tool to predict the dynamics of cancer virotherapy. The cell population is categorized into three parts like uninfected cells (x), infected cells (y), virus-free cells (v), and immune cells (z). The modeling of cancer-like diseases is based on…
  • More
  •   Views:269       Downloads:259        Download PDF
Displaying 591-600 on page 60 of 13096. Per Page