Advanced Search
Displaying 1-10 on page 1 of 13086. Per Page  

Articles / Online

  • Sustainable-Security Assessment Through a Multi Perspective Benchmarking Framework
  • Abstract The current cyber-attack environment has put even the most protected systems at risk as the hackers are now modifying technologies to exploit even the tiniest of weaknesses and infiltrate networks. In this situation, it's critical to design and construct software that is both secure and long-lasting. While security is the most well-defined aspect of health information software systems, it is equally significant to prioritise sustainability because any health information software system will be more effective if it provides both security and sustainability to the customers at the same time. In this league, it is crucial to determine those characteristics in…
  • More
  •   Views:72       Downloads:85        Download PDF
  • A Secure Three-Party Authenticated Key Exchange Protocol for Social Networks
  • Abstract The 3PAKE (Three-Party Authenticated Key Exchange) protocol is a valuable cryptographic method that offers safe communication and permits two diverse parties to consent to a new safe meeting code using the trusted server. There have been explored numerous 3PAKE protocols earlier to create a protected meeting code between users employing the trusted server. However, existing modified 3PAKE protocols have numerous drawbacks and are incapable to provide desired secrecy against diverse attacks such as man-in-the-middle, brute-force attacks, and many others in social networks. In this article, the authors proposed an improved as well as safe 3PAKE protocol based on the hash…
  • More
  •   Views:61       Downloads:75        Download PDF
  • Reinforced CNN Forensic Discriminator to Detect Document Forgery by DCGAN
  • Abstract Recently, the technology of digital image forgery based on a generative adversarial network (GAN) has considerably improved to the extent that it is difficult to distinguish it from the original image with the naked eye by compositing and editing a person's face or a specific part with the original image. Thus, much attention has been paid to digital image forgery as a social issue. Further, document forgery through GANs can completely change the meaning and context in a document, and it is difficult to identify whether the document is forged or not, which is dangerous. Nonetheless, few studies have been…
  • More
  •   Views:65       Downloads:74        Download PDF
  • Estimator-Based GPS Attitude and Angular Velocity Determination
  • Abstract In this paper, the estimator-based Global Positioning System (GPS) attitude and angular velocity determination is presented. Outputs of the attitude estimator include the attitude angles and attitude rates or body angular velocities, depending on the design of estimator. Traditionally as a position, velocity and time sensor, the GPS also offers a free attitude-determination interferometer. GPS research and applications to the field of attitude determination using carrier phase or Doppler measurement has been extensively conducted. The raw attitude solution using the interferometry technique based on the least-squares approach is inherently noisy. The estimator such as the Kalman filter (KF) or extended…
  • More
  •   Views:51       Downloads:64        Download PDF
  • Optimized Deep Learning Model for Colorectal Cancer Detection and Classification Model
  • Abstract The recent developments in biological and information technologies have resulted in the generation of massive quantities of data it speeds up the process of knowledge discovery from biological systems. Due to the advancements of medical imaging in healthcare decision making, significant attention has been paid by the computer vision and deep learning (DL) models. At the same time, the detection and classification of colorectal cancer (CC) become essential to reduce the severity of the disease at an earlier stage. The existing methods are commonly based on the combination of textual features to examine the classifier results or machine learning (ML)…
  • More
  •   Views:67       Downloads:75        Download PDF
  • Exploration of IoT Nodes Communication Using LoRaWAN in Forest Environment
  • Abstract The simultaneous advances in the Internet of Things (IoT), Artificial intelligence (AI) and Robotics is going to revolutionize our world in the near future. In recent years, LoRa (Long Range) wireless powered by LoRaWAN (LoRa Wide Area Network) protocol has attracted the attention of researchers for numerous applications in the IoT domain. LoRa is a low power, unlicensed Industrial, Scientific, and Medical (ISM) band-equipped wireless technology that utilizes a wide area network protocol, i.e., LoRaWAN, to incorporate itself into the network infrastructure. In this paper, we have evaluated the LoRaWAN communication protocol for the implementation of the IoT (Internet of Things)…
  • More
  •   Views:67       Downloads:69        Download PDF
  • LCF: A Deep Learning-Based Lightweight CSI Feedback Scheme for MIMO Networks
  • Abstract Recently, as deep learning technologies have received much attention for their great potential in extracting the principal components of data, there have been many efforts to apply them to the Channel State Information (CSI) feedback overhead problem, which can significantly limit Multi-Input Multi-Output (MIMO) beamforming gains. Unfortunately, since most compression models can quickly become outdated due to channel variation, timely model updates are essential for reflecting the current channel conditions, resulting in frequent additional transmissions for model sharing between transceivers. In particular, the heavy network models employed by most previous studies to achieve high compression gains exacerbate the impact of…
  • More
  •   Views:25       Downloads:24        Download PDF
  • Automated Multi-Document Biomedical Text Summarization Using Deep Learning Model
  • Abstract Due to the advanced developments of the Internet and information technologies, a massive quantity of electronic data in the biomedical sector has been exponentially increased. To handle the huge amount of biomedical data, automated multi-document biomedical text summarization becomes an effective and robust approach of accessing the increased amount of technical and medical literature in the biomedical sector through the summarization of multiple source documents by retaining the significantly informative data. So, multi-document biomedical text summarization acts as a vital role to alleviate the issue of accessing precise and updated information. This paper presents a Deep Learning based Attention Long…
  • More
  •   Views:36       Downloads:26        Download PDF
  • Mathematical Modelling of Quantum Kernel Method for Biomedical Data Analysis
  • Abstract This study presents a novel method to detect the medical application based on Quantum Computing (QC) and a few Machine Learning (ML) systems. QC has a primary advantage i.e., it uses the impact of quantum parallelism to provide the consequences of prime factorization issue in a matter of seconds. So, this model is suggested for medical application only by recent researchers. A novel strategy i.e., Quantum Kernel Method (QKM) is proposed in this paper for data prediction. In this QKM process, Linear Tunicate Swarm Algorithm (LTSA), the optimization technique is used to calculate the loss function initially and is aimed…
  • More
  •   Views:44       Downloads:32        Download PDF
  • Examination of Pine Wilt Epidemic Model through Efficient Algorithm
  • Abstract Pine wilt is a dramatic disease that kills infected trees within a few weeks to a few months. The cause is the pathogen Pinewood Nematode. Most plant-parasitic nematodes are attached to plant roots, but pinewood nematodes are found in the tops of trees. Nematodes kill the tree by feeding the cells around the resin ducts. The modeling of a pine wilt disease is based on six compartments, including three for plants (susceptible trees, exposed trees, and infected trees) and the other for the beetles (susceptible beetles, exposed beetles, and infected beetles). The deterministic modeling, along with subpopulations, is based on…
  • More
  •   Views:37       Downloads:25        Download PDF
Displaying 1-10 on page 1 of 13086. Per Page