期刊文献+
共找到80篇文章
< 1 2 4 >
每页显示 20 50 100
Dataset of Large Gathering Images for Person Identification and Tracking
1
作者 Adnan Nadeem Amir Mehmood +7 位作者 Kashif Rizwan Muhammad Ashraf Nauman Qadeer Ali Alzahrani Qammer H.Abbasi Fazal Noor Majed Alhaisoni Nadeem Mahmood 《Computers, Materials & Continua》 SCIE EI 2023年第3期6065-6080,共16页
This paper presents a large gathering dataset of images extracted from publicly filmed videos by 24 cameras installed on the premises of Masjid Al-Nabvi,Madinah,Saudi Arabia.This dataset consists of raw and processed ... This paper presents a large gathering dataset of images extracted from publicly filmed videos by 24 cameras installed on the premises of Masjid Al-Nabvi,Madinah,Saudi Arabia.This dataset consists of raw and processed images reflecting a highly challenging and unconstraint environment.The methodology for building the dataset consists of four core phases;that include acquisition of videos,extraction of frames,localization of face regions,and cropping and resizing of detected face regions.The raw images in the dataset consist of a total of 4613 frames obtained fromvideo sequences.The processed images in the dataset consist of the face regions of 250 persons extracted from raw data images to ensure the authenticity of the presented data.The dataset further consists of 8 images corresponding to each of the 250 subjects(persons)for a total of 2000 images.It portrays a highly unconstrained and challenging environment with human faces of varying sizes and pixel quality(resolution).Since the face regions in video sequences are severely degraded due to various unavoidable factors,it can be used as a benchmark to test and evaluate face detection and recognition algorithms for research purposes.We have also gathered and displayed records of the presence of subjects who appear in presented frames;in a temporal context.This can also be used as a temporal benchmark for tracking,finding persons,activity monitoring,and crowd counting in large crowd scenarios. 展开更多
关键词 Large crowd gatherings a dataset of large crowd images highly uncontrolled environment tracking missing persons face recognition activity monitoring
下载PDF
Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection Systems
2
作者 Reem Alkanhel Doaa Sami Khafaga +5 位作者 El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Rashid Amin Mostafa Abotaleb B.M.El-den 《Computers, Materials & Continua》 SCIE EI 2023年第2期2695-2709,共15页
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices remotely.Due to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy... The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices remotely.Due to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)networks may be vulnerable to several routing attacks.That’s why a network intrusion detection system(NIDS)is needed to guard against routing assaults on RPL-based IoT networks.The imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network attacks.Therefore,we propose in this paper a novel approach to balance the dataset classes based on metaheuristic optimization applied to locality-sensitive hashing and synthetic minority oversampling technique(LSH-SMOTE).The proposed optimization approach is based on a new hybrid between the grey wolf and dipper throated optimization algorithms.To prove the effectiveness of the proposed approach,a set of experiments were conducted to evaluate the performance of NIDS for three cases,namely,detection without dataset balancing,detection with SMOTE balancing,and detection with the proposed optimized LSHSOMTE balancing.Experimental results showed that the proposed approach outperforms the other approaches and could boost the detection accuracy.In addition,a statistical analysis is performed to study the significance and stability of the proposed approach.The conducted experiments include seven different types of attack cases in the RPL-NIDS17 dataset.Based on the 2696 CMC,2023,vol.74,no.2 proposed approach,the achieved accuracy is(98.1%),sensitivity is(97.8%),and specificity is(98.8%). 展开更多
关键词 Metaheuristics grey wolf optimization dipper throated optimization dataset balancing locality sensitive hashing SMOTE
下载PDF
Optimization of Electrocardiogram Classification Using Dipper Throated Algorithm and Differential Evolution
3
作者 Doaa Sami Khafaga El-Sayed M.El-kenawy +4 位作者 Faten Khalid Karim Sameer Alshetewi Abdelhameed Ibrahim Abdelaziz A.Abdelhamid D.L.Elsheweikh 《Computers, Materials & Continua》 SCIE EI 2023年第2期2379-2395,共17页
Electrocardiogram(ECG)signal is a measure of the heart’s electrical activity.Recently,ECG detection and classification have benefited from the use of computer-aided systems by cardiologists.The goal of this paper is ... Electrocardiogram(ECG)signal is a measure of the heart’s electrical activity.Recently,ECG detection and classification have benefited from the use of computer-aided systems by cardiologists.The goal of this paper is to improve the accuracy of ECG classification by combining the Dipper Throated Optimization(DTO)and Differential Evolution Algorithm(DEA)into a unified algorithm to optimize the hyperparameters of neural network(NN)for boosting the ECG classification accuracy.In addition,we proposed a new feature selection method for selecting the significant feature that can improve the overall performance.To prove the superiority of the proposed approach,several experimentswere conducted to compare the results achieved by the proposed approach and other competing approaches.Moreover,statistical analysis is performed to study the significance and stability of the proposed approach using Wilcoxon and ANOVA tests.Experimental results confirmed the superiority and effectiveness of the proposed approach.The classification accuracy achieved by the proposed approach is(99.98%). 展开更多
关键词 ELECTROCARDIOGRAM differential evolution algorithm dipper throated optimization neural networks
下载PDF
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
4
作者 Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah 《Computers, Materials & Continua》 SCIE EI 2024年第8期1867-1888,共22页
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their applications.Therefore,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN applic... Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their applications.Therefore,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN applications.This paper proposes an enhanced version of the AODV(Ad Hoc On-Demand Distance Vector)protocol capable of detecting blackholes and malfunctioning benign nodes in WSNs,thereby avoiding them when delivering packets.The proposed version employs a network-based reputation system to select the best and most secure path to a destination.To achieve this goal,the proposed version utilizes the Watchdogs/Pathrater mechanisms in AODV to gather and broadcast reputations to all network nodes to build the network-based reputation system.To minimize the network overhead of the proposed approach,the paper uses reputation aggregator nodes only for forwarding reputation tables.Moreover,to reduce the overhead of updating reputation tables,the paper proposes three mechanisms,which are the prompt broadcast,the regular broadcast,and the light broadcast approaches.The proposed enhanced version has been designed to perform effectively in dynamic environments such as mobile WSNs where nodes,including blackholes,move continuously,which is considered a challenge for other protocols.Using the proposed enhanced protocol,a node evaluates the security of different routes to a destination and can select the most secure routing path.The paper provides an algorithm that explains the proposed protocol in detail and demonstrates a case study that shows the operations of calculating and updating reputation values when nodes move across different zones.Furthermore,the paper discusses the proposed approach’s overhead analysis to prove the proposed enhancement’s correctness and applicability. 展开更多
关键词 AODV blackhole malfunction nodes pathrater reputation system wireless sensor networks(WSNs) watchdogs
下载PDF
Robust Prediction of the Bandwidth of Metamaterial Antenna Using Deep Learning 被引量:2
5
作者 Abdelaziz A.Abdelhamid Sultan R.Alotaibi 《Computers, Materials & Continua》 SCIE EI 2022年第8期2305-2321,共17页
The design ofmicrostrip antennas is a complex and time-consuming process,especially the step of searching for the best design parameters.Meanwhile,the performance ofmicrostrip antennas can be improved usingmetamateria... The design ofmicrostrip antennas is a complex and time-consuming process,especially the step of searching for the best design parameters.Meanwhile,the performance ofmicrostrip antennas can be improved usingmetamaterial,which results in a new class of antennas called metamaterial antenna.Several parameters affect the radiation loss and quality factor of this class of antennas,such as the antenna size.Recently,the optimal values of the design parameters of metamaterial antennas can be predicted using machine learning,which presents a better alternative to simulation tools and trialand-error processes.However,the prediction accuracy depends heavily on the quality of the machine learning model.In this paper,and benefiting from the current advances in deep learning,we propose a deep network architecture to predict the bandwidth of metamaterial antenna.Experimental results show that the proposed deep network could accurately predict the optimal values of the antenna bandwidth with a tiny value of mean-square error(MSE).In addition,the proposed model is comparedwith current competing approaches that are based on support vector machines,multi-layer perceptron,K-nearest neighbors,and ensemble models.The results show that the proposed model is better than the other approaches and can predict antenna bandwidth more accurately. 展开更多
关键词 Metamaterial antenna deep learning bandwidth prediction regression models
下载PDF
Live Migration of Virtual Machines Using a Mamdani Fuzzy Inference System 被引量:1
6
作者 Tahir Alyas Iqra Javed +3 位作者 Abdallah Namoun Ali Tufail Sami Alshmrany Nadia Tabassum 《Computers, Materials & Continua》 SCIE EI 2022年第5期3019-3033,共15页
Efforts were exerted to enhance the live virtual machines(VMs)migration,including performance improvements of the live migration of services to the cloud.The VMs empower the cloud users to store relevant data and reso... Efforts were exerted to enhance the live virtual machines(VMs)migration,including performance improvements of the live migration of services to the cloud.The VMs empower the cloud users to store relevant data and resources.However,the utilization of servers has increased significantly because of the virtualization of computer systems,leading to a rise in power consumption and storage requirements by data centers,and thereby the running costs.Data center migration technologies are used to reduce risk,minimize downtime,and streamline and accelerate the data center move process.Indeed,several parameters,such as non-network overheads and downtime adjustment,may impact the live migration time and server downtime to a large extent.By virtualizing the network resources,the infrastructure as a service(IaaS)can be used dynamically to allocate the bandwidth to services and monitor the network flow routing.Due to the large amount of filthy retransmission,existing live migration systems still suffer from extensive downtime and significant performance degradation in crossdata-center situations.This study aims to minimize the energy consumption by restricting the VMs migration and switching off the guests depending on a threshold,thereby boosting the residual network bandwidth in the data center with a minimal breach of the service level agreement(SLA).In this research,we analyzed and evaluated the findings observed through simulating different parameters,like availability,downtime,and outage of VMs in data center processes.This new paradigm is composed of two forms of detection strategies in the live migration approach from the source host to the destination source machine. 展开更多
关键词 Cloud computing IAAS data centre STORAGE performance analysis live migration
下载PDF
Artificial Intelligence Based Data Offloading Technique for Secure MEC Systems 被引量:1
7
作者 Fadwa Alrowais Ahmed S.Almasoud +5 位作者 Radwa Marzouk Fahd N.Al-Wesabi Anwer Mustafa Hilal Mohammed Rizwanullah Abdelwahed Motwakel Ishfaq Yaseen 《Computers, Materials & Continua》 SCIE EI 2022年第8期2783-2795,共13页
Mobile edge computing(MEC)provides effective cloud services and functionality at the edge device,to improve the quality of service(QoS)of end users by offloading the high computation tasks.Currently,the introduction o... Mobile edge computing(MEC)provides effective cloud services and functionality at the edge device,to improve the quality of service(QoS)of end users by offloading the high computation tasks.Currently,the introduction of deep learning(DL)and hardware technologies paves amethod in detecting the current traffic status,data offloading,and cyberattacks in MEC.This study introduces an artificial intelligence with metaheuristic based data offloading technique for Secure MEC(AIMDO-SMEC)systems.The proposed AIMDO-SMEC technique incorporates an effective traffic prediction module using Siamese Neural Networks(SNN)to determine the traffic status in the MEC system.Also,an adaptive sampling cross entropy(ASCE)technique is utilized for data offloading in MEC systems.Moreover,the modified salp swarm algorithm(MSSA)with extreme gradient boosting(XGBoost)technique was implemented to identification and classification of cyberattack that exist in the MEC systems.For examining the enhanced outcomes of the AIMDO-SMEC technique,a comprehensive experimental analysis is carried out and the results demonstrated the enhanced outcomes of the AIMDOSMEC technique with the minimal completion time of tasks(CTT)of 0.680. 展开更多
关键词 Data offloading mobile edge computing security machine learning artificial intelligence XGBoost salp swarm algorithm
下载PDF
Improved Prediction of Metamaterial Antenna Bandwidth Using Adaptive Optimization of LSTM 被引量:1
8
作者 Doaa Sami Khafaga Amel Ali Alhussan +4 位作者 El-Sayed M.El-kenawy Abdelhameed Ibrahim Said H.Abd Elkhalik Shady Y.El-Mashad Abdelaziz A.Abdelhamid 《Computers, Materials & Continua》 SCIE EI 2022年第10期865-881,共17页
The design of an antenna requires a careful selection of its parameters to retain the desired performance.However,this task is time-consuming when the traditional approaches are employed,which represents a significant... The design of an antenna requires a careful selection of its parameters to retain the desired performance.However,this task is time-consuming when the traditional approaches are employed,which represents a significant challenge.On the other hand,machine learning presents an effective solution to this challenge through a set of regression models that can robustly assist antenna designers to find out the best set of design parameters to achieve the intended performance.In this paper,we propose a novel approach for accurately predicting the bandwidth of metamaterial antenna.The proposed approach is based on employing the recently emerged guided whale optimization algorithm using adaptive particle swarm optimization to optimize the parameters of the long-short-term memory(LSTM)deep network.This optimized network is used to retrieve the metamaterial bandwidth given a set of features.In addition,the superiority of the proposed approach is examined in terms of a comparison with the traditional multilayer perceptron(ML),Knearest neighbors(K-NN),and the basic LSTM in terms of several evaluation criteria such as root mean square error(RMSE),mean absolute error(MAE),and mean bias error(MBE).Experimental results show that the proposed approach could achieve RMSE of(0.003018),MAE of(0.001871),and MBE of(0.000205).These values are better than those of the other competing models. 展开更多
关键词 Metamaterial antenna long short term memory(LSTM) guided whale optimization algorithm(Guided WOA) adaptive dynamic particle swarm algorithm(AD-PSO)
下载PDF
Security and Privacy Challenges in Cyber-Physical Systems 被引量:1
9
作者 Fahd AlDosari 《Journal of Information Security》 2017年第4期285-295,共11页
Cyber-Physical Systems, or Smart-Embedded Systems, are co-engineered for the integration of physical, computational and networking resources. These resources are used to develop an efficient base for enhancing the qua... Cyber-Physical Systems, or Smart-Embedded Systems, are co-engineered for the integration of physical, computational and networking resources. These resources are used to develop an efficient base for enhancing the quality of services in all areas of life and achieving a classier lifestyle in terms of a required service’s functionality and timing. Cyber-Physical Systems (CPSs) complement the need to have smart products (e.g., homes, hospitals, airports, cities). In other words, regulate the three kinds of resources available: physical, computational, and networking. This regulation supports communication and interaction between the human word and digital word to find the required intelligence in all scopes of life, including Telecommunication, Power Generation and Distribution, and Manufacturing. Data Security is among the most important issues to be considered in recent technologies. Because Cyber-Physical Systems consist of interacting complex components and middle-ware, they face real challenges in being secure against cyber-attacks while functioning efficiently and without affecting or degrading their performance. This study gives a detailed description of CPSs, their challenges (including cyber-security attacks), characteristics, and related technologies. We also focus on the tradeoff between security and performance in CPS, and we present the most common Side Channel Attacks on the implementations of cryptographic algorithms (symmetric: AES and asymmetric: RSA) with the countermeasures against these attacks. 展开更多
关键词 SECURITY Cyber-Physical SYSTEMS SIDE CHANNEL ATTACKS
下载PDF
Hybrid Dipper Throated and Grey Wolf Optimization for Feature Selection Applied to Life Benchmark Datasets 被引量:2
10
作者 Doaa Sami Khafaga El-Sayed M.El-kenawy +4 位作者 Faten Khalid Karim Mostafa Abotaleb Abdelhameed Ibrahim Abdelaziz A.Abdelhamid D.L.Elsheweikh 《Computers, Materials & Continua》 SCIE EI 2023年第2期4531-4545,共15页
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine learning.Each feature in a dataset has 2n possible subsets,making it challenging to select the optimum collectio... Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine learning.Each feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of features using typical methods.As a result,a new metaheuristicsbased feature selection method based on the dipper-throated and grey-wolf optimization(DTO-GW)algorithms has been developed in this research.Instability can result when the selection of features is subject to metaheuristics,which can lead to a wide range of results.Thus,we adopted hybrid optimization in our method of optimizing,which allowed us to better balance exploration and harvesting chores more equitably.We propose utilizing the binary DTO-GW search approach we previously devised for selecting the optimal subset of attributes.In the proposed method,the number of features selected is minimized,while classification accuracy is increased.To test the proposed method’s performance against eleven other state-of-theart approaches,eight datasets from the UCI repository were used,such as binary grey wolf search(bGWO),binary hybrid grey wolf,and particle swarm optimization(bGWO-PSO),bPSO,binary stochastic fractal search(bSFS),binary whale optimization algorithm(bWOA),binary modified grey wolf optimization(bMGWO),binary multiverse optimization(bMVO),binary bowerbird optimization(bSBO),binary hysteresis optimization(bHy),and binary hysteresis optimization(bHWO).The suggested method is superior 4532 CMC,2023,vol.74,no.2 and successful in handling the problem of feature selection,according to the results of the experiments. 展开更多
关键词 Metaheuristics dipper throated optimization grey wolf optimization binary optimizer feature selection
下载PDF
Computing Connected Resolvability of Graphs Using Binary Enhanced Harris Hawks Optimization 被引量:1
11
作者 Basma Mohamed Linda Mohaisen Mohamed Amin 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期2349-2361,共13页
In this paper,we consider the NP-hard problem offinding the minimum connected resolving set of graphs.A vertex set B of a connected graph G resolves G if every vertex of G is uniquely identified by its vector of distanc... In this paper,we consider the NP-hard problem offinding the minimum connected resolving set of graphs.A vertex set B of a connected graph G resolves G if every vertex of G is uniquely identified by its vector of distances to the ver-tices in B.A resolving set B of G is connected if the subgraph B induced by B is a nontrivial connected subgraph of G.The cardinality of the minimal resolving set is the metric dimension of G and the cardinality of minimum connected resolving set is the connected metric dimension of G.The problem is solved heuristically by a binary version of an enhanced Harris Hawk Optimization(BEHHO)algorithm.This is thefirst attempt to determine the connected resolving set heuristically.BEHHO combines classical HHO with opposition-based learning,chaotic local search and is equipped with an S-shaped transfer function to convert the contin-uous variable into a binary one.The hawks of BEHHO are binary encoded and are used to represent which one of the vertices of a graph belongs to the connected resolving set.The feasibility is enforced by repairing hawks such that an addi-tional node selected from V\B is added to B up to obtain the connected resolving set.The proposed BEHHO algorithm is compared to binary Harris Hawk Optimi-zation(BHHO),binary opposition-based learning Harris Hawk Optimization(BOHHO),binary chaotic local search Harris Hawk Optimization(BCHHO)algorithms.Computational results confirm the superiority of the BEHHO for determining connected metric dimension. 展开更多
关键词 Connected resolving set binary optimization harris hawks algorithm
下载PDF
Metaheuristic Optimization of Time Series Models for Predicting Networks Traffic 被引量:1
12
作者 Reem Alkanhel El-Sayed M.El-kenawy +3 位作者 D.L.Elsheweikh Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Doaa Sami Khafaga 《Computers, Materials & Continua》 SCIE EI 2023年第4期427-442,共16页
Traffic prediction of wireless networks attracted many researchersand practitioners during the past decades. However, wireless traffic frequentlyexhibits strong nonlinearities and complicated patterns, which makes it ... Traffic prediction of wireless networks attracted many researchersand practitioners during the past decades. However, wireless traffic frequentlyexhibits strong nonlinearities and complicated patterns, which makes it challengingto be predicted accurately. Many of the existing approaches forpredicting wireless network traffic are unable to produce accurate predictionsbecause they lack the ability to describe the dynamic spatial-temporalcorrelations of wireless network traffic data. In this paper, we proposed anovel meta-heuristic optimization approach based on fitness grey wolf anddipper throated optimization algorithms for boosting the prediction accuracyof traffic volume. The proposed algorithm is employed to optimize the hyperparametersof long short-term memory (LSTM) network as an efficient timeseries modeling approach which is widely used in sequence prediction tasks.To prove the superiority of the proposed algorithm, four other optimizationalgorithms were employed to optimize LSTM, and the results were compared.The evaluation results confirmed the effectiveness of the proposed approachin predicting the traffic of wireless networks accurately. On the other hand,a statistical analysis is performed to emphasize the stability of the proposedapproach. 展开更多
关键词 Network traffic soft computing LSTM metaheuristic optimization
下载PDF
SIDIF: Location Based Technique as a Determinant of Effectiveness and Efficiency in Artificial Reefs Development Project
13
作者 Mustafa Man Wan Aezwani Wan Abu Bakar +2 位作者 Mohd Shafry Mohd Rahim: Muhammad Zaidi Zakaria Zailani Mohamed Sidel 《通讯和计算机(中英文版)》 2011年第6期422-428,共7页
关键词 位置数据 人工鱼礁 开发 技术 基础 测量评价 评估过程 框架结构
下载PDF
Study of an Active Network Management System
14
作者 Yan Ma Xiaozhen Zhang Xiaomei Liang 《通讯和计算机(中英文版)》 2006年第1期32-36,共5页
关键词 网络管理 信息包 网络技术 网络资源
下载PDF
STUDY ON MULTIMEDIA ANIMATION SYSTEM OF ACUPOINT ANATOMY WITH FLASH
15
作者 王斌 罗志勇 +2 位作者 普玉凤 洪虹 左志雄 《World Journal of Acupuncture-Moxibustion》 2006年第2期37-42,共6页
Mastering anatomic structures of acupoints is of active significance for avoiding blindly needling and preventing accidents of acupuncture and moxibustion. This multimedia animation system of acupoint anatomy adopts F... Mastering anatomic structures of acupoints is of active significance for avoiding blindly needling and preventing accidents of acupuncture and moxibustion. This multimedia animation system of acupoint anatomy adopts Flash software as developing tool and can dynamically display anatomic layers of needle insertion, with objectivity, convenient operation and English-Chinese control,higher reliability, easy to study and master anatomic knowledge of acupoint anatomy, increase teaching efficiency, and richen teaching ways. This system can be used as a teaching tool of acupuncture and moxibustion, a software of studying anatomy of acupoints and an adjuvant tool of medical workers in studying anatomy. 展开更多
关键词 Acupoints/acup-mox Anatomy Multimedia Flash Animation
下载PDF
The Design of the Online Teaching System based on Multiagent System
16
作者 Ablimit Arxiden Shanxia Wang 《International Journal of Technology Management》 2016年第1期10-12,共3页
By introducing multi-agent technology to the online teaching system and establishing a personalized online teaching system model, the intelligent and personalized problems in the traditional online teaching system are... By introducing multi-agent technology to the online teaching system and establishing a personalized online teaching system model, the intelligent and personalized problems in the traditional online teaching system are solved; the needs of students for learning are fulfilled; the intelligent and interactive functions of the online teaching system are improved; a new interactive online teaching model is implemented. In this paper, the online system design based on multi-agent system technology is raised, and the modules and functions of the system are defined. 展开更多
关键词 Multi-agent System Intelligent Model Online Teaching System
下载PDF
Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality
17
作者 Ali Arshad Muhammad Nadeem +6 位作者 Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Zaid Alzaid Rana Alabdan Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第5期3065-3089,共25页
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptog... There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptography is the best way to transmit data in a secure and reliable format.Various researchers have developed various mechanisms to transfer data securely,which can convert data from readable to unreadable,but these algorithms are not sufficient to provide complete data security.Each algorithm has some data security issues.If some effective data protection techniques are used,the attacker will not be able to decipher the encrypted data,and even if the attacker tries to tamper with the data,the attacker will not have access to the original data.In this paper,various data security techniques are developed,which can be used to protect the data from attackers completely.First,a customized American Standard Code for Information Interchange(ASCII)table is developed.The value of each Index is defined in a customized ASCII table.When an attacker tries to decrypt the data,the attacker always tries to apply the predefined ASCII table on the Ciphertext,which in a way,can be helpful for the attacker to decrypt the data.After that,a radix 64-bit encryption mechanism is used,with the help of which the number of cipher data is doubled from the original data.When the number of cipher values is double the original data,the attacker tries to decrypt each value.Instead of getting the original data,the attacker gets such data that has no relation to the original data.After that,a Hill Matrix algorithm is created,with the help of which a key is generated that is used in the exact plain text for which it is created,and this Key cannot be used in any other plain text.The boundaries of each Hill text work up to that text.The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms.Then,the Kasiski test is used to verify the validity of the proposed algorithm and found that,if the proposed algorithm is used for data encryption,so an attacker cannot break the proposed algorithm security using any technique or algorithm. 展开更多
关键词 CRYPTOGRAPHY symmetric cipher text ENCRYPTION matrix cipher encoding decoding hill matrix 64-bit encryption
下载PDF
Blockchain and IIoT Enabled Solution for Social Distancing and Isolation Management to Prevent Pandemics
18
作者 Muhammad Saad Maaz Bin Ahmad +4 位作者 Muhammad Asif Muhammad Khalid Khan Toqeer Mahmood Elsayed Tag Eldin Hala Abdel Hameed 《Computers, Materials & Continua》 SCIE EI 2023年第7期687-709,共23页
Pandemics have always been a nightmare for humanity,especially in developing countries.Forced lockdowns are considered one of the effective ways to deal with spreading such pandemics.Still,developing countries cannot ... Pandemics have always been a nightmare for humanity,especially in developing countries.Forced lockdowns are considered one of the effective ways to deal with spreading such pandemics.Still,developing countries cannot afford such solutions because these may severely damage the country’s econ-omy.Therefore,this study presents the proactive technological mechanisms for business organizations to run their standard business processes during pandemic-like situations smoothly.The novelty of this study is to provide a state-of-the-art solution to prevent pandemics using industrial internet of things(IIoT)and blockchain-enabled technologies.Compared to existing studies,the immutable and tamper-proof contact tracing and quarantine management solution is proposed.The use of advanced technologies and information security is a critical area for practitioners in the internet of things(IoT)and corresponding solutions.Therefore,this study also emphasizes information security,end-to-end solution,and experimental results.Firstly,a wearable wristband is proposed,incorporating 4G-enabled ultra-wideband(UWB)technology for smart contact tracing mechanisms in industries to comply with standard operating procedures outlined by the world health organization(WHO).Secondly,distributed ledger technology(DLT)omits the centralized dependency for transmitting contact tracing data.Thirdly,a privacy-preserving tracing mechanism is discussed using a public/private key cryptography-based authentication mechanism.Lastly,based on geofencing techniques,blockchain-enabled machine-to-machine(M2M)technology is proposed for quarantine management.The step-by-step methodology and test results are proposed to ensure contact tracing and quarantine management.Unlike existing research studies,the security aspect is also considered in the realm of blockchain.The practical implementation of the proposed solution also obtains the results.The results indicate the successful implementation of blockchain-enabled contact tracing and isolation management using IoT and geo-fencing techniques,which could help battle pandemic situations.Researchers can also consider the 5G-enabled narrowband internet of things(NB-IoT)technologies to implement contact tracing solutions. 展开更多
关键词 Blockchain contact tracing distributed ledger technology geo-fencing internet of things industrial internet of things isolation management social distancing ULTRA-WIDEBAND
下载PDF
A Framework Study for Healthcare Information Systems
19
作者 Celal Ceken 《Journal of Computer and Communications》 2014年第11期61-67,共7页
Healthcare information systems are crucial components for better coordination of healthcare. They focus on the proper generation, transmission, storage, and retrieval of health data. It is obvious that production of a... Healthcare information systems are crucial components for better coordination of healthcare. They focus on the proper generation, transmission, storage, and retrieval of health data. It is obvious that production of accurate, relevant, and timely health information is foundation of good decision making. Rapid progress in wireless communications and embedded systems result in wireless sensor networks to be employed even in biomedical applications as well as their prominent deployment options. This study proposes a healthcare information system framework which consists of such components as;wireless sensor networks, cellular networks, a MATLAB interface, a database, and a web based monitoring interface. A case study that includes sensing, transferring, storing and web based monitoring processes of ECG signal is also introduced in the study, so that the behavior of the system developed can be tested. The results show that the framework presented here can not only be employed as a healthcare information system, but it can also be used as an infrastructure in related research activities and consequently, lots of time can be saved from creating an experimental environment. 展开更多
关键词 Healthcare Information System Biomedical Automation Wireless Sensor Networks Web-Based Healthcare System Framework
下载PDF
Plant Leaf Diseases Classification Using Improved K-Means Clustering and SVM Algorithm for Segmentation
20
作者 Mona Jamjoom Ahmed Elhadad +1 位作者 Hussein Abulkasim Safia Abbas 《Computers, Materials & Continua》 SCIE EI 2023年第7期367-382,共16页
Several pests feed on leaves,stems,bases,and the entire plant,causing plant illnesses.As a result,it is vital to identify and eliminate the disease before causing any damage to plants.Manually detecting plant disease ... Several pests feed on leaves,stems,bases,and the entire plant,causing plant illnesses.As a result,it is vital to identify and eliminate the disease before causing any damage to plants.Manually detecting plant disease and treating it is pretty challenging in this period.Image processing is employed to detect plant disease since it requires much effort and an extended processing period.The main goal of this study is to discover the disease that affects the plants by creating an image processing system that can recognize and classify four different forms of plant diseases,including Phytophthora infestans,Fusarium graminearum,Puccinia graminis,tomato yellow leaf curl.Therefore,this work uses the Support vector machine(SVM)classifier to detect and classify the plant disease using various steps like image acquisition,Pre-processing,Segmentation,feature extraction,and classification.The gray level co-occurrence matrix(GLCM)and the local binary pattern features(LBP)are used to identify the disease-affected portion of the plant leaf.According to experimental data,the proposed technology can correctly detect and diagnose plant sickness with a 97.2 percent accuracy. 展开更多
关键词 SVM machine learning GLCM algorithm K-means clustering LBP
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部