Underwater images are often with biased colours and reduced contrast because of the absorption and scattering effects when light propagates in water.Such images with degradation cannot meet the needs of underwater ope...Underwater images are often with biased colours and reduced contrast because of the absorption and scattering effects when light propagates in water.Such images with degradation cannot meet the needs of underwater operations.The main problem in classic underwater image restoration or enhancement methods is that they consume long calcu-lation time,and often,the colour or contrast of the result images is still unsatisfied.Instead of using the complicated physical model of underwater imaging degradation,we propose a new method to deal with underwater images by imitating the colour constancy mechanism of human vision using double-opponency.Firstly,the original image is converted to the LMS space.Then the signals are linearly combined,and Gaussian convolutions are per-formed to imitate the function of receptive fields(RFs).Next,two RFs with different sizes work together to constitute the double-opponency response.Finally,the underwater light is estimated to correct the colours in the image.Further contrast stretching on the luminance is optional.Experiments show that the proposed method can obtain clarified underwater images with higher quality than before,and it spends significantly less time cost compared to other previously published typical methods.展开更多
The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the Internet.Recently,smart healthcare has emerged as a significant application of ...The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the Internet.Recently,smart healthcare has emerged as a significant application of the IoMT,particularly in the context of knowledge‐based learning systems.Smart healthcare systems leverage knowledge‐based learning to become more context‐aware,adaptable,and auditable while maintain-ing the ability to learn from historical data.In smart healthcare systems,devices capture images,such as X‐rays,Magnetic Resonance Imaging.The security and integrity of these images are crucial for the databases used in knowledge‐based learning systems to foster structured decision‐making and enhance the learning abilities of AI.Moreover,in knowledge‐driven systems,the storage and transmission of HD medical images exert a burden on the limited bandwidth of the communication channel,leading to data trans-mission delays.To address the security and latency concerns,this paper presents a lightweight medical image encryption scheme utilising bit‐plane decomposition and chaos theory.The results of the experiment yield entropy,energy,and correlation values of 7.999,0.0156,and 0.0001,respectively.This validates the effectiveness of the encryption system proposed in this paper,which offers high‐quality encryption,a large key space,key sensitivity,and resistance to statistical attacks.展开更多
The Internet of things(IoT)is an emerging paradigm that integrates devices and services to collect real-time data from surroundings and process the information at a very high speed to make a decision.Despite several a...The Internet of things(IoT)is an emerging paradigm that integrates devices and services to collect real-time data from surroundings and process the information at a very high speed to make a decision.Despite several advantages,the resource-constrained and heterogeneous nature of IoT networks makes them a favorite target for cybercriminals.A single successful attempt of network intrusion can compromise the complete IoT network which can lead to unauthorized access to the valuable information of consumers and industries.To overcome the security challenges of IoT networks,this article proposes a lightweight deep autoencoder(DAE)based cyberattack detection framework.The proposed approach learns the normal and anomalous data patterns to identify the various types of network intrusions.The most significant feature of the proposed technique is its lower complexity which is attained by reducing the number of operations.To optimally train the proposed DAE,a range of hyperparameters was determined through extensive experiments that ensure higher attack detection accuracy.The efficacy of the suggested framework is evaluated via two standard and open-source datasets.The proposed DAE achieved the accuracies of 98.86%,and 98.26%for NSL-KDD,99.32%,and 98.79%for the UNSW-NB15 dataset in binary class and multi-class scenarios.The performance of the suggested attack detection framework is also compared with several state-of-the-art intrusion detection schemes.Experimental outcomes proved the promising performance of the proposed scheme for cyberattack detection in IoT networks.展开更多
Renewable energy has become a solution to the world’s energy concerns in recent years.Photovoltaic(PV)technology is the fastest technique to convert solar radiation into electricity.Solar-powered buses,metros,and car...Renewable energy has become a solution to the world’s energy concerns in recent years.Photovoltaic(PV)technology is the fastest technique to convert solar radiation into electricity.Solar-powered buses,metros,and cars use PV technology.Such technologies are always evolving.Included in the parameters that need to be analysed and examined include PV capabilities,vehicle power requirements,utility patterns,acceleration and deceleration rates,and storage module type and capacity,among others.PVPG is intermit-tent and weather-dependent.Accurate forecasting and modelling of PV sys-tem output power are key to managing storage,delivery,and smart grids.With unparalleled data granularity,a data-driven system could better anticipate solar generation.Deep learning(DL)models have gained popularity due to their capacity to handle complex datasets and increase computing power.This article introduces the Galactic Swarm Optimization with Deep Belief Network(GSODBN-PPGF)model.The GSODBN-PPGF model predicts PV power production.The GSODBN-PPGF model normalises data using data scaling.DBN is used to forecast PV power output.The GSO algorithm boosts the DBN model’s predicted output.GSODBN-PPGF projected 0.002 after 40 h but observed 0.063.The GSODBN-PPGF model validation is compared to existing approaches.Simulations showed that the GSODBN-PPGF model outperformed recent techniques.It shows that the proposed model is better at forecasting than other models and can be used to predict the PV power output for the next day.展开更多
Accurate precipitation nowcasting can provide great convenience to the public so they can conduct corresponding arrangements in advance to deal with the possible impact of upcoming heavy rain.Recent relevant research ...Accurate precipitation nowcasting can provide great convenience to the public so they can conduct corresponding arrangements in advance to deal with the possible impact of upcoming heavy rain.Recent relevant research activities have shown their concerns on various deep learning models for radar echo extrapolation,where radar echo maps were used to predict their consequent moment,so as to recognize potential severe convective weather events.However,these approaches suffer from an inaccurate prediction of echo dynamics and unreliable depiction of echo aggregation or dissipation,due to the size limitation of convolution filter,lack of global feature,and less attention to features from previous states.To address the problems,this paper proposes a CEMA-LSTM recurrent unit,which is embedded with a Contextual Feature Correlation Enhancement Block(CEB)and a Multi-Attention Mechanism Block(MAB).The CEB enhances contextual feature correlation and supports its model to memorize significant features for near-future prediction;the MAB uses a position and channel attention mechanism to capture global features of radar echoes.Two practical radar echo datasets were used involving the FREM and CIKM 2017 datasets.Both quantification and visualization of comparative experimental results have demonstrated outperformance of the proposed CEMA-LSTMover recentmodels,e.g.,PhyDNet,MIM and PredRNN++,etc.In particular,compared with the second-rankedmodel,its average POD,FAR and CSI have been improved by 3.87%,1.65%and 1.79%,respectively on the FREM,and by 1.42%,5.60%and 3.16%,respectively on the CIKM 2017.展开更多
Rapid technological advancement has enabled modern healthcare systems to provide more sophisticated and real-time services on the Internet of Medical Things(IoMT).The existing cloud-based,centralized IoMT architecture...Rapid technological advancement has enabled modern healthcare systems to provide more sophisticated and real-time services on the Internet of Medical Things(IoMT).The existing cloud-based,centralized IoMT architectures are vulnerable to multiple security and privacy problems.The blockchain-enabled IoMT is an emerging paradigm that can ensure the security and trustworthiness of medical data sharing in the IoMT networks.This article presents a private and easily expandable blockchain-based framework for the IoMT.The proposed framework contains several participants,including private blockchain,hospitalmanagement systems,cloud service providers,doctors,and patients.Data security is ensured by incorporating an attributebased encryption scheme.Furthermore,an IoT-friendly consensus algorithm is deployed to ensure fast block validation and high scalability in the IoMT network.The proposed framework can perform multiple healthcare-related services in a secure and trustworthy manner.The performance of blockchain read/write operations is evaluated in terms of transaction throughput and latency.Experimental outcomes indicate that the proposed scheme achieved an average throughput of 857 TPS and 151 TPS for read and write operations.The average latency is 61 ms and 16 ms for read and write operations,respectively.展开更多
目的了解不同弱势群体同伴支持的知识和证据现状,确定同伴支持的优势、劣势、机会和威胁。方法按照Arksey和O?蒺Malley提出的范围综述方法框架,在PubMed,APA PsychInfo,Education Resources Information Center等中检索文献。根据Rodger...目的了解不同弱势群体同伴支持的知识和证据现状,确定同伴支持的优势、劣势、机会和威胁。方法按照Arksey和O?蒺Malley提出的范围综述方法框架,在PubMed,APA PsychInfo,Education Resources Information Center等中检索文献。根据Rodgers的概念分析法和SWOT分析法,采用主题综合法报告数据。结果共纳入45项研究,介绍了针对年轻移民和无人监护的未成年人、自闭症患者、有(精神)健康问题的人等群体的各种同伴支持活动。同伴支持的优势在于其对弱势群体生活质量的积极影响;劣势在于,同伴过于投入或关注个人利益,以及他们缺乏专业技能和知识;机会在于相互学习、预期的长期效果及促进社会包容的潜力;威胁在于,文化、语言障碍、退出率、确保可持续性以及同伴缺乏时间和承诺。结论尽管同伴互助对各类弱势群体有较好效果,但要提供和推广同伴支持,还需要考虑其弱点和威胁。展开更多
Chaos-based cryptosystems are considered a secure mode of communication due to their reliability.Chaotic maps are associated with the other domains to construct robust encryption algorithms.There exist numerous encryp...Chaos-based cryptosystems are considered a secure mode of communication due to their reliability.Chaotic maps are associated with the other domains to construct robust encryption algorithms.There exist numerous encryption schemes in the literature based on chaotic maps.This work aims to propose an attack on a recently proposed hyper-chaotic map-based cryptosystem.The core notion of the original algorithm was based on permutation and diffusion.A bitlevel permutation approach was used to do the permutation row-and column-wise.The diffusion was executed in the forward and backward directions.The statistical strength of the cryptosystem has been demonstrated by extensive testing conducted by the author of the cryptosystem.This cryptanalysis article investigates the robustness of this cryptosystem against a chosen-plaintext attack.The secret keys of the cryptosystem were retrieved by the proposed attack with 258 chosen-plain images.The results in this manuscript suggest that,in addition to standard statistical evaluations,thorough cryptanalysis of each newly suggested cryptosystem is necessary before it can be used in practical application.Moreover,the data retrieved is also passed through some statistical analysis to compare the quality of the original and retrieved data.The results of the performance analysis indicate the exact recovery of the original data.To make the cryptosystem useful for applications requiring secure data exchange,a few further improvement recommendations are also suggested.展开更多
In project management,effective cost estimation is one of the most cru-cial activities to efficiently manage resources by predicting the required cost to fulfill a given task.However,finding the best estimation results i...In project management,effective cost estimation is one of the most cru-cial activities to efficiently manage resources by predicting the required cost to fulfill a given task.However,finding the best estimation results in software devel-opment is challenging.Thus,accurate estimation of software development efforts is always a concern for many companies.In this paper,we proposed a novel soft-ware development effort estimation model based both on constructive cost model II(COCOMO II)and the artificial neural network(ANN).An artificial neural net-work enhances the COCOMO model,and the value of the baseline effort constant A is calibrated to use it in the proposed model equation.Three state-of-the-art publicly available datasets are used for experiments.The backpropagation feed-forward procedure used a training set by iteratively processing and training a neural network.The proposed model is tested on the test set.The estimated effort is compared with the actual effort value.Experimental results show that the effort estimated by the proposed model is very close to the real effort,thus enhanced the reliability and improving the software effort estimation accuracy.展开更多
Image encryption has attracted much interest as a robust security solution for preventing unauthorized access to critical image data.Medical picture encryption is a crucial step in many cloud-based and healthcare appl...Image encryption has attracted much interest as a robust security solution for preventing unauthorized access to critical image data.Medical picture encryption is a crucial step in many cloud-based and healthcare applications.In this study,a strong cryptosystem based on a 2D chaotic map and Jigsaw transformation is presented for the encryption of medical photos in private Internet of Medical Things(IoMT)and cloud storage.A disorganized three-dimensional map is the foundation of the proposed cipher.The dispersion of pixel values and the permutation of their places in this map are accomplished using a nonlinear encoding process.The suggested cryptosystem enhances the security of the delivered medical images by performing many operations.To validate the efficiency of the recommended cryptosystem,various medical image kinds are used,each with its unique characteristics.Several measures are used to evaluate the proposed cryptosystem,which all support its robust security.The simulation results confirm the supplied cryptosystem’s secrecy.Furthermore,it provides strong robustness and suggested protection standards for cloud service applications,healthcare,and IoMT.It is seen that the proposed 3D chaotic cryptosystem obtains an average entropy of 7.9998,which is near its most excellent value of 8,and a typical NPCR value of 99.62%,which is also near its extreme value of 99.60%.Moreover,the recommended cryptosystem outperforms conventional security systems across the test assessment criteria.展开更多
TheCOVID-19 outbreak began in December 2019 andwas declared a global health emergency by the World Health Organization.The four most dominating variants are Beta,Gamma,Delta,and Omicron.After the administration of vac...TheCOVID-19 outbreak began in December 2019 andwas declared a global health emergency by the World Health Organization.The four most dominating variants are Beta,Gamma,Delta,and Omicron.After the administration of vaccine doses,an eminent decline in new cases has been observed.The COVID-19 vaccine induces neutralizing antibodies and T-cells in our bodies.However,strong variants likeDelta and Omicron tend to escape these neutralizing antibodies elicited by COVID-19 vaccination.Therefore,it is indispensable to study,analyze and most importantly,predict the response of SARS-CoV-2-derived t-cell epitopes against Covid variants in vaccinated and unvaccinated persons.In this regard,machine learning can be effectively utilized for predicting the response of COVID-derived t-cell epitopes.In this study,prediction of T-cells Epitopes’response was conducted for vaccinated and unvaccinated people for Beta,Gamma,Delta,and Omicron variants.The dataset was divided into two classes,i.e.,vaccinated and unvaccinated,and the predicted response of T-cell Epitopes was divided into three categories,i.e.,Strong,Impaired,and Over-activated.For the aforementioned prediction purposes,a self-proposed Bayesian neural network has been designed by combining variational inference and flow normalization optimizers.Furthermore,the Hidden Markov Model has also been trained on the same dataset to compare the results of the self-proposed Bayesian neural network with this state-of-the-art statistical approach.Extensive experimentation and results demonstrate the efficacy of the proposed network in terms of accurate prediction and reduced error.展开更多
In 2020,COVID-19 started spreading throughout the world.This deadly infection was identified as a virus that may affect the lungs and,in severe cases,could be the cause of death.The polymerase chain reaction(PCR)test ...In 2020,COVID-19 started spreading throughout the world.This deadly infection was identified as a virus that may affect the lungs and,in severe cases,could be the cause of death.The polymerase chain reaction(PCR)test is commonly used to detect this virus through the nasal passage or throat.However,the PCR test exposes health workers to this deadly virus.To limit human exposure while detecting COVID-19,image processing techniques using deep learning have been successfully applied.In this paper,a strategy based on deep learning is employed to classify the COVID-19 virus.To extract features,two deep learning models have been used,the DenseNet201 and the SqueezeNet.Transfer learning is used in feature extraction,and models are fine-tuned.A publicly available computerized tomography(CT)scan dataset has been used in this study.The extracted features from the deep learning models are optimized using the Ant Colony Optimization algorithm.The proposed technique is validated through multiple evaluation parameters.Several classifiers have been employed to classify the optimized features.The cubic support vector machine(Cubic SVM)classifier shows superiority over other commonly used classifiers and attained an accuracy of 98.72%.The proposed technique achieves state-of-the-art accuracy,a sensitivity of 98.80%,and a specificity of 96.64%.展开更多
Energy sustainability is a hot topic in both scientific and political cir-cles.To date,two alternative approaches to this issue are being taken.Some peo-ple believe that increasing power consumption is necessary for co...Energy sustainability is a hot topic in both scientific and political cir-cles.To date,two alternative approaches to this issue are being taken.Some peo-ple believe that increasing power consumption is necessary for countries’economic and social progress,while others are more concerned with maintaining carbon consumption under set limitations.To establish a secure,sustainable,and economical energy system while mitigating the consequences of climate change,most governments are currently pushing renewable growth policies.Energy mar-kets are meant to provide consumers with dependable electricity at the lowest pos-sible cost.A profit-maximization optimal decision model is created in the electric power market with the combined wind,solar units,loads,and energy storage sys-tems,based on the bidding mechanism in the electricity market and operational principles.This model utterly considers the technological limits of new energy units and storages,as well as the involvement of new energy and electric vehicles in market bidding through power generation strategy and the output arrangement of the virtual power plant’s coordinated operation.The accuracy and validity of the optimal decision-making model of combined wind,solar units,loads,and energy storage systems are validated using numerical examples.Under multi-operating scenarios,the effects of renewable energy output changes on joint sys-tem bidding techniques are compared.展开更多
Securing digital image data is a key concern in today’s information-driven society.Effective encryption techniques are required to protect sensitive image data,with the Substitution-box(S-box)often playing a pivotal ...Securing digital image data is a key concern in today’s information-driven society.Effective encryption techniques are required to protect sensitive image data,with the Substitution-box(S-box)often playing a pivotal role in many symmetric encryption systems.This study introduces an innovative approach to creating S-boxes for encryption algorithms.The proposed S-boxes are tested for validity and non-linearity by incorporating them into an image encryption scheme.The nonlinearity measure of the proposed S-boxes is 112.These qualities significantly enhance its resistance to common cryptographic attacks,ensuring high image data security.Furthermore,to assess the robustness of the S-boxes,an encryption system has also been proposed and the proposed S-boxes have been integrated into the designed encryption system.To validate the effectiveness of the proposed encryption system,a comprehensive security analysis including brute force attack and histogram analysis has been performed.In addition,to determine the level of security during the transmission and storage of digital content,the encryption system’s Number of Pixel Change Rate(NPCR),and Unified Averaged Changed Intensity(UACI)are calculated.The results indicate a 99.71%NPCR and 33.51%UACI.These results demonstrate that the proposed S-boxes offer a significant level of security for digital content throughout its transmission and storage.展开更多
The advancements in sensing technologies,information processing,and communication schemes have revolutionized the healthcare sector.Electronic Healthcare Records(EHR)facilitate the patients,doctors,hospitals,and other...The advancements in sensing technologies,information processing,and communication schemes have revolutionized the healthcare sector.Electronic Healthcare Records(EHR)facilitate the patients,doctors,hospitals,and other stakeholders to maintain valuable data and medical records.The traditional EHRs are based on cloud-based architectures and are susceptible to multiple cyberattacks.A single attempt of a successful Denial of Service(DoS)attack can compromise the complete healthcare system.This article introduces a secure and immutable blockchain-based framework for the Internet of Medical Things(IoMT)to address the stated challenges.The proposed architecture is on the idea of a lightweight private blockchain-based network that facilitates the users and hospitals to perform multiple healthcare-related operations in a secure and trustworthy manner.The efficacy of the proposed framework is evaluated in the context of service execution time and throughput.The experimental outcomes indicate that the proposed design attained lower service execution time and higher throughput under different control parameters.展开更多
Breast cancer is one of the leading cancers among women.It has the second-highest mortality rate in women after lung cancer.Timely detection,especially in the early stages,can help increase survival rates.However,manu...Breast cancer is one of the leading cancers among women.It has the second-highest mortality rate in women after lung cancer.Timely detection,especially in the early stages,can help increase survival rates.However,manual diagnosis of breast cancer is a tedious and time-consuming process,and the accuracy of detection is reliant on the quality of the images and the radiologist’s experience.However,computer-aided medical diagnosis has recently shown promising results,leading to the need to develop an efficient system that can aid radiologists in diagnosing breast cancer in its early stages.The research presented in this paper is focused on the multi-class classification of breast cancer.The deep transfer learning approach has been utilized to train the deep learning models,and a pre-processing technique has been used to improve the quality of the ultrasound dataset.The proposed technique utilizes two deep learning models,Mobile-NetV2 and DenseNet201,for the composition of the deep ensemble model.Deep learning models are fine-tuned along with hyperparameter tuning to achieve better results.Subsequently,entropy-based feature selection is used.Breast cancer identification using the proposed classification approach was found to attain an accuracy of 97.04%,while the sensitivity and F1 score were 96.87%and 96.76%,respectively.The performance of the proposed model is very effective and outperforms other state-of-the-art techniques presented in the literature.展开更多
Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this network.Additionally,given the limitations of computers,it becomes evenmore important to empl...Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this network.Additionally,given the limitations of computers,it becomes evenmore important to employ efficient and fast image encryption techniques.While 1D chaotic maps offer a practical approach to real-time image encryption,their limited flexibility and increased vulnerability restrict their practical application.In this research,we have utilized a 3DHindmarsh-Rosemodel to construct a secure cryptosystem.The randomness of the chaotic map is assessed through standard analysis.The proposed system enhances security by incorporating an increased number of system parameters and a wide range of chaotic parameters,as well as ensuring a uniformdistribution of chaotic signals across the entire value space.Additionally,a fast image encryption technique utilizing the new chaotic system is proposed.The novelty of the approach is confirmed through time complexity analysis.To further strengthen the resistance against cryptanalysis attacks and differential attacks,the SHA-256 algorithm is employed for secure key generation.Experimental results through a number of parameters demonstrate the strong cryptographic performance of the proposed image encryption approach,highlighting its exceptional suitability for secure communication.Moreover,the security of the proposed scheme has been compared with stateof-the-art image encryption schemes,and all comparison metrics indicate the superior performance of the proposed scheme.展开更多
Whilst industrial robots have been widely used in many industrial sectors, they are predominantly used in a structured factory environment. In recent years, off-site robotics have been investigated extensively and the...Whilst industrial robots have been widely used in many industrial sectors, they are predominantly used in a structured factory environment. In recent years, off-site robotics have been investigated extensively and there are some promising candidates emerging. One such category of robots is exoskeleton robots and this paper provides an in-depth assessment of their suitability in assisting human operators in undertaking manual operations typically found in the construction industry. This work aims to objectively assess the advantages and disadvantages of these two suits and provide recommendations for further improvements of similar system designs. The paper focuses on the passive exoskeleton robotic suits which are commercially available. Three types of activities are designed and a mechatronic methodology has been designed and implemented to capture visual data in order to assess these systems in comparison with normal human operations. The study suggests that these passive suits do reduce the effort required by human operators to undertake the same construction tasks as evidenced by the results from one focused study, though a number of improvements could be made to improve their performance for wider adoption.展开更多
Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making headlines. Many different detection systems have been proposed as solution...Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making headlines. Many different detection systems have been proposed as solutions to the ever-changing dynamic landscape of ransomware detection. In the majority of cases, these described systems propose a method based on the result of a single test performed on either the executable code, the process under investigation, its behaviour, or its output. In a small subset of ransomware detection systems, the concept of a scorecard is employed where multiple tests are performed on various aspects of a process under investigation and their results are then analysed using machine learning. The purpose of this paper is to propose a new majority voting approach to ransomware detection by developing a method that uses a cumulative score derived from discrete tests based on calculations using algorithmic rather than heuristic techniques. The paper describes 23 candidate tests, as well as 9 Windows API tests which are validated to determine both their accuracy and viability for use within a ransomware detection system. Using a cumulative score calculation approach to ransomware detection has several benefits, such as the immunity to the occasional inaccuracy of individual tests when making its final classification. The system can also leverage multiple tests that can be both comprehensive and complimentary in an attempt to achieve a broader, deeper, and more robust analysis of the program under investigation. Additionally, the use of multiple collaborative tests also significantly hinders ransomware from masking or modifying its behaviour in an attempt to bypass detection. The results achieved by this research demonstrate that many of the proposed tests achieved a high degree of accuracy in differentiating between benign and malicious targets and suggestions are offered as to how these tests, and combinations of tests, could be adapted to further improve the detection accuracy.展开更多
文摘Underwater images are often with biased colours and reduced contrast because of the absorption and scattering effects when light propagates in water.Such images with degradation cannot meet the needs of underwater operations.The main problem in classic underwater image restoration or enhancement methods is that they consume long calcu-lation time,and often,the colour or contrast of the result images is still unsatisfied.Instead of using the complicated physical model of underwater imaging degradation,we propose a new method to deal with underwater images by imitating the colour constancy mechanism of human vision using double-opponency.Firstly,the original image is converted to the LMS space.Then the signals are linearly combined,and Gaussian convolutions are per-formed to imitate the function of receptive fields(RFs).Next,two RFs with different sizes work together to constitute the double-opponency response.Finally,the underwater light is estimated to correct the colours in the image.Further contrast stretching on the luminance is optional.Experiments show that the proposed method can obtain clarified underwater images with higher quality than before,and it spends significantly less time cost compared to other previously published typical methods.
文摘The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the Internet.Recently,smart healthcare has emerged as a significant application of the IoMT,particularly in the context of knowledge‐based learning systems.Smart healthcare systems leverage knowledge‐based learning to become more context‐aware,adaptable,and auditable while maintain-ing the ability to learn from historical data.In smart healthcare systems,devices capture images,such as X‐rays,Magnetic Resonance Imaging.The security and integrity of these images are crucial for the databases used in knowledge‐based learning systems to foster structured decision‐making and enhance the learning abilities of AI.Moreover,in knowledge‐driven systems,the storage and transmission of HD medical images exert a burden on the limited bandwidth of the communication channel,leading to data trans-mission delays.To address the security and latency concerns,this paper presents a lightweight medical image encryption scheme utilising bit‐plane decomposition and chaos theory.The results of the experiment yield entropy,energy,and correlation values of 7.999,0.0156,and 0.0001,respectively.This validates the effectiveness of the encryption system proposed in this paper,which offers high‐quality encryption,a large key space,key sensitivity,and resistance to statistical attacks.
基金The Deanship of Scientific Research(DSR)at King Abdulaziz University(KAU),Jeddah,Saudi Arabia has funded this project,under Grant No.(IFPDP-279-22).
文摘The Internet of things(IoT)is an emerging paradigm that integrates devices and services to collect real-time data from surroundings and process the information at a very high speed to make a decision.Despite several advantages,the resource-constrained and heterogeneous nature of IoT networks makes them a favorite target for cybercriminals.A single successful attempt of network intrusion can compromise the complete IoT network which can lead to unauthorized access to the valuable information of consumers and industries.To overcome the security challenges of IoT networks,this article proposes a lightweight deep autoencoder(DAE)based cyberattack detection framework.The proposed approach learns the normal and anomalous data patterns to identify the various types of network intrusions.The most significant feature of the proposed technique is its lower complexity which is attained by reducing the number of operations.To optimally train the proposed DAE,a range of hyperparameters was determined through extensive experiments that ensure higher attack detection accuracy.The efficacy of the suggested framework is evaluated via two standard and open-source datasets.The proposed DAE achieved the accuracies of 98.86%,and 98.26%for NSL-KDD,99.32%,and 98.79%for the UNSW-NB15 dataset in binary class and multi-class scenarios.The performance of the suggested attack detection framework is also compared with several state-of-the-art intrusion detection schemes.Experimental outcomes proved the promising performance of the proposed scheme for cyberattack detection in IoT networks.
基金funded by the Deanship of Scientific Research,Princess Nourah bint Abdulrahman University,through the Program of Research Project Funding after publication,Grand No.PRFA-P-42-16.
文摘Renewable energy has become a solution to the world’s energy concerns in recent years.Photovoltaic(PV)technology is the fastest technique to convert solar radiation into electricity.Solar-powered buses,metros,and cars use PV technology.Such technologies are always evolving.Included in the parameters that need to be analysed and examined include PV capabilities,vehicle power requirements,utility patterns,acceleration and deceleration rates,and storage module type and capacity,among others.PVPG is intermit-tent and weather-dependent.Accurate forecasting and modelling of PV sys-tem output power are key to managing storage,delivery,and smart grids.With unparalleled data granularity,a data-driven system could better anticipate solar generation.Deep learning(DL)models have gained popularity due to their capacity to handle complex datasets and increase computing power.This article introduces the Galactic Swarm Optimization with Deep Belief Network(GSODBN-PPGF)model.The GSODBN-PPGF model predicts PV power production.The GSODBN-PPGF model normalises data using data scaling.DBN is used to forecast PV power output.The GSO algorithm boosts the DBN model’s predicted output.GSODBN-PPGF projected 0.002 after 40 h but observed 0.063.The GSODBN-PPGF model validation is compared to existing approaches.Simulations showed that the GSODBN-PPGF model outperformed recent techniques.It shows that the proposed model is better at forecasting than other models and can be used to predict the PV power output for the next day.
基金funding from the Key Laboratory Foundation of National Defence Technology under Grant 61424010208National Natural Science Foundation of China(Nos.62002276,41911530242 and 41975142)+3 种基金5150 Spring Specialists(05492018012 and 05762018039)Major Program of the National Social Science Fund of China(Grant No.17ZDA092)333 High-LevelTalent Cultivation Project of Jiangsu Province(BRA2018332)Royal Society of Edinburgh,UK andChina Natural Science Foundation Council(RSE Reference:62967)_Liu)_2018)_2)under their Joint International Projects Funding Scheme and Basic Research Programs(Natural Science Foundation)of Jiangsu Province(BK20191398 and BK20180794).
文摘Accurate precipitation nowcasting can provide great convenience to the public so they can conduct corresponding arrangements in advance to deal with the possible impact of upcoming heavy rain.Recent relevant research activities have shown their concerns on various deep learning models for radar echo extrapolation,where radar echo maps were used to predict their consequent moment,so as to recognize potential severe convective weather events.However,these approaches suffer from an inaccurate prediction of echo dynamics and unreliable depiction of echo aggregation or dissipation,due to the size limitation of convolution filter,lack of global feature,and less attention to features from previous states.To address the problems,this paper proposes a CEMA-LSTM recurrent unit,which is embedded with a Contextual Feature Correlation Enhancement Block(CEB)and a Multi-Attention Mechanism Block(MAB).The CEB enhances contextual feature correlation and supports its model to memorize significant features for near-future prediction;the MAB uses a position and channel attention mechanism to capture global features of radar echoes.Two practical radar echo datasets were used involving the FREM and CIKM 2017 datasets.Both quantification and visualization of comparative experimental results have demonstrated outperformance of the proposed CEMA-LSTMover recentmodels,e.g.,PhyDNet,MIM and PredRNN++,etc.In particular,compared with the second-rankedmodel,its average POD,FAR and CSI have been improved by 3.87%,1.65%and 1.79%,respectively on the FREM,and by 1.42%,5.60%and 3.16%,respectively on the CIKM 2017.
基金The Deanship of Scientific Research(DSR)at King Abdulaziz University(KAU),Jeddah,Saudi Arabia has funded this project,under grant no.(RG-91-611-42).
文摘Rapid technological advancement has enabled modern healthcare systems to provide more sophisticated and real-time services on the Internet of Medical Things(IoMT).The existing cloud-based,centralized IoMT architectures are vulnerable to multiple security and privacy problems.The blockchain-enabled IoMT is an emerging paradigm that can ensure the security and trustworthiness of medical data sharing in the IoMT networks.This article presents a private and easily expandable blockchain-based framework for the IoMT.The proposed framework contains several participants,including private blockchain,hospitalmanagement systems,cloud service providers,doctors,and patients.Data security is ensured by incorporating an attributebased encryption scheme.Furthermore,an IoT-friendly consensus algorithm is deployed to ensure fast block validation and high scalability in the IoMT network.The proposed framework can perform multiple healthcare-related services in a secure and trustworthy manner.The performance of blockchain read/write operations is evaluated in terms of transaction throughput and latency.Experimental outcomes indicate that the proposed scheme achieved an average throughput of 857 TPS and 151 TPS for read and write operations.The average latency is 61 ms and 16 ms for read and write operations,respectively.
基金funded by Interreg 2 Seas Mers Zeeen(2S07-006 ENSURE).
文摘目的了解不同弱势群体同伴支持的知识和证据现状,确定同伴支持的优势、劣势、机会和威胁。方法按照Arksey和O?蒺Malley提出的范围综述方法框架,在PubMed,APA PsychInfo,Education Resources Information Center等中检索文献。根据Rodgers的概念分析法和SWOT分析法,采用主题综合法报告数据。结果共纳入45项研究,介绍了针对年轻移民和无人监护的未成年人、自闭症患者、有(精神)健康问题的人等群体的各种同伴支持活动。同伴支持的优势在于其对弱势群体生活质量的积极影响;劣势在于,同伴过于投入或关注个人利益,以及他们缺乏专业技能和知识;机会在于相互学习、预期的长期效果及促进社会包容的潜力;威胁在于,文化、语言障碍、退出率、确保可持续性以及同伴缺乏时间和承诺。结论尽管同伴互助对各类弱势群体有较好效果,但要提供和推广同伴支持,还需要考虑其弱点和威胁。
基金The authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the Research Groups Funding program grant code(NU/RG/SERC/11/4).
文摘Chaos-based cryptosystems are considered a secure mode of communication due to their reliability.Chaotic maps are associated with the other domains to construct robust encryption algorithms.There exist numerous encryption schemes in the literature based on chaotic maps.This work aims to propose an attack on a recently proposed hyper-chaotic map-based cryptosystem.The core notion of the original algorithm was based on permutation and diffusion.A bitlevel permutation approach was used to do the permutation row-and column-wise.The diffusion was executed in the forward and backward directions.The statistical strength of the cryptosystem has been demonstrated by extensive testing conducted by the author of the cryptosystem.This cryptanalysis article investigates the robustness of this cryptosystem against a chosen-plaintext attack.The secret keys of the cryptosystem were retrieved by the proposed attack with 258 chosen-plain images.The results in this manuscript suggest that,in addition to standard statistical evaluations,thorough cryptanalysis of each newly suggested cryptosystem is necessary before it can be used in practical application.Moreover,the data retrieved is also passed through some statistical analysis to compare the quality of the original and retrieved data.The results of the performance analysis indicate the exact recovery of the original data.To make the cryptosystem useful for applications requiring secure data exchange,a few further improvement recommendations are also suggested.
基金This work was supported by the Technology development Program of MSS[No.S3033853].
文摘In project management,effective cost estimation is one of the most cru-cial activities to efficiently manage resources by predicting the required cost to fulfill a given task.However,finding the best estimation results in software devel-opment is challenging.Thus,accurate estimation of software development efforts is always a concern for many companies.In this paper,we proposed a novel soft-ware development effort estimation model based both on constructive cost model II(COCOMO II)and the artificial neural network(ANN).An artificial neural net-work enhances the COCOMO model,and the value of the baseline effort constant A is calibrated to use it in the proposed model equation.Three state-of-the-art publicly available datasets are used for experiments.The backpropagation feed-forward procedure used a training set by iteratively processing and training a neural network.The proposed model is tested on the test set.The estimated effort is compared with the actual effort value.Experimental results show that the effort estimated by the proposed model is very close to the real effort,thus enhanced the reliability and improving the software effort estimation accuracy.
基金The authors are thankful to the Deanship of Scientific Research at Najran University for funding this work under the Research Groups Funding program grant code(NU/RC/SERC/11/5).
文摘Image encryption has attracted much interest as a robust security solution for preventing unauthorized access to critical image data.Medical picture encryption is a crucial step in many cloud-based and healthcare applications.In this study,a strong cryptosystem based on a 2D chaotic map and Jigsaw transformation is presented for the encryption of medical photos in private Internet of Medical Things(IoMT)and cloud storage.A disorganized three-dimensional map is the foundation of the proposed cipher.The dispersion of pixel values and the permutation of their places in this map are accomplished using a nonlinear encoding process.The suggested cryptosystem enhances the security of the delivered medical images by performing many operations.To validate the efficiency of the recommended cryptosystem,various medical image kinds are used,each with its unique characteristics.Several measures are used to evaluate the proposed cryptosystem,which all support its robust security.The simulation results confirm the supplied cryptosystem’s secrecy.Furthermore,it provides strong robustness and suggested protection standards for cloud service applications,healthcare,and IoMT.It is seen that the proposed 3D chaotic cryptosystem obtains an average entropy of 7.9998,which is near its most excellent value of 8,and a typical NPCR value of 99.62%,which is also near its extreme value of 99.60%.Moreover,the recommended cryptosystem outperforms conventional security systems across the test assessment criteria.
基金This paper is funded by the Deanship of Scientific Research at ImamMohammad Ibn Saud Islamic University Research Group No.RG-21-07-05.
文摘TheCOVID-19 outbreak began in December 2019 andwas declared a global health emergency by the World Health Organization.The four most dominating variants are Beta,Gamma,Delta,and Omicron.After the administration of vaccine doses,an eminent decline in new cases has been observed.The COVID-19 vaccine induces neutralizing antibodies and T-cells in our bodies.However,strong variants likeDelta and Omicron tend to escape these neutralizing antibodies elicited by COVID-19 vaccination.Therefore,it is indispensable to study,analyze and most importantly,predict the response of SARS-CoV-2-derived t-cell epitopes against Covid variants in vaccinated and unvaccinated persons.In this regard,machine learning can be effectively utilized for predicting the response of COVID-derived t-cell epitopes.In this study,prediction of T-cells Epitopes’response was conducted for vaccinated and unvaccinated people for Beta,Gamma,Delta,and Omicron variants.The dataset was divided into two classes,i.e.,vaccinated and unvaccinated,and the predicted response of T-cell Epitopes was divided into three categories,i.e.,Strong,Impaired,and Over-activated.For the aforementioned prediction purposes,a self-proposed Bayesian neural network has been designed by combining variational inference and flow normalization optimizers.Furthermore,the Hidden Markov Model has also been trained on the same dataset to compare the results of the self-proposed Bayesian neural network with this state-of-the-art statistical approach.Extensive experimentation and results demonstrate the efficacy of the proposed network in terms of accurate prediction and reduced error.
文摘In 2020,COVID-19 started spreading throughout the world.This deadly infection was identified as a virus that may affect the lungs and,in severe cases,could be the cause of death.The polymerase chain reaction(PCR)test is commonly used to detect this virus through the nasal passage or throat.However,the PCR test exposes health workers to this deadly virus.To limit human exposure while detecting COVID-19,image processing techniques using deep learning have been successfully applied.In this paper,a strategy based on deep learning is employed to classify the COVID-19 virus.To extract features,two deep learning models have been used,the DenseNet201 and the SqueezeNet.Transfer learning is used in feature extraction,and models are fine-tuned.A publicly available computerized tomography(CT)scan dataset has been used in this study.The extracted features from the deep learning models are optimized using the Ant Colony Optimization algorithm.The proposed technique is validated through multiple evaluation parameters.Several classifiers have been employed to classify the optimized features.The cubic support vector machine(Cubic SVM)classifier shows superiority over other commonly used classifiers and attained an accuracy of 98.72%.The proposed technique achieves state-of-the-art accuracy,a sensitivity of 98.80%,and a specificity of 96.64%.
文摘Energy sustainability is a hot topic in both scientific and political cir-cles.To date,two alternative approaches to this issue are being taken.Some peo-ple believe that increasing power consumption is necessary for countries’economic and social progress,while others are more concerned with maintaining carbon consumption under set limitations.To establish a secure,sustainable,and economical energy system while mitigating the consequences of climate change,most governments are currently pushing renewable growth policies.Energy mar-kets are meant to provide consumers with dependable electricity at the lowest pos-sible cost.A profit-maximization optimal decision model is created in the electric power market with the combined wind,solar units,loads,and energy storage sys-tems,based on the bidding mechanism in the electricity market and operational principles.This model utterly considers the technological limits of new energy units and storages,as well as the involvement of new energy and electric vehicles in market bidding through power generation strategy and the output arrangement of the virtual power plant’s coordinated operation.The accuracy and validity of the optimal decision-making model of combined wind,solar units,loads,and energy storage systems are validated using numerical examples.Under multi-operating scenarios,the effects of renewable energy output changes on joint sys-tem bidding techniques are compared.
基金funded by Deanship of Scientific Research at Najran University under the Research Groups Funding Program Grant Code(NU/RG/SERC/12/3)also by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2023R333)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Securing digital image data is a key concern in today’s information-driven society.Effective encryption techniques are required to protect sensitive image data,with the Substitution-box(S-box)often playing a pivotal role in many symmetric encryption systems.This study introduces an innovative approach to creating S-boxes for encryption algorithms.The proposed S-boxes are tested for validity and non-linearity by incorporating them into an image encryption scheme.The nonlinearity measure of the proposed S-boxes is 112.These qualities significantly enhance its resistance to common cryptographic attacks,ensuring high image data security.Furthermore,to assess the robustness of the S-boxes,an encryption system has also been proposed and the proposed S-boxes have been integrated into the designed encryption system.To validate the effectiveness of the proposed encryption system,a comprehensive security analysis including brute force attack and histogram analysis has been performed.In addition,to determine the level of security during the transmission and storage of digital content,the encryption system’s Number of Pixel Change Rate(NPCR),and Unified Averaged Changed Intensity(UACI)are calculated.The results indicate a 99.71%NPCR and 33.51%UACI.These results demonstrate that the proposed S-boxes offer a significant level of security for digital content throughout its transmission and storage.
文摘The advancements in sensing technologies,information processing,and communication schemes have revolutionized the healthcare sector.Electronic Healthcare Records(EHR)facilitate the patients,doctors,hospitals,and other stakeholders to maintain valuable data and medical records.The traditional EHRs are based on cloud-based architectures and are susceptible to multiple cyberattacks.A single attempt of a successful Denial of Service(DoS)attack can compromise the complete healthcare system.This article introduces a secure and immutable blockchain-based framework for the Internet of Medical Things(IoMT)to address the stated challenges.The proposed architecture is on the idea of a lightweight private blockchain-based network that facilitates the users and hospitals to perform multiple healthcare-related operations in a secure and trustworthy manner.The efficacy of the proposed framework is evaluated in the context of service execution time and throughput.The experimental outcomes indicate that the proposed design attained lower service execution time and higher throughput under different control parameters.
基金This research work was funded by Institutional Fund Projects under Grant No.(IFPIP:1614-611-1442)from the Ministry of Education and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
文摘Breast cancer is one of the leading cancers among women.It has the second-highest mortality rate in women after lung cancer.Timely detection,especially in the early stages,can help increase survival rates.However,manual diagnosis of breast cancer is a tedious and time-consuming process,and the accuracy of detection is reliant on the quality of the images and the radiologist’s experience.However,computer-aided medical diagnosis has recently shown promising results,leading to the need to develop an efficient system that can aid radiologists in diagnosing breast cancer in its early stages.The research presented in this paper is focused on the multi-class classification of breast cancer.The deep transfer learning approach has been utilized to train the deep learning models,and a pre-processing technique has been used to improve the quality of the ultrasound dataset.The proposed technique utilizes two deep learning models,Mobile-NetV2 and DenseNet201,for the composition of the deep ensemble model.Deep learning models are fine-tuned along with hyperparameter tuning to achieve better results.Subsequently,entropy-based feature selection is used.Breast cancer identification using the proposed classification approach was found to attain an accuracy of 97.04%,while the sensitivity and F1 score were 96.87%and 96.76%,respectively.The performance of the proposed model is very effective and outperforms other state-of-the-art techniques presented in the literature.
基金the Deanship of Scientific Research at Najran University for funding this work under the Research Groups Funding Program Grant Code(NU/RG/SERC/12/3).
文摘Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this network.Additionally,given the limitations of computers,it becomes evenmore important to employ efficient and fast image encryption techniques.While 1D chaotic maps offer a practical approach to real-time image encryption,their limited flexibility and increased vulnerability restrict their practical application.In this research,we have utilized a 3DHindmarsh-Rosemodel to construct a secure cryptosystem.The randomness of the chaotic map is assessed through standard analysis.The proposed system enhances security by incorporating an increased number of system parameters and a wide range of chaotic parameters,as well as ensuring a uniformdistribution of chaotic signals across the entire value space.Additionally,a fast image encryption technique utilizing the new chaotic system is proposed.The novelty of the approach is confirmed through time complexity analysis.To further strengthen the resistance against cryptanalysis attacks and differential attacks,the SHA-256 algorithm is employed for secure key generation.Experimental results through a number of parameters demonstrate the strong cryptographic performance of the proposed image encryption approach,highlighting its exceptional suitability for secure communication.Moreover,the security of the proposed scheme has been compared with stateof-the-art image encryption schemes,and all comparison metrics indicate the superior performance of the proposed scheme.
文摘Whilst industrial robots have been widely used in many industrial sectors, they are predominantly used in a structured factory environment. In recent years, off-site robotics have been investigated extensively and there are some promising candidates emerging. One such category of robots is exoskeleton robots and this paper provides an in-depth assessment of their suitability in assisting human operators in undertaking manual operations typically found in the construction industry. This work aims to objectively assess the advantages and disadvantages of these two suits and provide recommendations for further improvements of similar system designs. The paper focuses on the passive exoskeleton robotic suits which are commercially available. Three types of activities are designed and a mechatronic methodology has been designed and implemented to capture visual data in order to assess these systems in comparison with normal human operations. The study suggests that these passive suits do reduce the effort required by human operators to undertake the same construction tasks as evidenced by the results from one focused study, though a number of improvements could be made to improve their performance for wider adoption.
文摘Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making headlines. Many different detection systems have been proposed as solutions to the ever-changing dynamic landscape of ransomware detection. In the majority of cases, these described systems propose a method based on the result of a single test performed on either the executable code, the process under investigation, its behaviour, or its output. In a small subset of ransomware detection systems, the concept of a scorecard is employed where multiple tests are performed on various aspects of a process under investigation and their results are then analysed using machine learning. The purpose of this paper is to propose a new majority voting approach to ransomware detection by developing a method that uses a cumulative score derived from discrete tests based on calculations using algorithmic rather than heuristic techniques. The paper describes 23 candidate tests, as well as 9 Windows API tests which are validated to determine both their accuracy and viability for use within a ransomware detection system. Using a cumulative score calculation approach to ransomware detection has several benefits, such as the immunity to the occasional inaccuracy of individual tests when making its final classification. The system can also leverage multiple tests that can be both comprehensive and complimentary in an attempt to achieve a broader, deeper, and more robust analysis of the program under investigation. Additionally, the use of multiple collaborative tests also significantly hinders ransomware from masking or modifying its behaviour in an attempt to bypass detection. The results achieved by this research demonstrate that many of the proposed tests achieved a high degree of accuracy in differentiating between benign and malicious targets and suggestions are offered as to how these tests, and combinations of tests, could be adapted to further improve the detection accuracy.