期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Securing 3D Point and Mesh Fog Data Using Novel Chaotic Cat Map 被引量:1
1
作者 K.Priyadarsini Arun Kumar Sivaraman +1 位作者 Abdul Quadir Md areej malibari 《Computers, Materials & Continua》 SCIE EI 2023年第3期6703-6717,共15页
With the rapid evolution of Internet technology,fog computing has taken a major role in managing large amounts of data.The major concerns in this domain are security and privacy.Therefore,attaining a reliable level of... With the rapid evolution of Internet technology,fog computing has taken a major role in managing large amounts of data.The major concerns in this domain are security and privacy.Therefore,attaining a reliable level of confidentiality in the fog computing environment is a pivotal task.Among different types of data stored in the fog,the 3D point and mesh fog data are increasingly popular in recent days,due to the growth of 3D modelling and 3D printing technologies.Hence,in this research,we propose a novel scheme for preserving the privacy of 3D point and mesh fog data.Chaotic Cat mapbased data encryption is a recently trending research area due to its unique properties like pseudo-randomness,deterministic nature,sensitivity to initial conditions,ergodicity,etc.To boost encryption efficiency significantly,in this work,we propose a novel Chaotic Cat map.The sequence generated by this map is used to transform the coordinates of the fog data.The improved range of the proposed map is depicted using bifurcation analysis.The quality of the proposed Chaotic Cat map is also analyzed using metrics like Lyapunov exponent and approximate entropy.We also demonstrate the performance of the proposed encryption framework using attacks like brute-force attack and statistical attack.The experimental results clearly depict that the proposed framework produces the best results compared to the previous works in the literature. 展开更多
关键词 Chaotic cat map fog computing ENCRYPTION 3D point fog 3D mesh
在线阅读 下载PDF
Design of ANN Based Non-Linear Network Using Interconnection of Parallel Processor
2
作者 Anjani Kumar Singha Swaleha Zubair +3 位作者 areej malibari Nitish Pathak Shabana Urooj Neelam Sharma 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3491-3508,共18页
Suspicious mass traffic constantly evolves,making network behaviour tracing and structure more complex.Neural networks yield promising results by considering a sufficient number of processing elements with strong inte... Suspicious mass traffic constantly evolves,making network behaviour tracing and structure more complex.Neural networks yield promising results by considering a sufficient number of processing elements with strong interconnections between them.They offer efficient computational Hopfield neural networks models and optimization constraints used by undergoing a good amount of parallelism to yield optimal results.Artificial neural network(ANN)offers optimal solutions in classifying and clustering the various reels of data,and the results obtained purely depend on identifying a problem.In this research work,the design of optimized applications is presented in an organized manner.In addition,this research work examines theoretical approaches to achieving optimized results using ANN.It mainly focuses on designing rules.The optimizing design approach of neural networks analyzes the internal process of the neural networks.Practices in developing the network are based on the interconnections among the hidden nodes and their learning parameters.The methodology is proven best for nonlinear resource allocation problems with a suitable design and complex issues.The ANN proposed here considers more or less 46k nodes hidden inside 49 million connections employed on full-fledged parallel processors.The proposed ANN offered optimal results in real-world application problems,and the results were obtained using MATLAB. 展开更多
关键词 Artificial neural network(ANN) MULTIPROCESSOR hidden node nonlinear optimization parallel processing
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部