期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
Improving Archival Records and Service of Traditional Korean Performing Arts in a Semantic Web Environment 被引量:1
1
作者 Ziyoung Park Hosin Lee +1 位作者 Seungchon Kim Sungjae Park 《Journal of Data and Information Science》 CSCD 2020年第1期68-80,共13页
Purpose:This research project aims to organize the archival information of traditional Korean performing arts in a semantic web environment.Key requirements,which the archival records manager should consider for publi... Purpose:This research project aims to organize the archival information of traditional Korean performing arts in a semantic web environment.Key requirements,which the archival records manager should consider for publishing and distribution of gugak performing archival information in a semantic web environment,are presented in the perspective of linked data.Design/methodology/approach:This study analyzes the metadata provided by the National Gugak Center’s Gugak Archive,the search and browse menus of Gugak Archive’s website and K-PAAN,the performing arts portal site.Findings:The importance of consistency,continuity,and systematicity—crucial qualities in traditional record management practices—is undiminished in a semantic web environment.However,a semantic web environment also requires new tools such as web identifiers(URIs),data models(RDF),and link information(interlinking).Research limitations:The scope of this study does not include practical implementation strategies for the archival records management system and website services.The suggestions also do not discuss issues related to copyright or policy coordination between related organizations.Practical implications:The findings of this study can assist records managers in converting a traditional performing arts information archive into a semantic web environment-based online archival service and system.This can also be useful for collaboration with record managers who are unfamiliar with relational or triple database system.Originality/value:This study analyzed the metadata of the Gugak Archive and its online services to present practical requirements for managing and disseminating gugak performing arts information in a semantic web environment.In the application of the semantic web services’principles and methods to an Gugak Archive,this study can contribute to the improvement of information organization and services in the field of Korean traditional music. 展开更多
关键词 Gugak archive Korean traditional music Performing arts archive Linked semantic data K-PAAN
在线阅读 下载PDF
SDN Based DDos Mitigating Approach Using Traffic Entropy for IoT Network 被引量:1
2
作者 Muhammad Ibrahim Muhammad Hanif +3 位作者 Shabir Ahmad Faisal Jamil Tayyaba Sehar YunJung Lee DoHyeun Kim 《Computers, Materials & Continua》 SCIE EI 2022年第3期5651-5665,共15页
The Internet of Things(IoT)has been widely adopted in various domains including smart cities,healthcare,smart factories,etc.In the last few years,the fitness industry has been reshaped by the introduction of smart fit... The Internet of Things(IoT)has been widely adopted in various domains including smart cities,healthcare,smart factories,etc.In the last few years,the fitness industry has been reshaped by the introduction of smart fitness solutions for individuals as well as fitness gyms.The IoT fitness devices collect trainee data that is being used for various decision-making.However,it will face numerous security and privacy issues towards its realization.This work focuses on IoT security,especially DoS/DDoS attacks.In this paper,we have proposed a novel blockchain-enabled protocol(BEP)that uses the notion of a self-exposing node(SEN)approach for securing fitness IoT applications.The blockchain and SDN architectures are employed to enhance IoT security by a highly preventive security monitoring,analysis and response system.The proposed approach helps in detecting the DoS/DDoS attacks on the IoT fitness system and then mitigating the attacks.The BEP is used for handling Blockchain-related activities and SEN could be a sensor or actuator node within the fitness IoT system.SEN provides information about the inbound and outbound traffic to the BEP which is used to analyze the DoS/DDoS attacks on the fitness IoT system.The SENcalculates the inbound and outbound traffic features’entropies and transmits them to the Blockchain in the form of transaction blocks.The BEP picks the whole mined blocks’transactions and transfers them to the SDN controller node.The controller node correlates the entropies data of SENs and decides about the DoS or DDoS attack.So,there are two decision points,one is SEN,and another is the controller.To evaluate the performance of our proposed system,several experiments are performed and results concerning the entropy values and attack detection rate are obtained.The proposed approach has outperformed the other two approaches concerning the attack detection rate by an increase of 11%and 18%against Approach 1 and Approach 2 respectively. 展开更多
关键词 SDN control plane load balancing decision tree CPU utilization
在线阅读 下载PDF
Dragonfly Interaction Algorithm for Optimization of Queuing Delay in Industrial Wireless Networks
3
作者 Sanjay Bhardwaj Da-Hye Kim Dong-Seong Kim 《Journal of Bionic Engineering》 SCIE EI CSCD 2024年第1期447-485,共39页
In industrial wireless networks,data transmitted from source to destination are highly repetitive.This often leads to the queuing of the data,and poor management of the queued data results in excessive delays,increase... In industrial wireless networks,data transmitted from source to destination are highly repetitive.This often leads to the queuing of the data,and poor management of the queued data results in excessive delays,increased energy consumption,and packet loss.Therefore,a nature-inspired-based Dragonfly Interaction Optimization Algorithm(DMOA)is proposed for optimization of the queue delay in industrial wireless networks.The term“interaction”herein used is the characterization of the“flying movement”of the dragonfly towards damselflies(female dragonflies)for mating.As a result,interaction is represented as the flow of transmitted data packets,or traffic,from the source to the base station.This includes each and every feature of dragonfly movement as well as awareness of the rival dragonflies,predators,and damselflies for the desired optimization of the queue delay.These features are juxtaposed as noise and interference,which are further used in the calculation of industrial wireless metrics:latency,error rate(reliability),throughput,energy efficiency,and fairness for the optimization of the queue delay.Statistical analysis,convergence analysis,the Wilcoxon test,the Friedman test,and the classical as well as the 2014 IEEE Congress of Evolutionary Computation(CEC)on the benchmark functions are also used for the evaluation of DMOA in terms of its robustness and efficiency.The results demonstrate the robustness of the proposed algorithm for both classical and benchmarking functions of the IEEE CEC 2014.Furthermore,the accuracy and efficacy of DMOA were demonstrated by means of the convergence rate,Wilcoxon testing,and ANOVA.Moreover,fairness using Jain’s index in queue delay optimization in terms of throughput and latency,along with computational complexity,is also evaluated and compared with other algorithms.Simulation results show that DMOA exceeds other bio-inspired optimization algorithms in terms of fairness in queue delay management and average packet loss.The proposed algorithm is also evaluated for the conflicting objectives at Pareto Front,and its analysis reveals that DMOA finds a compromising solution between the objectives,thereby optimizing queue delay.In addition,DMOA on the Pareto front delivers much greater performance when it comes to optimizing the queuing delay for industry wireless networks. 展开更多
关键词 DRAGONFLY DAMSELFLY INTERACTION Queuing delay OPTIMIZATION Industrial wireless networks
在线阅读 下载PDF
DISTINIT:Data poISoning atTacks dectectIon usiNg optIized jaCcard disTance
4
作者 Maria Sameen Seong Oun Hwang 《Computers, Materials & Continua》 SCIE EI 2022年第12期4559-4576,共18页
Machine Learning(ML)systems often involve a re-training process to make better predictions and classifications.This re-training process creates a loophole and poses a security threat for ML systems.Adversaries leverag... Machine Learning(ML)systems often involve a re-training process to make better predictions and classifications.This re-training process creates a loophole and poses a security threat for ML systems.Adversaries leverage this loophole and design data poisoning attacks against ML systems.Data poisoning attacks are a type of attack in which an adversary manipulates the training dataset to degrade the ML system’s performance.Data poisoning attacks are challenging to detect,and even more difficult to respond to,particularly in the Internet of Things(IoT)environment.To address this problem,we proposed DISTINIT,the first proactive data poisoning attack detection framework using distancemeasures.We found that Jaccard Distance(JD)can be used in the DISTINIT(among other distance measures)and we finally improved the JD to attain an Optimized JD(OJD)with lower time and space complexity.Our security analysis shows that the DISTINIT is secure against data poisoning attacks by considering key features of adversarial attacks.We conclude that the proposed OJD-based DISTINIT is effective and efficient against data poisoning attacks where in-time detection is critical for IoT applications with large volumes of streaming data. 展开更多
关键词 Data poisoning attacks detection framework jaccard distance(JD) optimized jaccard distance(OJD) security analysis
在线阅读 下载PDF
Simply Fine-Tuned Deep Learning-Based Classification for Breast Cancer with Mammograms
5
作者 Vicky Mudeng Jin-woo Jeong Se-woon Choe 《Computers, Materials & Continua》 SCIE EI 2022年第12期4677-4693,共17页
A lump growing in the breast may be referred to as a breast mass related to the tumor.However,not all tumors are cancerous or malignant.Breast masses can cause discomfort and pain,depending on the size and texture of ... A lump growing in the breast may be referred to as a breast mass related to the tumor.However,not all tumors are cancerous or malignant.Breast masses can cause discomfort and pain,depending on the size and texture of the breast.With an appropriate diagnosis,non-cancerous breast masses can be diagnosed earlier to prevent their cultivation from being malignant.With the development of the artificial neural network,the deep discriminative model,such as a convolutional neural network,may evaluate the breast lesion to distinguish benign and malignant cancers frommammogram breast masses images.This work accomplished breastmasses classification relative to benign and malignant cancers using a digital database for screening mammography image datasets.A residual neural network 50(ResNet50)model along with an adaptive gradient algorithm,adaptive moment estimation,and stochastic gradient descent optimizers,as well as data augmentations and fine-tuning methods,were implemented.In addition,a learning rate scheduler and 5-fold cross-validation were applied with 60 training procedures to determine the best models.The results of training accuracy,p-value,test accuracy,area under the curve,sensitivity,precision,F1-score,specificity,and kappa for adaptive gradient algorithm 25%,75%,100%,and stochastic gradient descent 100%fine-tunings indicate that the classifier is feasible for categorizing breast cancer into benign and malignant from the mammographic breast masses images. 展开更多
关键词 Medical image analysis convolutional neural network MAMMOGRAM breast masses breast cancer
暂未订购
Complex Problems Solution as a Service Based on Predictive Optimization and Tasks Orchestration in Smart Cities
6
作者 Shabir Ahmad Jehad Ali +2 位作者 Faisal Jamil Taeg Keun Whangbo DoHyeun Kim 《Computers, Materials & Continua》 SCIE EI 2021年第10期1271-1288,共18页
Smart cities have different contradicting goals having no apparent solution.The selection of the appropriate solution,which is considered the best compromise among the candidates,is known as complex problem-solving.Sm... Smart cities have different contradicting goals having no apparent solution.The selection of the appropriate solution,which is considered the best compromise among the candidates,is known as complex problem-solving.Smart city administrators face different problems of complex nature,such as optimal energy trading in microgrids and optimal comfort index in smart homes,to mention a few.This paper proposes a novel architecture to offer complex problem solutions as a service(CPSaaS)based on predictive model optimization and optimal task orchestration to offer solutions to different problems in a smart city.Predictive model optimization uses a machine learning module and optimization objective to compute the given problem’s solutions.The task orchestration module helps decompose the complex problem in small tasks and deploy them on real-world physical sensors and actuators.The proposed architecture is hierarchical and modular,making it robust against faults and easy to maintain.The proposed architecture’s evaluation results highlight its strengths in fault tolerance,accuracy,and processing speed. 展开更多
关键词 Internet of things complex problem solving task modeling embedded IoT systems predictive optimization artificial cognition task orchestration
在线阅读 下载PDF
Sensors-Based Ambient Assistant Living via E-Monitoring Technology
7
作者 Sadaf Hafeez Yazeed Yasin Ghadi +4 位作者 Mohammed Alarfaj Tamara al Shloul Ahmad Jalal Shaharyar Kama Dong-Seong Kim 《Computers, Materials & Continua》 SCIE EI 2022年第12期4935-4952,共18页
Independent human living systems require smart,intelligent,and sustainable online monitoring so that an individual can be assisted timely.Apart from ambient assisted living,the task of monitoring human activities play... Independent human living systems require smart,intelligent,and sustainable online monitoring so that an individual can be assisted timely.Apart from ambient assisted living,the task of monitoring human activities plays an important role in different fields including virtual reality,surveillance security,and human interaction with robots.Such systems have been developed in the past with the use of various wearable inertial sensors and depth cameras to capture the human actions.In this paper,we propose multiple methods such as random occupancy pattern,spatio temporal cloud,waypoint trajectory,Hilbert transform,Walsh Hadamard transform and bone pair descriptors to extract optimal features corresponding to different human actions.These features sets are then normalized using min-max normalization and optimized using the Fuzzy optimization method.Finally,the Masi entropy classifier is applied for action recognition and classification.Experiments have been performed on three challenging datasets,namely,UTDMHAD,50 Salad,and CMU-MMAC.During experimental evaluation,the proposed novel approach of recognizing human actions has achieved an accuracy rate of 90.1%with UTD-MHAD dataset,90.6%with 50 Salad dataset,and 89.5%with CMU-MMAC dataset.Hence experimental results validated the proposed system. 展开更多
关键词 Classification algorithm human action recognition motion sensors machine learning Masi entropy
在线阅读 下载PDF
QI-BRiCE: Quality Index for Bleeding Regions in Capsule Endoscopy Videos
8
作者 Muhammad Arslan Usman Muhammad Rehan Usman +4 位作者 Gandeva Bayu Satrya Muhammad Ashfaq Khan Christos Politis Nada Philip Soo Young Shin 《Computers, Materials & Continua》 SCIE EI 2021年第5期1697-1712,共16页
With the advent in services such as telemedicine and telesurgery,provision of continuous quality monitoring for these services has become a challenge for the network operators.Quality standards for provision of such s... With the advent in services such as telemedicine and telesurgery,provision of continuous quality monitoring for these services has become a challenge for the network operators.Quality standards for provision of such services are application specic as medical imagery is quite different than general purpose images and videos.This paper presents a novel full reference objective video quality metric that focuses on estimating the quality of wireless capsule endoscopy(WCE)videos containing bleeding regions.Bleeding regions in gastrointestinal tract have been focused in this research,as bleeding is one of the major reasons behind several diseases within the tract.The method jointly estimates the diagnostic as well as perceptual quality of WCE videos,and accurately predicts the quality,which is in high correlation with the subjective differential mean opinion scores(DMOS).The proposed combines motion quality estimates,bleeding regions’quality estimates based on support vector machine(SVM)and perceptual quality estimates using the pristine and impaired WCE videos.Our method Quality Index for Bleeding Regions in Capsule Endoscopy(QI-BRiCE)videos is one of its kind and the results show high correlation in terms of Pearson’s linear correlation coefcient(PLCC)and Spearman’s rank order correlation coefcient(SROCC).An F-test is also provided in the results section to prove the statistical signicance of our proposed method. 展开更多
关键词 Automated bleeding detection high efciency video coding video quality assessment wireless capsule endoscopy
在线阅读 下载PDF
Drone Based Wireless Mesh Network for Disaster/Military Environment
9
作者 Gudi Siva Leela Krishna Chand Manhee Lee Soo Young Shin 《Journal of Computer and Communications》 2018年第4期44-52,共9页
In recent years, researches of disseminating wireless network have been conducted for areas without network infrastructure such as disaster situation or military disputes. However, conventional method was to provide a... In recent years, researches of disseminating wireless network have been conducted for areas without network infrastructure such as disaster situation or military disputes. However, conventional method was to provide a communication infrastructure by floating large aircraft as UAV or hot-air balloon in the high air. Therefore, it was difficult to utilize previous method because it requires a lot of time and cost. But it is possible to save money and time by using a drone which is already used in many areas as a small UAV. In this paper, we design a drone that can provide wireless infrastructure using high speed Wi-Fi. After reaching the target area, the drone can provide Wi-Fi using wireless mesh network and transmit the situation of local area through attached camera. And the transmitted videos can be monitored in the control center or cell phone through application in real time. The proposed scheme provides wireless communication of up to 160 Mbps in a coverage of about 200 m and video transmission with a coverage of about 120 m, respectively. 展开更多
关键词 DRONE Wireless MESH Network (WMN) WI-FI
暂未订购
Human Pose Estimation and Object Interaction for Sports Behaviour 被引量:3
10
作者 Ayesha Arif Yazeed Yasin Ghadi +3 位作者 Mohammed Alarfaj Ahmad Jalal Shaharyar Kamal Dong-Seong Kim 《Computers, Materials & Continua》 SCIE EI 2022年第7期1-18,共18页
In the new era of technology,daily human activities are becoming more challenging in terms of monitoring complex scenes and backgrounds.To understand the scenes and activities from human life logs,human-object interac... In the new era of technology,daily human activities are becoming more challenging in terms of monitoring complex scenes and backgrounds.To understand the scenes and activities from human life logs,human-object interaction(HOI)is important in terms of visual relationship detection and human pose estimation.Activities understanding and interaction recognition between human and object along with the pose estimation and interaction modeling have been explained.Some existing algorithms and feature extraction procedures are complicated including accurate detection of rare human postures,occluded regions,and unsatisfactory detection of objects,especially small-sized objects.The existing HOI detection techniques are instancecentric(object-based)where interaction is predicted between all the pairs.Such estimation depends on appearance features and spatial information.Therefore,we propose a novel approach to demonstrate that the appearance features alone are not sufficient to predict the HOI.Furthermore,we detect the human body parts by using the Gaussian Matric Model(GMM)followed by object detection using YOLO.We predict the interaction points which directly classify the interaction and pair them with densely predicted HOI vectors by using the interaction algorithm.The interactions are linked with the human and object to predict the actions.The experiments have been performed on two benchmark HOI datasets demonstrating the proposed approach. 展开更多
关键词 Human object interaction human pose estimation object detection sports estimation sports prediction
在线阅读 下载PDF
Joint Non-Orthogonal Multiple Access (NOMA) & Walsh-Hadamard Transform: Enhancing the Receiver Performance 被引量:2
11
作者 Muhammad Rehan Usman Arsla Khan +1 位作者 Muhammad Arslan Usman Soo young Shin 《China Communications》 SCIE CSCD 2018年第9期160-177,共18页
Non-orthogonal multiple access(NOMA) is a new access method to achieve high performance gains in terms of capacity and throughput, so it is currently under consideration as one of the candidates for fifth generation(5... Non-orthogonal multiple access(NOMA) is a new access method to achieve high performance gains in terms of capacity and throughput, so it is currently under consideration as one of the candidates for fifth generation(5 G) technologies. NOMA utilizes power domain in order to superimpose signals of multiple users in a single transmitted signal. This creates a lot of interference at the receive side. Although the use of successive interference cancellation(SIC) technique reduces the interference, but to further improve the receiver performance, in this paper, we have proposed a joint Walsh-Hadamard transform(WHT) and NOMA approach for achieving better performance gains than the conventional NOMA. WHT is a well-known code used in communication systems and is used as an orthogonal variable spreading factor(OVSF) in communication systems. Application of WHT to NOMA results in low bit error rate(BER) and high throughput performance for both low and high channel gain users. Further, it also reduces peak to average power ratio(PAPR) of the user signal. The results are discussed in terms of comparison between the conventionalNOMA and the proposed technique, which shows that it offers high performance gains in terms of low BER at different SNR levels, reduced PAPR, high user throughput performance and better spectral efficiency. 展开更多
关键词 Bit error rate (BER) non-orthogonal multiple access (NOMA) orthogonal frequency division multiplexing (OFDM) peak to average power ratio (PAPR) successive interference cancellation (SIC) throughput and Walsh-Hadamard transform (WHT).
在线阅读 下载PDF
Hybrid Renewable Energy Resources Management for Optimal Energy Operation in Nano-Grid 被引量:1
12
作者 Faiza Qayyum Faisal Jamil +1 位作者 Shabir Ahmad Do-Hyeun Kim 《Computers, Materials & Continua》 SCIE EI 2022年第5期2091-2105,共15页
Renewable energy resources are deemed a potential energy production source due to their cost efficiency and harmless reaction to the environment,unlike non-renewable energy resources.However,they often fail to meet en... Renewable energy resources are deemed a potential energy production source due to their cost efficiency and harmless reaction to the environment,unlike non-renewable energy resources.However,they often fail to meet energy requirements in unfavorable weather conditions.The concept of Hybrid renewable energy resources addresses this issue by integrating both renewable and non-renewable energy resources to meet the required energy load.In this paper,an intelligent cost optimization algorithm is proposed to maximize the use of renewable energy resources and minimum utilization of non-renewable energy resources to meet the energy requirement for a nanogrid infrastructure.An actual data set comprising information about the load and demand of utility grids is used to evaluate the performance of the proposed nanogrid energy management system.The objective function is formulated to manage the nanogrid operation and implemented using a variant of Particle Swarm Optimization(PSO)named recurrent PSO(rPSO).Firstly,rPSO algorithm minimizes the installation cost for nanogrid.Thereafter,the proposed NEMS ensures cost efficiency for the post-installation period by providing a daily operational plan and optimizing renewable resources.State-of-the-art optimization models,including Genetic Algorithm(GA),bat and different Mathematical Programming Language(AMPL)solvers,are used to evaluate the model.The study’s outcomes suggest that the proposed work significantly reduces the use of diesel generators and fosters the use of renewable energy resources and beneficiates the eco-friendly environment. 展开更多
关键词 Smart grid nanogrid distributed generation(DG) renewable energy optimization machine learning
在线阅读 下载PDF
Deep Learning Approach for Cosmetic Product Detection and Classification 被引量:1
13
作者 Se-Won Kim Sang-Woong Lee 《Computers, Materials & Continua》 SCIE EI 2021年第10期713-725,共13页
As the amount of online video content is increasing,consumers are becoming increasingly interested in various product names appearing in videos,particularly in cosmetic-product names in videos related to fashion,beaut... As the amount of online video content is increasing,consumers are becoming increasingly interested in various product names appearing in videos,particularly in cosmetic-product names in videos related to fashion,beauty,and style.Thus,the identification of such products by using image recognition technology may aid in the identification of current commercial trends.In this paper,we propose a two-stage deep-learning detection and classification method for cosmetic products.Specifically,variants of the YOLO network are used for detection,where the bounding box for each given input product is predicted and subsequently cropped for classification.We use four state-of-the-art classification networks,namely ResNet,InceptionResNetV2,DenseNet,and EfficientNet,and compare their performance.Furthermore,we employ dilated convolution in these networks to obtain better feature representations and improve performance.Extensive experiments demonstrate that YOLOv3 and its tiny version achieve higher speed and accuracy.Moreover,the dilated networks marginally outperform the base models,or achieve similar performance in the worst case.We conclude that the proposed method can effectively detect and classify cosmetic products. 展开更多
关键词 Cosmetic product detection cosmetic product classification deep learning
在线阅读 下载PDF
An Improved YOLO Detection Approach for Pinpointing Cucumber Diseases and Pests
14
作者 Ji-Yuan Ding Wang-Su Jeon +1 位作者 Sang-Yong Rhee Chang-Man Zou 《Computers, Materials & Continua》 SCIE EI 2024年第12期3989-4014,共26页
In complex agricultural environments,cucumber disease identification is confronted with challenges like symptom diversity,environmental interference,and poor detection accuracy.This paper presents the DM-YOLO model,wh... In complex agricultural environments,cucumber disease identification is confronted with challenges like symptom diversity,environmental interference,and poor detection accuracy.This paper presents the DM-YOLO model,which is an enhanced version of the YOLOv8 framework designed to enhance detection accuracy for cucumber diseases.Traditional detection models have a tough time identifying small-scale and overlapping symptoms,especially when critical features are obscured by lighting variations,occlusion,and background noise.The proposed DM-YOLO model combines three innovative modules to enhance detection performance in a collective way.First,the MultiCat module employs a multi-scale feature processing strategy with adaptive pooling,which decomposes input features into large,medium,and small scales.This approach ensures that high-level features are extracted and fused effectively,effectively improving the detection of smaller and complex patterns that are often missed by traditional methods.Second,the ADC2f module incorporates an attention mechanism and deep separable convolution,which allows the model to focus on the most relevant regions of the input features while reducing computational load.The identification and localization of diseases like downy mildew and powdery mildew can be enhanced by this combination in conditions of lighting changes and occlusion.Finally,the C2fe module introduces a Global Context Block that uses attention mechanisms to emphasize essential regions while suppressing those that are not relevant.This design enables the model to capture more contextual information,which improves detection performance in complex backgrounds and small-object scenarios.A custom cucumber disease dataset and the PlantDoc dataset were used for thorough evaluations.Experimental results showed that DM-YOLO achieved a mean Average Precision(mAP50)improvement of 1.2%p on the custom dataset and 3.2%p on the PlantDoc dataset over the baseline YOLOv8.These results highlight the model’s enhanced ability to detect small-scale and overlapping disease symptoms,demonstrating its effectiveness and robustness in diverse agricultural monitoring environments.Compared to the original algorithm,the improved model shows significant progress and demonstrates strong competitiveness when compared to other advanced object detection models. 展开更多
关键词 ADC2f C2fe cucumber diseases YOLOv8n MultiCat pest detection
在线阅读 下载PDF
An Enhanced Privacy Preserving, Secure and Efficient Authentication Protocol for VANET
15
作者 Safiullah Khan Ali Raza Seong Oun Hwang 《Computers, Materials & Continua》 SCIE EI 2022年第5期3703-3719,共17页
Vehicular ad hoc networks (VANETs) have attracted growing interest in both academia and industry because they can provide a viable solutionthat improves road safety and comfort for travelers on roads. However, wireles... Vehicular ad hoc networks (VANETs) have attracted growing interest in both academia and industry because they can provide a viable solutionthat improves road safety and comfort for travelers on roads. However, wireless communications over open-access environments face many security andprivacy issues that may affect deployment of large-scale VANETs. Researchershave proposed different protocols to address security and privacy issues in aVANET, and in this study we cryptanalyze some of the privacy preservingprotocols to show that all existing protocols are vulnerable to the Sybilattack. The Sybil attack can be used by malicious actors to create fakeidentities that impair existing protocols, which allows them to imitate trafficcongestion or at worse cause an accident that may result in the loss of humanlife. This vulnerability exists because those protocols store vehicle identitiesin an encrypted form, and it is not possible to search over the encryptedidentities to find fake vehicles. This attack is serious in nature and veryprevalent for privacy-preserving protocols. To cope with this kind of attack,we propose a novel and practical protocol that uses Public key encryptionwith an equality test (PKEET) to search over the encrypted identities withoutleaking any information, and eventually eliminate the Sybil attack. Theproposed approach improves security and at the same time maintains privacyin VANET. Our performance analysis indicates that the proposed protocoloutperforms state-of-the-art protocols: The proposed beacon generation timeis constant compared to a linear increase in existing protocols, with beaconverification shown to be faster by 7.908%. Our communicational analysisshows that the proposed protocol with a beacon size of 322 bytes has the leastcommunicational overhead compared to other state-of-the-art protocols. 展开更多
关键词 VANET authentication protocol CRYPTANALYSIS privacy preserving intelligent systems
在线阅读 下载PDF
FedViTBloc:Secure and privacy-enhanced medical image analysis with federated vision transformer and blockchain
16
作者 Gabriel Chukwunonso Amaizu Akshita Maradapu Vera Venkata Sai +3 位作者 Sanjay Bhardwaj Dong-Seong Kim Madhuri Siddula Yingshu Li 《High-Confidence Computing》 2025年第3期123-134,共12页
The increasing prevalence of cancer necessitates advanced methodologies for early detection and diagnosis.Early intervention is crucial for improving patient outcomes and reducing the overall burden on healthcare syst... The increasing prevalence of cancer necessitates advanced methodologies for early detection and diagnosis.Early intervention is crucial for improving patient outcomes and reducing the overall burden on healthcare systems.Traditional centralized methods of medical image analysis pose significant risks to patient privacy and data security,as they require the aggregation of sensitive information in a single location.Furthermore,these methods often suffer from limitations related to data diversity and scalability,hindering the development of universally robust diagnostic models.Recent advancements in machine learning,particularly deep learning,have shown promise in enhancing medical image analysis.However,the need to access large and diverse datasets for training these models introduces challenges in maintaining patient confidentiality and adhering to strict data protection regulations.This paper introduces FedViTBloc,a secure and privacy-enhanced framework for medical image analysis utilizing Federated Learning(FL)combined with Vision Transformers(ViT)and blockchain technology.The proposed system ensures patient data privacy and security through fully homomorphic encryption and differential privacy techniques.By employing a decentralized FL approach,multiple medical institutions can collaboratively train a robust deep-learning model without sharing raw data.Blockchain integration further enhances the security and trustworthiness of the FL process by managing client registration and ensuring secure onboarding of participants.Experimental results demonstrate the effectiveness of FedViTBloc in medical image analysis while maintaining stringent privacy standards,achieving 67%accuracy and reducing loss below 2 across 10 clients,ensuring scalability and robustness. 展开更多
关键词 AI Blockchain DECENTRALIZED Federated Learning Medical images Machine Learning VIT
在线阅读 下载PDF
Deep learning model meets community-based surveillance of acute flaccid paralysis
17
作者 Gelan Ayana Kokeb Dese +13 位作者 Hundessa Daba Nemomssa Hamdia Murad Efrem Wakjira Gashaw Demlew Dessalew Yohannes Ketema Lemma Abdi Elbetel Taye Filimona Bisrat Tenager Tadesse Legesse Kidanne Se-woon Choe Netsanet Workneh Gidi Bontu Habtamu Jude Kong 《Infectious Disease Modelling》 2025年第1期353-364,共12页
Acute flaccid paralysis(AFP)case surveillance is pivotal for the early detection of potential poliovirus,particularly in endemic countries such as Ethiopia.The community-based surveillance system implemented in Ethiop... Acute flaccid paralysis(AFP)case surveillance is pivotal for the early detection of potential poliovirus,particularly in endemic countries such as Ethiopia.The community-based surveillance system implemented in Ethiopia has significantly improved AFP surveillance.However,challenges like delayed detection and disorganized communication persist.This work proposes a simple deep learning model for AFP surveillance,leveraging transfer learning on images collected from Ethiopia's community key informants through mobile phones.The transfer learning approach is implemented using a vision transformer model pretrained on the ImageNet dataset.The proposed model outperformed convolutional neural network-based deep learning models and vision transformer models trained from scratch,achieving superior accuracy,F1-score,precision,recall,and area under the receiver operating characteristic curve(AUC).It emerged as the optimal model,demonstrating the highest average AUC of 0.870±0.01.Statistical analysis confirmed the significant superiority of the proposed model over alternative approaches(P<0.001).By bridging community reporting with health system response,this study offers a scalable solution for enhancing AFP surveillance in low-resource settings.The study is limited in terms of the quality of image data collected,necessitating future work on improving data quality.The establishment of a dedicated platform that facilitates data storage,analysis,and future learning can strengthen data quality.Nonetheless,this work represents a significant step toward leveraging artificial intelligence for community-based AFP surveillance from images,with substantial implications for addressing global health challenges and disease eradication strategies. 展开更多
关键词 Acute flaccid paralysis SURVEILLANCE COMMUNITY Deep learning model Transfer learning Computer vision
原文传递
Optoelectronic switching of nanowire-based hybrid organic/oxide/semiconductor field-effect transistors 被引量:1
18
作者 Eunhye Baek Sebastian Pregl +6 位作者 Mehrdad Shaygan Lotta Romhildt Walter M. Weber Thomas Mikolajick DmitryA. Ryndyk Larysa Baraban Gianaurelio Cuniberti 《Nano Research》 SCIE EI CAS CSCD 2015年第4期1229-1240,共12页
A novel photosensitive hybrid field-effect transistor (FET) which consists of a multiple-shell of organic porphyrin film/oxide/silicon nanowires is presented. Due to the oxide shell around the nanowires, photoswitch... A novel photosensitive hybrid field-effect transistor (FET) which consists of a multiple-shell of organic porphyrin film/oxide/silicon nanowires is presented. Due to the oxide shell around the nanowires, photoswitching of the current in the hybrid nanodevices is guided by the electric field effect, induced by charge redistribution within the organic film. This principle is an alternative to a photoinduced electron injection, valid for devices relying on direct junctions between organic molecules and metals or semiconductors. The switching dynamics of the hybrid nanodevices upon violet light illumination is investigated and a strong dependence on the thickness of the porphyrin film wrapping the nanowires is found. Furthermore, the thickness of the organic films is found to be a crucial parameter also for the switching efficiency of the nanowire FET, represented by the ratio of currents under light illumination (ON) and in dark conditions (OFF). We suggest a simple model of porphyrin film charging to explain the optoelectronic behavior of nanowire FETs mediated by organic film/oxide/semiconductor junctions. 展开更多
关键词 hybrid nanoelectronics silicon nanowirefield-effect transistors porphyrin optoelectronic switching organic/oxide/semiconductor junctions
原文传递
A probabilistic model of quantum states for classical data security
19
作者 Muhammad Waseem Hafiz Seong Oun Hwang 《Frontiers of physics》 SCIE CSCD 2023年第5期281-292,共12页
The phenomenal progress of quantum information theory over the last decade has substantially broadened the potential to simulate the superposition of states for exponential speedup of quantum algorithms over their cla... The phenomenal progress of quantum information theory over the last decade has substantially broadened the potential to simulate the superposition of states for exponential speedup of quantum algorithms over their classical peers.Therefore,the conventional and modern cryptographic standards(encryption and authentication)are susceptible to Shor’s and Grover’s algorithms on quantum computers.The significant improvement in technology permits consummate levels of data protection by encoding classical data into small quantum states that can only be utilized once by leveraging the capabilities of quantum-assisted classical computations.Considering the frequent data breaches and increasingly stringent privacy legislation,we introduce a hybrid quantum-classical model to transform classical data into unclonable states,and we experimentally demonstrate perfect state transfer to exemplify the classical data.To alleviate implementation complexity,we propose an arbitrary quantum signature scheme that does not require the establishment of entangled states to authenticate users in order to transmit and receive arbitrated states to retrieve classical data.The consequences of the probabilistic model indicate that the quantum-assisted classical framework substantially enhances the performance and security of digital data,and paves the way toward real-world applications. 展开更多
关键词 information security quantum-classical cryptography quantum information processing quantum spin states spin-1/2 algebra user authentication
原文传递
Parallel arrays of Schottky barrier nanowire field effect transistors: Nanoscopic effects for macroscopic current output 被引量:3
20
作者 Sebastian Pregl Walter M. Weber +5 位作者 Daijiro Nozaki Jens Kunstmann Larysa Baraban Joerg Opitz Thomas Mikolajick Gianaurelio Cuniberti 《Nano Research》 SCIE EI CAS CSCD 2013年第6期381-388,共8页
We present novel Schottky barrier field effect transistors consisting of a parallel array of bottom-up grown silicon nanowires that are able to deliver high current outputs. Axial silicidation of the nanowires is used... We present novel Schottky barrier field effect transistors consisting of a parallel array of bottom-up grown silicon nanowires that are able to deliver high current outputs. Axial silicidation of the nanowires is used to create defined Schottky junctions leading to on/off current ratios of up to 106. The device concept leverages the unique transport properties of nanoscale junctions to boost device performance for macroscopic applications. Using parallel arrays, on-currents of over 500 gA at a source-drain voltage of 0.5 V can be achieved. The transconductance is thus increased significantly while maintaining the transfer characteristics of single nanowire devices. By incorporating several hundred nanowires into the parallel arra36 the yield of functioning transistors is dramatically increased and device- to-device variability is reduced compared to single devices. This new nanowire- based platform provides sufficient current output to be employed as a transducer for biosensors or a driving stage for organic light-emitting diodes (LEDs), while the bottom-up nature of the fabrication procedure means it can provide building blocks for novel printable electronic devices. 展开更多
关键词 silicon nanowire effective Schottky barrier lowering parallel arra^electric field enhancement output current amplification
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部