Distance learning quality assessment of universities based on interval monotonic decision tree algorithm DOI

Lu Jing Rong

Computers & Electrical Engineering, Journal Year: 2022, Volume and Issue: 102, P. 108116 - 108116

Published: June 9, 2022

Language: Английский

A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review DOI Creative Commons
Usman Tariq, Irfan Ahmed, Ali Kashif Bashir

et al.

Sensors, Journal Year: 2023, Volume and Issue: 23(8), P. 4117 - 4117

Published: April 19, 2023

The emergence of the Internet Things (IoT) technology has brought about tremendous possibilities, but at same time, it opened up new vulnerabilities and attack vectors that could compromise confidentiality, integrity, availability connected systems. Developing a secure IoT ecosystem is daunting challenge requires systematic holistic approach to identify mitigate potential security threats. Cybersecurity research considerations play critical role in this regard, as they provide foundation for designing implementing measures can address emerging risks. To achieve ecosystem, scientists engineers must first define rigorous specifications serve developing devices, chipsets, networks. such an interdisciplinary involves multiple stakeholders, including cybersecurity experts, network architects, system designers, domain experts. primary ensuring defend against both known unknown attacks. date, community identified several key concerns related architecture These include issues connectivity, communication, management protocols. This paper provides all-inclusive lucid review current state anomalies concepts IoT. We classify analyze prevalent distresses regarding IoT's layered architecture, establish by examining attacks, threats, cutting-edge solutions. Furthermore, we set goals will benchmark assessing whether solution satisfies specific use cases.

Language: Английский

Citations

151

Malaria parasite detection using deep learning algorithms based on (CNNs) technique DOI

Muqdad Hanoon Dawood Alnussairi,

Abdullahi Abdu İbrahim

Computers & Electrical Engineering, Journal Year: 2022, Volume and Issue: 103, P. 108316 - 108316

Published: Sept. 1, 2022

Language: Английский

Citations

45

Quantum optics in visual sensors and adaptive optics by quantum vacillations of laser beams wave propagation apply in data mining DOI
Omar A. AlKawak,

Bilal A. Ozturk,

Zinah S. Jabbar

et al.

Optik, Journal Year: 2022, Volume and Issue: 273, P. 170396 - 170396

Published: Dec. 10, 2022

Language: Английский

Citations

36

A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography DOI

Fredy Varghese,

P. Sasikala

Wireless Personal Communications, Journal Year: 2023, Volume and Issue: 129(4), P. 2291 - 2318

Published: March 27, 2023

Language: Английский

Citations

21

Effective Identification and Authentication of Healthcare IoT Using Fog Computing with Hybrid Cryptographic Algorithm DOI Open Access

P. Britto Corthis,

G. P. Ramesh,

Miguel García-Torres

et al.

Symmetry, Journal Year: 2024, Volume and Issue: 16(6), P. 726 - 726

Published: June 11, 2024

Currently, Internet of Things (IoT)-based cloud systems face several problems such as privacy leakage, failure in centralized operation, managing IoT devices, and malicious attacks. The data transmission between the healthcare needs trust secure Electronic Health Records (EHRs). IoT-enabled equipment is seen hospitals that have been implementing technology for many years. Nonetheless, medical agencies fail to consider security risk associated with which are readily compromised cause potential threats authentication encryption procedures. Existing computing methods like homomorphic elliptic curve cryptography unable meet security, identity, authentication, devices. majority conventional algorithms lack transmission. Therefore, fog introduced overcome device verification, identification scalable data. In this research manuscript, includes a hybrid mathematical model: Elliptic Curve Cryptography (ECC) Proxy Re-encryption (PR) Enhanced Salp Swarm Algorithm (ESSA) identification, EHRs. ESSA incorporated into PR algorithm determine optimal key size parameters algorithm. Specifically, ESSA, Whale Optimization (WOA) integrated (SSA) enhance its global local search processes. primary objective proposed model further sharing real time services. extensive experimental analysis shows approximately reduced 60 Milliseconds (ms) 18 milliseconds processing improved 25% 3% reliability, compared traditional cryptographic algorithms. Additionally, obtains communication cost 4260 bits memory usage 680 bytes context analysis.

Language: Английский

Citations

7

The development system of local music teaching materials based on deep learning DOI
Weiping Zhou

Optik, Journal Year: 2022, Volume and Issue: 273, P. 170421 - 170421

Published: Dec. 13, 2022

Language: Английский

Citations

24

Integration of novel uncertainty model construction of green supply chain management for small and medium-sized enterprises using artificial intelligence DOI
Bochao Liu

Optik, Journal Year: 2022, Volume and Issue: 273, P. 170411 - 170411

Published: Dec. 14, 2022

Language: Английский

Citations

21

Providing A Personalized Healthcare Service To The Patients Using AIOPs Monitoring DOI Creative Commons

Ajay Reddy Yeruva

Eduvest - Journal Of Universal Studies, Journal Year: 2023, Volume and Issue: 3(2), P. 327 - 334

Published: Jan. 17, 2023

We see the critical role technology plays in healthcare midst of a continuous worldwide health crisis. To combat epidemic, South Korea, for example, used smart city' and government-developed applications that follow individuals quarantine. A biosensor can identify virus saliva samples has just been created by India's National Institute Animal Biotechnology, Hyderabad. These developments are made feasible usage certain biosensors have printed circuit boards with metal core components capable withstanding large variations moisture temperature. very sophisticated breakthrough, artificial intelligence IT operations, is altering sector addition to aid nations combating epidemic. This general phrase, also known as AIOps, describes automated detection repair typical problems using big data, machine learning, other AI technologies. AIOps may be industry teach computers analyse CT scan pictures, progression various illnesses, assess effectiveness patient therapy, much moren.

Language: Английский

Citations

12

Modified lightweight cryptography scheme and its applications in IoT environment DOI
Nilufar Yasmin, Richa Gupta

International Journal of Information Technology, Journal Year: 2023, Volume and Issue: 15(8), P. 4403 - 4414

Published: Sept. 26, 2023

Language: Английский

Citations

12

Optimization of Innovative Education Resource Allocation in Colleges and Universities Based on Cloud Computing and User Privacy Security DOI

Zhumei Ren

Wireless Personal Communications, Journal Year: 2023, Volume and Issue: unknown

Published: June 28, 2023

Language: Английский

Citations

11