Software-Defined Networking (SDN) has revolutionized network management by providing unprecedented flexibility, control, and efficiency. However, its centralized architecture introduces critical security vulnerabilities. This paper introduces a novel approach to securing SDN environments using IOTA 2.
View Article and Find Full Text PDFSocial media platforms serve as communication tools where users freely share information regardless of its accuracy. Propaganda on these platforms refers to the dissemination of biased or deceptive information aimed at influencing public opinion, encompassing various forms such as political campaigns, fake news, and conspiracy theories. This study introduces a Hybrid Feature Engineering Approach for Propaganda Identification (HAPI), designed to detect propaganda in text-based content like news articles and social media posts.
View Article and Find Full Text PDFColor face images are often transmitted over public channels, where they are vulnerable to tampering attacks. To address this problem, the present paper introduces a novel scheme called Authentication and Color Face Self-Recovery (AuCFSR) for ensuring the authenticity of color face images and recovering the tampered areas in these images. AuCFSR uses a new two-dimensional hyperchaotic system called two-dimensional modular sine-cosine map (2D MSCM) to embed authentication and recovery data into the least significant bits of color image pixels.
View Article and Find Full Text PDFTo avoid rounding errors associated with the limited representation of significant digits when applying the floating-point Krawtchouk transform in image processing, we present an integer and reversible version of the Krawtchouk transform (IRKT). This proposed IRKT generates integer-valued coefficients within the Krawtchouk domain, seamlessly aligning with the integer representation commonly utilized in lossless image applications. Building upon the IRKT, we introduce a novel 3D reversible data hiding (RDH) algorithm designed for the secure storage and transmission of extensive medical data within the IoMT (Internet of Medical Things) sector.
View Article and Find Full Text PDFHealthcare 4.0 is a recent e-health paradigm associated with the concept of Industry 4.0.
View Article and Find Full Text PDFThis study presents an enhanced deep learning approach for the accurate detection of eczema and psoriasis skin conditions. Eczema and psoriasis are significant public health concerns that profoundly impact individuals' quality of life. Early detection and diagnosis play a crucial role in improving treatment outcomes and reducing healthcare costs.
View Article and Find Full Text PDFIn the field of medical imaging, deep learning has made considerable strides, particularly in the diagnosis of brain tumors. The Internet of Medical Things (IoMT) has made it possible to combine these deep learning models into advanced medical devices for more accurate and efficient diagnosis. Convolutional neural networks (CNNs) are a popular deep learning technique for brain tumor detection because they can be trained on vast medical imaging datasets to recognize cancers in new images.
View Article and Find Full Text PDFAlzheimer's disease (AD) is a neurodegenerative disorder characterized by cognitive impairment and aberrant protein deposition in the brain. Therefore, the early detection of AD is crucial for the development of effective treatments and interventions, as the disease is more responsive to treatment in its early stages. It is worth mentioning that deep learning techniques have been successfully applied in recent years to a wide range of medical imaging tasks, including the detection of AD.
View Article and Find Full Text PDFRecent articles reported a massive increase in frustration among weak students due to the outbreak of COVID-19 and Massive Open Online Courses (MOOCs). These students need to be evaluated to detect possible psychological counseling and extra attention. On the one hand, the literature reports many optimization techniques focusing on existing students' performance prediction systems.
View Article and Find Full Text PDFQuantum key distribution (QKD) can provide point-to-point information-theoretic secure key services for two connected users. In fact, the development of QKD networks needs more focus from the scientific community in order to broaden the service scale of QKD technology to deliver end-to-end secure key services. Of course, some recent efforts have been made to develop secure communication protocols based on QKD.
View Article and Find Full Text PDFThis paper puts forward a new algorithm that utilizes compressed sensing and two chaotic systems to complete image compression and encryption concurrently. First, the hash function was utilized to obtain the initial parameters of two chaotic maps, which were the 2D-SLIM and 2D-SCLMS maps, respectively. Second, a sparse coefficient matrix was transformed from the plain image through discrete wavelet transform.
View Article and Find Full Text PDFMobile crowd-sensing (MCS) is a well-known paradigm used for obtaining sensed data by using sensors found in smart devices. With the rise of more sensing tasks and workers in the MCS system, it is now essential to design an efficient approach for task allocation. Moreover, to ensure the completion of the tasks, it is necessary to incentivise the workers by rewarding them for participating in performing the sensing tasks.
View Article and Find Full Text PDFIntroduction: In humanity's ongoing fight against its common enemy of COVID-19, researchers have been relentless in finding efficient technologies to support mitigation, diagnosis, management, contact tracing, and ultimately vaccination.
Objectives: Engineers and computer scientists have deployed the potent properties of deep learning models (DLMs) in COVID-19 detection and diagnosis. However, publicly available datasets are often adulterated during collation, transmission, or storage.
Multimedia data play an important role in our daily lives. The evolution of internet technologies means that multimedia data can easily participate amongst various users for specific purposes, in which multimedia data confidentiality and integrity have serious security issues. Chaos models play an important role in designing robust multimedia data cryptosystems.
View Article and Find Full Text PDFTraffic sign detection (TSD) in real-time environment holds great importance for applications such as automated-driven vehicles. Large variety of traffic signs, different appearances, and spatial representations causes a huge intraclass variation. In this article, an extreme learning machine (ELM), convolutional neural network (CNN), and scale transformation (ST)-based model, called improved extreme learning machine network, are proposed to detect traffic signs in real-time environment.
View Article and Find Full Text PDFComput Intell Neurosci
January 2022
Ovarian cancer is the third most common gynecologic cancers worldwide. Advanced ovarian cancer patients bear a significant mortality rate. Survival estimation is essential for clinicians and patients to understand better and tolerate future outcomes.
View Article and Find Full Text PDFThis paper proposes a multi-unmanned aerial vehicle (UAV)-enabled autonomous mobile edge computing (MEC) system, in which several UAVs are deployed to provide services to user devices (UDs). The aim is to reduce/minimize the overall energy consumption of the autonomous system via designing the optimal trajectories of multiple UAVs. The problem is very complicated to be solved by traditional methods, as one has to take into account the deployment updation of stop points (SPs), the association of SPs with UDs and UAVs, and the optimal trajectories designing of UAVs.
View Article and Find Full Text PDFSurveillance remains an important research area, and it has many applications. Smart surveillance requires a high level of accuracy even when persons are uncooperative. Gait Recognition is the study of recognizing people by the way they walk even when they are unwilling to cooperate.
View Article and Find Full Text PDFThe new Coronavirus disease 2019 (COVID-19) is rapidly affecting the world population with statistics quickly falling out of date. Due to the limited availability of annotated Coronavirus X-ray and CT images, the detection of COVID-19 remains the biggest challenge in diagnosing this disease. This paper provides a promising solution by proposing a COVID-19 detection system based on deep learning.
View Article and Find Full Text PDFThis generation faces existential threats because of the global assault of the novel Corona virus 2019 (i.e., COVID-19).
View Article and Find Full Text PDFTraditionally, tamper-proof steganography involves using efficient protocols to encrypt the stego cover image and/or hidden message prior to embedding it into the carrier object. However, as the inevitable transition to the quantum computing paradigm beckons, its immense computing power will be exploited to violate even the best non-quantum, i.e.
View Article and Find Full Text PDF