This paper proposes a new optimization technique to make an integration between the Optimal Reactive Power Dispatch (ORPD) problem and Electric Vehicles (EV). Here, a modified metaheuristic algorithm, called the Promoted Osprey Optimizer (POO) is used for this purpose. Inspired by the hunting behavior of ospreys, a predatory bird species, the POO algorithm employs various strategies like diving, soaring, and gliding to effectively explore the search space and avoid local optima.
View Article and Find Full Text PDFWith the swift advancement of technology and growing popularity of internet in business and communication, cybersecurity posed a global threat. This research focuses new Deep Learning (DL) model referred as FinSafeNet to secure loose cash transactions over the digital banking channels. FinSafeNet is based on a Bi-Directional Long Short-Term Memory (Bi-LSTM), a Convolutional Neural Network (CNN) and an additional dual attention mechanism to study the transaction data and influence the observation of various security threats.
View Article and Find Full Text PDFAs facial modification technology advances rapidly, it poses a challenge to methods used to detect fake faces. The advent of deep learning and AI-based technologies has led to the creation of counterfeit photographs that are more difficult to discern apart from real ones. Existing Deep fake detection systems excel at spotting fake content with low visual quality and are easily recognized by visual artifacts.
View Article and Find Full Text PDFIEEE J Biomed Health Inform
July 2024
In the context of the increasingly diversified blockchain technology, interoperability among heterogeneous blockchains has become key to further advancing this field. Existing cross-chain technologies, while facilitating data and asset exchange between different blockchains to some extent, have exposed issues such as insufficient security, low efficiency, and inconsistent standards. Consequently, these issues give rise to significant obstacles in terms of both scalability and seamless communication among blockchains within a multi-chain framework.
View Article and Find Full Text PDFTo avoid rounding errors associated with the limited representation of significant digits when applying the floating-point Krawtchouk transform in image processing, we present an integer and reversible version of the Krawtchouk transform (IRKT). This proposed IRKT generates integer-valued coefficients within the Krawtchouk domain, seamlessly aligning with the integer representation commonly utilized in lossless image applications. Building upon the IRKT, we introduce a novel 3D reversible data hiding (RDH) algorithm designed for the secure storage and transmission of extensive medical data within the IoMT (Internet of Medical Things) sector.
View Article and Find Full Text PDFIn the realm of hyperspectral image classification, the pursuit of heightened accuracy and comprehensive feature extraction has led to the formulation of an advance architectural paradigm. This study proposed a model encapsulated within the framework of a unified model, which synergistically leverages the capabilities of three distinct branches: the swin transformer, convolutional neural network, and encoder-decoder. The main objective was to facilitate multiscale feature learning, a pivotal facet in hyperspectral image classification, with each branch specializing in unique facets of multiscale feature extraction.
View Article and Find Full Text PDFThe rapid growth of the Internet of Things (IoT) and big data has raised security concerns. Protecting IoT big data from attacks is crucial. Detecting real-time network attacks efficiently is challenging, especially in the resource-limited IoT setting.
View Article and Find Full Text PDFWith the widespread application of 5G technology, there has been a significant surge in wireless video service demand and video traffic due to the proliferation of smart terminal devices and multimedia applications. However, the complexity of terminal devices, heterogeneous transmission channels, and the rapid growth of video traffic present new challenges for wireless network-based video applications. Although scalable video coding technology effectively improves video transmission efficiency in complex networks, traditional cellular base stations may struggle to handle video transmissions for all users simultaneously, particularly in large-scale networks.
View Article and Find Full Text PDFHybrid beamforming is a viable method for lowering the complexity and expense of massive multiple-input multiple-output systems while achieving high data rates on track with digital beamforming. To this end, the purpose of the research reported in this paper is to assess the effectiveness of the three architectural beamforming techniques (Analog, Digital, and Hybrid beamforming) in massive multiple-input multiple-output systems, especially hybrid beamforming. In hybrid beamforming, the antennas are connected to a single radio frequency chain, unlike digital beamforming, where each antenna has a separate radio frequency chain.
View Article and Find Full Text PDFThe integration of the Internet of Bio Nano Things (IoBNT) with artificial intelligence (AI) and molecular communications technology is now required to achieve eHealth, specifically in the targeted drug delivery system (TDDS). In this work, we investigate an analytical framework for IoBNT with Forster resonance energy transfer (FRET) nanocommunication to enable intelligent bio nano thing (BNT) machine to accurately deliver therapeutic drug to the diseased cells. The FRET nanocommunication is accomplished by using the well-known pair of fluorescent proteins, EYFP and ECFP.
View Article and Find Full Text PDFWith the rapid development of Industry 4.0, the data security of Industrial Internet of Things in the Industry 4.0 environment has received widespread attention.
View Article and Find Full Text PDFCustomer relationship management (CRM) is an innovative technology that seeks to improve customer satisfaction, loyalty, and profitability by acquiring, developing, and maintaining effective customer relationships and interactions with stakeholders. Numerous researches on CRM have made significant progress in several areas such as telecommunications, banking, and manufacturing, but research specific to the healthcare environment is very limited. This systematic review aims to categorise, summarise, synthesise, and appraise the research on CRM in the healthcare environment, considering the absence of coherent and comprehensive scholarship of disparate data on CRM.
View Article and Find Full Text PDFIn today's cyber world, the demand for the internet is increasing day by day, increasing the concern of network security. The aim of an Intrusion Detection System (IDS) is to provide approaches against many fast-growing network attacks (e.g.
View Article and Find Full Text PDFWireless Rechargeable Sensor Networks (WRSN) are not yet fully functional and robust due to the fact that their setting parameters assume fixed control velocity and location. This study proposes a novel scheme of the WRSN with mobile sink (MS) velocity control strategies for charging nodes and collecting its data in WRSN. Strip space of the deployed network area is divided into sub-locations for variant corresponding velocities based on nodes energy expenditure demands.
View Article and Find Full Text PDFFog computing is playing a vital role in data transmission to distributed devices in the Internet of Things (IoT) and another network paradigm. The fundamental element of fog computing is an additional layer added between an IoT device/node and a cloud server. These fog nodes are used to speed up time-critical applications.
View Article and Find Full Text PDFLog anomaly detection is an efficient method to manage modern large-scale Internet of Things (IoT) systems. More and more works start to apply natural language processing (NLP) methods, and in particular word2vec, in the log feature extraction. Word2vec can extract the relevance between words and vectorize the words.
View Article and Find Full Text PDFThe proper utilization of road information can improve the performance of relay-node selection methods. However, the existing schemes are only applicable to a specific road structure, and this limits their application in real-world scenarios where mostly more than one road structure exists in the Region of Interest (RoI), even in the communication range of a sender. In this paper, we propose an adaptive relay-node selection (ARNS) method based on the exponential partition to implement message broadcasting in complex scenarios.
View Article and Find Full Text PDFWith the continuous development of science and engineering technology, our society has entered the era of the mobile Internet of Things (MIoT). MIoT refers to the combination of advanced manufacturing technologies with the Internet of Things (IoT) to create a flexible digital manufacturing ecosystem. The wireless communication technology in the Internet of Things is a bridge between mobile devices.
View Article and Find Full Text PDFIn the IoT (Internet of Things) environment, smart homes, smart grids, and telematics constantly generate data with complex attributes. These data have low heterogeneity and poor interoperability, which brings difficulties to data management and value mining. The promising combination of blockchain and the Internet of things as BCoT (blockchain of things) can solve these problems.
View Article and Find Full Text PDF