首页 > 最新文献

Cmc-computers Materials & Continua最新文献

英文 中文
Secure and Robust Optical Multi-Stage Medical Image Cryptosystem 安全鲁棒的光学多级医学图像密码系统
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.018545
W. El-shafai, M. Aly, A. Algarni, F. El-Samie, N. Soliman
: Due to the rapid growth of telemedicine and healthcare services, color medical image security applications have been expanded precipitously. In this paper, an asymmetric PTFrFT (Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested. Two different phases in the fractional Fourier and output planes are provided as deciphering keys. Accordingly, the ciphering keys will not be employed for the deciphering procedure. Thus, the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH (Optical Scanning Holography) and DRPE (Double Random Phase Encoding) algorithms. One of the principal impacts of the introduced asymmetric cryptosystem is that it eliminates the one-dimensionality aspects of the related symmetric cryptosystems due to its remarkable feature of phase nonlinear truncation components. More comparisons on various color medical images are examined and analyzed to substanti-ate the cryptosystem efficacy. The achieved experimental outcomes ensure that the introduced cryptosystem is robust and secure. It has terrific cryptography performance compared to conventional cryptography algorithms, even in the presence of noise and severe channel attacks.
:由于远程医疗和医疗保健服务的快速增长,彩色医学图像安防的应用范围急剧扩大。提出了一种基于相位截断分数阶傅里叶变换的非对称彩色医学图像密码系统。分数傅里叶平面和输出平面中的两个不同相位作为解密密钥。因此,加密密钥将不会用于解密过程。因此,与传统的光学对称OSH(光学扫描全息)和DRPE(双随机相位编码)算法相比,所引入的PTFrFT算法包括非对称的加密和解密过程。引入的非对称密码系统的主要影响之一是,由于其相位非线性截断分量的显著特征,它消除了相关对称密码系统的一维性。通过对各种彩色医学图像的比较,验证了该密码系统的有效性。实验结果表明,所引入的密码系统具有鲁棒性和安全性。与传统的加密算法相比,即使在存在噪声和严重信道攻击的情况下,它也具有出色的加密性能。
{"title":"Secure and Robust Optical Multi-Stage Medical Image Cryptosystem","authors":"W. El-shafai, M. Aly, A. Algarni, F. El-Samie, N. Soliman","doi":"10.32604/cmc.2022.018545","DOIUrl":"https://doi.org/10.32604/cmc.2022.018545","url":null,"abstract":": Due to the rapid growth of telemedicine and healthcare services, color medical image security applications have been expanded precipitously. In this paper, an asymmetric PTFrFT (Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested. Two different phases in the fractional Fourier and output planes are provided as deciphering keys. Accordingly, the ciphering keys will not be employed for the deciphering procedure. Thus, the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH (Optical Scanning Holography) and DRPE (Double Random Phase Encoding) algorithms. One of the principal impacts of the introduced asymmetric cryptosystem is that it eliminates the one-dimensionality aspects of the related symmetric cryptosystems due to its remarkable feature of phase nonlinear truncation components. More comparisons on various color medical images are examined and analyzed to substanti-ate the cryptosystem efficacy. The achieved experimental outcomes ensure that the introduced cryptosystem is robust and secure. It has terrific cryptography performance compared to conventional cryptography algorithms, even in the presence of noise and severe channel attacks.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"35 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78866022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Design of an Information Security Service for Medical Artificial Intelligence 医疗人工智能信息安全服务的设计
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.015610
Yanghoon Kim, Jawon Kim, Hangbae Chang
: The medical convergence industry has gradually adopted ICT devices, which has led to legacy security problems related to ICT devices. However, it has been difficult to solve these problems due to data resource issues. Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information. Therefore, to provide reliableservices focused on security internalization,it is necessary to establish a medical convergence environment-oriented security management system. This study proposes the use of system identification and countermeasures to secure system reliability when using medical convergence environment informationin medical artificial intelligence. We checked the life cycle of medical information and the flow and location of information, analyzed the security threats that may arise during the life cycle, and proposed technical countermeasures to overcome such threats. We verified the proposed countermeasures through a survey of experts. Security requirements were defined based on the information life cycle in the medical convergence environment. We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes.
:医疗融合行业逐渐采用ICT设备,这导致了与ICT设备相关的遗留安全问题。然而,由于数据资源问题,这些问题一直难以解决。这些问题可能导致利用医疗信息的医疗人工智能服务缺乏可靠性。因此,要提供以安全内部化为核心的可靠服务,必须建立面向医疗融合环境的安全管理体系。本研究提出在医疗人工智能中使用医疗融合环境信息时,使用系统识别和对策来确保系统可靠性。我们检查了医疗信息的生命周期和信息的流向和位置,分析了生命周期中可能出现的安全威胁,并提出了克服这些威胁的技术对策。我们通过对专家的调查验证了提出的对策。根据医疗融合环境中的信息生命周期定义安全需求。我们还设计了适用于不同规模医院安全管理系统的技术对策。
{"title":"Design of an Information Security Service for Medical Artificial Intelligence","authors":"Yanghoon Kim, Jawon Kim, Hangbae Chang","doi":"10.32604/cmc.2022.015610","DOIUrl":"https://doi.org/10.32604/cmc.2022.015610","url":null,"abstract":": The medical convergence industry has gradually adopted ICT devices, which has led to legacy security problems related to ICT devices. However, it has been difficult to solve these problems due to data resource issues. Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information. Therefore, to provide reliableservices focused on security internalization,it is necessary to establish a medical convergence environment-oriented security management system. This study proposes the use of system identification and countermeasures to secure system reliability when using medical convergence environment informationin medical artificial intelligence. We checked the life cycle of medical information and the flow and location of information, analyzed the security threats that may arise during the life cycle, and proposed technical countermeasures to overcome such threats. We verified the proposed countermeasures through a survey of experts. Security requirements were defined based on the information life cycle in the medical convergence environment. We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"29 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78953146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cluster-Based Stable BSM Dissemination System for Safe Autonomous Platooning 基于集群的安全自主队列稳定BSM传播系统
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.021237
Sagheer Abbas, Yousef Alhwaiti, A. Fatima, M. A. Khan, Muhammad Adnan Khan, Taher M. Ghazal, Asma Kanwal, Munir Ahmad, Nouh Sabri Elmitwally
{"title":"Cluster-Based Stable BSM Dissemination System for Safe Autonomous Platooning","authors":"Sagheer Abbas, Yousef Alhwaiti, A. Fatima, M. A. Khan, Muhammad Adnan Khan, Taher M. Ghazal, Asma Kanwal, Munir Ahmad, Nouh Sabri Elmitwally","doi":"10.32604/cmc.2022.021237","DOIUrl":"https://doi.org/10.32604/cmc.2022.021237","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"13 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79022672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved KNN Imputation for Missing Values in Gene Expression Data 基因表达数据缺失值的改进KNN代入
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.020261
Phimmarin Keerin, Tossapon Boongoen
The problem of missing values has long been studied by researchers working in areas of data science and bioinformatics, especially the analysis of gene expression data that facilitates an early detection of cancer. Many attempts show improvements made by excluding samples with missing information from the analysis process, while others have tried to fill the gaps with possible values. While the former is simple, the latter safeguards information loss. For that, a neighbour-based (KNN) approach has proven more effective than other global estimators. The paper extends this further by introducing a new summarizationmethod to theKNNmodel. It is the first study that applies the concept of ordered weighted averaging (OWA) operator to such a problem context. In particular, two variations of OWA aggregation are proposed and evaluated against their baseline and other neighbor-based models. Using different ratios of missing values from 1%–20% and a set of six published gene expression datasets, the experimental results suggest that newmethods usually provide more accurate estimates than those compared methods. Specific to the missing rates of 5% and 20%, the best NRMSE scores as averages across datasets is 0.65 and 0.69, while the highest measures obtained by existing techniques included in this study are 0.80 and 0.84, respectively.
长期以来,数据科学和生物信息学领域的研究人员一直在研究缺失值的问题,特别是对有助于早期发现癌症的基因表达数据的分析。许多尝试表明,通过从分析过程中排除信息缺失的样本取得了改进,而其他人则试图用可能的值填补空白。前者很简单,后者则可以防止信息丢失。对于这一点,基于邻居(KNN)的方法已被证明比其他全局估计方法更有效。本文通过引入knn模型的一种新的总结方法,进一步扩展了这一方法。这是首次将有序加权平均算子的概念应用于此类问题上下文的研究。特别地,提出了OWA聚合的两种变体,并根据它们的基线和其他基于邻居的模型进行了评估。使用1%-20%的不同缺失值比率和一组6个已发表的基因表达数据集,实验结果表明,新方法通常比比较的方法提供更准确的估计。针对5%和20%的缺失率,最佳的NRMSE得分作为数据集的平均值为0.65和0.69,而本研究中包括的现有技术获得的最高测量值分别为0.80和0.84。
{"title":"Improved KNN Imputation for Missing Values in Gene Expression Data","authors":"Phimmarin Keerin, Tossapon Boongoen","doi":"10.32604/cmc.2022.020261","DOIUrl":"https://doi.org/10.32604/cmc.2022.020261","url":null,"abstract":"The problem of missing values has long been studied by researchers working in areas of data science and bioinformatics, especially the analysis of gene expression data that facilitates an early detection of cancer. Many attempts show improvements made by excluding samples with missing information from the analysis process, while others have tried to fill the gaps with possible values. While the former is simple, the latter safeguards information loss. For that, a neighbour-based (KNN) approach has proven more effective than other global estimators. The paper extends this further by introducing a new summarizationmethod to theKNNmodel. It is the first study that applies the concept of ordered weighted averaging (OWA) operator to such a problem context. In particular, two variations of OWA aggregation are proposed and evaluated against their baseline and other neighbor-based models. Using different ratios of missing values from 1%–20% and a set of six published gene expression datasets, the experimental results suggest that newmethods usually provide more accurate estimates than those compared methods. Specific to the missing rates of 5% and 20%, the best NRMSE scores as averages across datasets is 0.65 and 0.69, while the highest measures obtained by existing techniques included in this study are 0.80 and 0.84, respectively.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"1 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76532644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Autism Spectrum Disorder Prediction by an Explainable Deep Learning Approach 基于可解释深度学习方法的自闭症谱系障碍预测
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.022170
Jasmin Pamela S, R. Saranya, V. Indragandhi, R. Raja Singh, V. Subramaniyaswamy, Yuvaraja Teekaraman, S. Urooj, N. Alwadai
{"title":"Autism Spectrum Disorder Prediction by an Explainable Deep Learning Approach","authors":"Jasmin Pamela S, R. Saranya, V. Indragandhi, R. Raja Singh, V. Subramaniyaswamy, Yuvaraja Teekaraman, S. Urooj, N. Alwadai","doi":"10.32604/cmc.2022.022170","DOIUrl":"https://doi.org/10.32604/cmc.2022.022170","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"118 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77390388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Design of Human Adaptive Mechatronics Controller for Upper Limb Motion Intention Prediction 面向上肢运动意图预测的人体自适应机电控制器设计
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.021667
Sunwoo Hwang, Joo-Uk Kim, Hagseoung Kim, Hyungchul Kim, Youngmin Kim
{"title":"Design of Human Adaptive Mechatronics Controller for Upper Limb Motion Intention Prediction","authors":"Sunwoo Hwang, Joo-Uk Kim, Hagseoung Kim, Hyungchul Kim, Youngmin Kim","doi":"10.32604/cmc.2022.021667","DOIUrl":"https://doi.org/10.32604/cmc.2022.021667","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"33 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79085807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of PCCNN-Based Network Intrusion Detection System for EDGE Computing 基于pccnn的边缘计算网络入侵检测系统的开发
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.018708
Kamaledin Abodayeh, A. Raza, Muhammad Rafiq, Muhammad Shoaib Arif, Muhammad Naveed, Zunir Zeb, Syed Zaheer Abbas, K. Shahzadi, S. Sarwar, Qasim Naveed, Badar Ul Zaman, Muhammad Mohsin
{"title":"Development of PCCNN-Based Network Intrusion Detection System for EDGE Computing","authors":"Kamaledin Abodayeh, A. Raza, Muhammad Rafiq, Muhammad Shoaib Arif, Muhammad Naveed, Zunir Zeb, Syed Zaheer Abbas, K. Shahzadi, S. Sarwar, Qasim Naveed, Badar Ul Zaman, Muhammad Mohsin","doi":"10.32604/cmc.2022.018708","DOIUrl":"https://doi.org/10.32604/cmc.2022.018708","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"46 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79254994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Blockchain Based Secured Load Balanced Task Scheduling Approach for Fitness Service 基于区块链的健身服务安全负载均衡任务调度方法
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.019534
Muhammad Ibrahim, Faisal Jamil, Yunjung Lee, Dohyeun Kim
: In recent times, the evolution of blockchain technology has got huge attention from the research community due to its versatile applications and unique security features. The IoT has shown wide adoption in various applications including smart cities, healthcare, trade, business, etc. Among these applications, fitness applications have been widely considered for smart fitness systems. The users of the fitness system are increasing at a high rate thus the gym providers are constantly extending the fitness facilities. Thus, scheduling such a huge number of requests for fitness exercise is a big challenge. Secondly, the user fitness data is critical thus securing the user fitness data from unauthorized access is also challenging. To overcome these issues, this work proposed a blockchain-based load-balanced task scheduling approach. A thorough analysis has been performed to investigate the applications of IoT in the fitness industry and various scheduling approaches. The proposed scheduling approach aims to schedule the requests of the fitness users in a load-balanced way that maximize the acceptance rate of the users’ requests and improve resource utilization. The performance of the proposed task scheduling approach is compared with the state-of-the-art approaches concerning the average resource utilization and task rejection ratio. The obtained results confirm the efficiency of the proposed scheduling approach. For investigating the performance of the blockchain, various experiments are performed using the Hyperledger Caliper concerning latency, throughput, resource utilization. The Solo approach has shown an improvement of 32% and 26% in throughput as compared to Raft and Solo-Raft approaches respectively. The obtained results assert that the proposed architecture is applicable for resource-constrained IoT applications and is extensible for different IoT applications.
近年来,区块链技术的发展由于其广泛的应用和独特的安全特性而受到了研究界的广泛关注。物联网在智能城市、医疗保健、贸易、商业等各种应用中得到广泛采用。在这些应用中,健身应用已经被智能健身系统广泛考虑。健身系统的用户正在高速增长,因此健身房供应商不断扩大健身设施。因此,安排如此大量的健身锻炼要求是一个巨大的挑战。其次,用户健身数据至关重要,因此保护用户健身数据不受未经授权的访问也是一项挑战。为了克服这些问题,本工作提出了一种基于区块链的负载均衡任务调度方法。对物联网在健身行业和各种调度方法中的应用进行了深入的分析。提出的调度方法旨在以负载均衡的方式调度健身用户的请求,使用户的请求接受率最大化,提高资源利用率。在平均资源利用率和任务拒绝率方面,将所提出的任务调度方法与现有方法进行了比较。仿真结果验证了所提调度方法的有效性。为了研究区块链的性能,使用Hyperledger Caliper进行了各种关于延迟、吞吐量和资源利用率的实验。与Raft和Solo-Raft方法相比,Solo方法的吞吐量分别提高了32%和26%。得到的结果表明,所提出的架构适用于资源受限的物联网应用,并且可扩展到不同的物联网应用。
{"title":"Blockchain Based Secured Load Balanced Task Scheduling Approach for Fitness Service","authors":"Muhammad Ibrahim, Faisal Jamil, Yunjung Lee, Dohyeun Kim","doi":"10.32604/cmc.2022.019534","DOIUrl":"https://doi.org/10.32604/cmc.2022.019534","url":null,"abstract":": In recent times, the evolution of blockchain technology has got huge attention from the research community due to its versatile applications and unique security features. The IoT has shown wide adoption in various applications including smart cities, healthcare, trade, business, etc. Among these applications, fitness applications have been widely considered for smart fitness systems. The users of the fitness system are increasing at a high rate thus the gym providers are constantly extending the fitness facilities. Thus, scheduling such a huge number of requests for fitness exercise is a big challenge. Secondly, the user fitness data is critical thus securing the user fitness data from unauthorized access is also challenging. To overcome these issues, this work proposed a blockchain-based load-balanced task scheduling approach. A thorough analysis has been performed to investigate the applications of IoT in the fitness industry and various scheduling approaches. The proposed scheduling approach aims to schedule the requests of the fitness users in a load-balanced way that maximize the acceptance rate of the users’ requests and improve resource utilization. The performance of the proposed task scheduling approach is compared with the state-of-the-art approaches concerning the average resource utilization and task rejection ratio. The obtained results confirm the efficiency of the proposed scheduling approach. For investigating the performance of the blockchain, various experiments are performed using the Hyperledger Caliper concerning latency, throughput, resource utilization. The Solo approach has shown an improvement of 32% and 26% in throughput as compared to Raft and Solo-Raft approaches respectively. The obtained results assert that the proposed architecture is applicable for resource-constrained IoT applications and is extensible for different IoT applications.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"231 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86690750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Unprecedented Smart Algorithm for Uninterrupted SDN Services During DDoS Attack 前所未有的DDoS攻击下SDN不间断服务智能算法
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.018505
M. R. Haque, S. C. Tan, Z. Yusoff, K. Nisar, R. Kaspin, Iram Haider, Sana Nisar, J. Rodrigues, B. S. Chowdhry, M. A. Uqaili, Satya Prasad Majumder, D. Rawat, Richard Etengu, R. Buyya
{"title":"Unprecedented Smart Algorithm for Uninterrupted SDN Services During DDoS Attack","authors":"M. R. Haque, S. C. Tan, Z. Yusoff, K. Nisar, R. Kaspin, Iram Haider, Sana Nisar, J. Rodrigues, B. S. Chowdhry, M. A. Uqaili, Satya Prasad Majumder, D. Rawat, Richard Etengu, R. Buyya","doi":"10.32604/cmc.2022.018505","DOIUrl":"https://doi.org/10.32604/cmc.2022.018505","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"61 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86990797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
IoT Devices Authentication Using Artificial Neural Network 使用人工神经网络的物联网设备认证
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.020624
Syed Shabih Hasan, Anwar Ghani, I. Din, Ahmad S. Almogren, Ayman Altameem
{"title":"IoT Devices Authentication Using Artificial Neural Network","authors":"Syed Shabih Hasan, Anwar Ghani, I. Din, Ahmad S. Almogren, Ayman Altameem","doi":"10.32604/cmc.2022.020624","DOIUrl":"https://doi.org/10.32604/cmc.2022.020624","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"9 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87052193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Cmc-computers Materials & Continua
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1