Pub Date : 2024-06-20DOI: 10.3103/s8756699024700031
V. P. Drachev
Abstract
Resonance properties of the local field of metal fractal clusters are considered. The effects of surface-enhanced Raman scattering, photoluminescence enhancement, and nonlinear responses are studied. It is demonstrated that the Rautian’s model based on the quantum theory of nonlinearity offers a more accurate description than previous theories. Among the scientific results of the theory proposed by Rautian and his team, the following can be highlighted: metal nanoparticles with a diameter of (<)30 nm exhibit discrete energy levels, in contrast to semiconductor quantum dots, the Rautian’s theory provides an accurate description of the linear part of the dielectric function corresponding to the classical Drude model; the cubic nonlinear susceptibility according to the Rautian’s model agrees with experiment, indicating a contribution of the conduction electrons.
{"title":"Quantum Theory of Nonlinear Plasmonics by S. G. Rautian","authors":"V. P. Drachev","doi":"10.3103/s8756699024700031","DOIUrl":"https://doi.org/10.3103/s8756699024700031","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>Resonance properties of the local field of metal fractal clusters are considered. The effects of surface-enhanced Raman scattering, photoluminescence enhancement, and nonlinear responses are studied. It is demonstrated that the Rautian’s model based on the quantum theory of nonlinearity offers a more accurate description than previous theories. Among the scientific results of the theory proposed by Rautian and his team, the following can be highlighted: metal nanoparticles with a diameter of <span>(<)</span>30 nm exhibit discrete energy levels, in contrast to semiconductor quantum dots, the Rautian’s theory provides an accurate description of the linear part of the dielectric function corresponding to the classical Drude model; the cubic nonlinear susceptibility according to the Rautian’s model agrees with experiment, indicating a contribution of the conduction electrons.</p>","PeriodicalId":44919,"journal":{"name":"Optoelectronics Instrumentation and Data Processing","volume":"300 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141511461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-20DOI: 10.3103/s8756699024700080
I. V. Zhurbin, A. S. Shaura, A. G. Zlobina, A. I. Bazhenova
Abstract
A comprehensive analysis of multispectral data obtained in different growing periods makes it possible to reconstruct the current state of the anthropogenically transformed natural environment and identify areas of historical nature management. Ambiguous displaying of secondary succession of forests requires comparison of changes in the spectral features of vegetation and features of the landscape objects texture on multiseason images. The methodological basis of such studies is an algorithm of multispectral data processing adapted to apply Haralick’s textural features at the feature extraction stage. Joint segmentation of multiseasonal multispectral images smooths out local and less significant changes in the texture of landscape objects, which makes it possible to more clearly demonstrate the general trends in the distribution of vegetation. The survey area included a fragment of the ironworks district of the Pudemsky ironworks, where timber and firewood were cut down for production needs in the first half of the 19th century. The segmented image demonstrates the fundamental differences between the vegetation cover of the western and eastern parts of the survey area (the site of historical cutting areas and the part of the ironworks district that was not subject to intense anthropogenic impact).
{"title":"Detection of Areas of the Anthropogenically Transformed Natural Environment Based on a Comprehensive Analysis of Multiseasonal Multispectral Survey","authors":"I. V. Zhurbin, A. S. Shaura, A. G. Zlobina, A. I. Bazhenova","doi":"10.3103/s8756699024700080","DOIUrl":"https://doi.org/10.3103/s8756699024700080","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>A comprehensive analysis of multispectral data obtained in different growing periods makes it possible to reconstruct the current state of the anthropogenically transformed natural environment and identify areas of historical nature management. Ambiguous displaying of secondary succession of forests requires comparison of changes in the spectral features of vegetation and features of the landscape objects texture on multiseason images. The methodological basis of such studies is an algorithm of multispectral data processing adapted to apply Haralick’s textural features at the feature extraction stage. Joint segmentation of multiseasonal multispectral images smooths out local and less significant changes in the texture of landscape objects, which makes it possible to more clearly demonstrate the general trends in the distribution of vegetation. The survey area included a fragment of the ironworks district of the Pudemsky ironworks, where timber and firewood were cut down for production needs in the first half of the 19th century. The segmented image demonstrates the fundamental differences between the vegetation cover of the western and eastern parts of the survey area (the site of historical cutting areas and the part of the ironworks district that was not subject to intense anthropogenic impact).</p>","PeriodicalId":44919,"journal":{"name":"Optoelectronics Instrumentation and Data Processing","volume":"207 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141511433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-20DOI: 10.3103/s8756699024700134
V. V. Kapustin, A. K. Movchan, A. A. Tislenko
Abstract
The accuracy of constructing maps of spatial depths is evaluated using an active-pulse television measuring system based on experimental data. Two multiarea methods of constructing depth maps are described. The absolute error and root-mean-square error of range measurement for depth maps constructed from real and averaged frames, which were obtained using the described multiarea methods during experimental studies, are estimated. Approximating functions of linear and polynomial types calculated using the least squares method are taken as measurement functions, from which the depth maps were constructed.
{"title":"Experimental Evaluation of the Accuracy of Range Measurement with Multiarea Methods Using an Active-Pulse Television Measuring System","authors":"V. V. Kapustin, A. K. Movchan, A. A. Tislenko","doi":"10.3103/s8756699024700134","DOIUrl":"https://doi.org/10.3103/s8756699024700134","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>The accuracy of constructing maps of spatial depths is evaluated using an active-pulse television measuring system based on experimental data. Two multiarea methods of constructing depth maps are described. The absolute error and root-mean-square error of range measurement for depth maps constructed from real and averaged frames, which were obtained using the described multiarea methods during experimental studies, are estimated. Approximating functions of linear and polynomial types calculated using the least squares method are taken as measurement functions, from which the depth maps were constructed.</p>","PeriodicalId":44919,"journal":{"name":"Optoelectronics Instrumentation and Data Processing","volume":"38 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141511463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-20DOI: 10.3103/s875669902470016x
S. Karthikeyan, T. Poongodi
Abstract
Internet of Things (IoT) provides a vital atmosphere for a wide number of exciting applications in sustainable digital cities and societies, including additive factories, smart transportation, and smart industry. However, in a smart city environment, security measures may not be effective during data transmission. Data manipulation may result from the interchange of data between various devices, and transmission of unprocessed data may be particularly vulnerable to such manipulation attempts. In order to reduce data tampering, it is required to compress and encrypt the raw data and transmit it over the network to protect it from cyberattacks. In this research, the data is compressed by the LZW lossless compression algorithm and subsequently encrypted using DNA cryptography. Initially, the raw data are collected through various IoT devices. The raw data are compressed using LZW lossless compression algorithm. Compression is advantageous since it minimizes the amount of storage and transmission resources required. Through data compression, a smaller amount of bits are required for representing data. After compressing the data, the compressed data are encrypted using a DNA cryptography algorithm. DNA cryptography is used to encrypt compressed data for secure data transmission. After encryption, the encrypted data are secured within the cloud. The simulation assessment displays the suggested approach attains a 90(%) compression and encryption rate. This illustrates that the suggested approach performs better than current approaches already in use. Based on this proposed method, the transaction is executed securely to provide a secure smart city environment.
摘要物联网(IoT)为可持续发展的数字城市和社会中大量令人兴奋的应用提供了重要的氛围,其中包括快速成型工厂、智能交通和智能工业。然而,在智能城市环境中,数据传输过程中的安全措施可能并不有效。各种设备之间的数据交换可能会导致数据篡改,而未经处理的数据传输尤其容易受到此类篡改企图的影响。为了减少数据篡改,需要对原始数据进行压缩和加密,并通过网络传输,以防止网络攻击。在这项研究中,数据采用 LZW 无损压缩算法进行压缩,然后使用 DNA 密码学进行加密。首先,通过各种物联网设备收集原始数据。原始数据使用 LZW 无损压缩算法进行压缩。压缩的优势在于可以最大限度地减少所需的存储和传输资源。通过数据压缩,表示数据所需的比特数量更少。压缩数据后,使用 DNA 密码学算法对压缩数据进行加密。DNA 密码学用于加密压缩数据,以确保数据传输的安全性。加密后,加密数据在云中得到保护。模拟评估显示,所建议的方法达到了90(%)的压缩和加密率。这说明所建议的方法比目前已在使用的方法性能更好。基于这种建议的方法,交易可以安全地执行,从而提供一个安全的智慧城市环境。
{"title":"Secure Data Transmission in Smart Cities Using DNA Cryptography with LZW Compression Algorithm","authors":"S. Karthikeyan, T. Poongodi","doi":"10.3103/s875669902470016x","DOIUrl":"https://doi.org/10.3103/s875669902470016x","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>Internet of Things (IoT) provides a vital atmosphere for a wide number of exciting applications in sustainable digital cities and societies, including additive factories, smart transportation, and smart industry. However, in a smart city environment, security measures may not be effective during data transmission. Data manipulation may result from the interchange of data between various devices, and transmission of unprocessed data may be particularly vulnerable to such manipulation attempts. In order to reduce data tampering, it is required to compress and encrypt the raw data and transmit it over the network to protect it from cyberattacks. In this research, the data is compressed by the LZW lossless compression algorithm and subsequently encrypted using DNA cryptography. Initially, the raw data are collected through various IoT devices. The raw data are compressed using LZW lossless compression algorithm. Compression is advantageous since it minimizes the amount of storage and transmission resources required. Through data compression, a smaller amount of bits are required for representing data. After compressing the data, the compressed data are encrypted using a DNA cryptography algorithm. DNA cryptography is used to encrypt compressed data for secure data transmission. After encryption, the encrypted data are secured within the cloud. The simulation assessment displays the suggested approach attains a 90<span>(%)</span> compression and encryption rate. This illustrates that the suggested approach performs better than current approaches already in use. Based on this proposed method, the transaction is executed securely to provide a secure smart city environment.</p>","PeriodicalId":44919,"journal":{"name":"Optoelectronics Instrumentation and Data Processing","volume":"152 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141511464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-20DOI: 10.3103/s8756699024700043
I. I. Beterov
Abstract
The paper provides a brief review of modern achievements in quantum information science with problems and prospects in the development of quantum computing. The elementary mathematical model of quantum computing and the concept of quantum supremacy are discussed. The application of ultracold atoms for the implementation of quantum processors is considered.
{"title":"Progress and Prospects in the Field of Quantum Computing","authors":"I. I. Beterov","doi":"10.3103/s8756699024700043","DOIUrl":"https://doi.org/10.3103/s8756699024700043","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>The paper provides a brief review of modern achievements in quantum information science with problems and prospects in the development of quantum computing. The elementary mathematical model of quantum computing and the concept of quantum supremacy are discussed. The application of ultracold atoms for the implementation of quantum processors is considered.</p>","PeriodicalId":44919,"journal":{"name":"Optoelectronics Instrumentation and Data Processing","volume":"2 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141511430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-20DOI: 10.3103/s8756699024700055
A. S. Pleshkov, A. V. Kolyako, D. B. Tret’yakov, I. I. Ryabtsev, I. G. Neizvestnyi
Abstract
The operation of our atmospheric quantum cryptography system using the BB84 protocol and polarization coding is experimentally studied. The distribution rate of the sifted quantum key and the quantum bit error rate in the key remained constant for 1 hour and were (7558pm 83) bit s({}^{-1}) and (5.1pm 0.84%), respectively, at the distance of 20 m between the transmitter and receiver. The minimum possible transmittance of a quantum channel, ensuring the security of a quantum key, is calculated for the given parameters of the system
{"title":"Study of Long-Term Stability of Free-Space Quantum Key Distribution at a Distance of 20 m in a Polarization Coding Scheme","authors":"A. S. Pleshkov, A. V. Kolyako, D. B. Tret’yakov, I. I. Ryabtsev, I. G. Neizvestnyi","doi":"10.3103/s8756699024700055","DOIUrl":"https://doi.org/10.3103/s8756699024700055","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>The operation of our atmospheric quantum cryptography system using the BB84 protocol and polarization coding is experimentally studied. The distribution rate of the sifted quantum key and the quantum bit error rate in the key remained constant for 1 hour and were <span>(7558pm 83)</span> bit s<span>({}^{-1})</span> and <span>(5.1pm 0.84%)</span>, respectively, at the distance of 20 m between the transmitter and receiver. The minimum possible transmittance of a quantum channel, ensuring the security of a quantum key, is calculated for the given parameters of the system</p>","PeriodicalId":44919,"journal":{"name":"Optoelectronics Instrumentation and Data Processing","volume":"8 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141511474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-20DOI: 10.3103/s8756699024700079
A. A. Glushak, V. M. Aulchenko, V. V. Zhulanov, L. I. Shekhtman
Abstract
A multichannel application specific integrated circuit (ASIC) for registration and processing of signals from microstrip sensors in synchrotron radiation coordinate detectors developed at the BINP SB RAS to equip the SKIF experimental stations is presented. The ASIC contains 64 independent photon registration channels with 4 energy separation thresholds. The range of registered energies is from 3 to 60 keV. The structure and main parameters of the registration channel electronics for direct photon counting are described in detail.
{"title":"Specialized Integrated Circuit for Coordinate Counting Detectors","authors":"A. A. Glushak, V. M. Aulchenko, V. V. Zhulanov, L. I. Shekhtman","doi":"10.3103/s8756699024700079","DOIUrl":"https://doi.org/10.3103/s8756699024700079","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>A multichannel application specific integrated circuit (ASIC) for registration and processing of signals from microstrip sensors in synchrotron radiation coordinate detectors developed at the BINP SB RAS to equip the SKIF experimental stations is presented. The ASIC contains 64 independent photon registration channels with 4 energy separation thresholds. The range of registered energies is from 3 to 60 keV. The structure and main parameters of the registration channel electronics for direct photon counting are described in detail.</p>","PeriodicalId":44919,"journal":{"name":"Optoelectronics Instrumentation and Data Processing","volume":"20 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141511432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-20DOI: 10.3103/s8756699024700109
S. N. Tereshchenko, A. L. Osipov
Abstract
An approach to applying machine learning methods for automatic detection of deer individuals in images has been studied. Neural network technology has been used to accurately count the number of deer from photographs. Deep learning methods for convolutional neural networks (ResNet 50, DenseNet, CenterNet, Inception V3, and Xception) were used in conjunction with the transfer learning technique. Based on the faster R-CNN Resnet50 network, a neural network was trained to identify deer individuals from graphic images with an accuracy of 0.91 on a sample using the F1-score metric with a threshold value of 0.6.
{"title":"Detection of Deer in Images by Computer Vision Methods","authors":"S. N. Tereshchenko, A. L. Osipov","doi":"10.3103/s8756699024700109","DOIUrl":"https://doi.org/10.3103/s8756699024700109","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>An approach to applying machine learning methods for automatic detection of deer individuals in images has been studied. Neural network technology has been used to accurately count the number of deer from photographs. Deep learning methods for convolutional neural networks (ResNet 50, DenseNet, CenterNet, Inception V3, and Xception) were used in conjunction with the transfer learning technique. Based on the faster R-CNN Resnet50 network, a neural network was trained to identify deer individuals from graphic images with an accuracy of 0.91 on a sample using the F1-score metric with a threshold value of 0.6.</p>","PeriodicalId":44919,"journal":{"name":"Optoelectronics Instrumentation and Data Processing","volume":"8 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141511462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-20DOI: 10.3103/s8756699024700110
A. S. Zakhlebin, M. I. Kuryachii, V. V. Kapustin, A. V. Kamenskii, A. K. Movchan
Abstract
A technique for restoring images from an unmanned aerial vehicle (UAV) distorted by blur is considered. Images are reconstructed using the point spread function (PSF), calculated based on a priori information about the basic flight and photographing parameters, as well as the physical properties of the optical system used. The images are processed using well-known methods such as Wiener filtering, Richardson–Lucy deconvolution, Tikhonov filtering, and blind deconvolution.
{"title":"Increasing the Accuracy of Constructing Terrain Orthophotomaps from Blur-Distorted Images from an Unmanned Aerial Vehicle","authors":"A. S. Zakhlebin, M. I. Kuryachii, V. V. Kapustin, A. V. Kamenskii, A. K. Movchan","doi":"10.3103/s8756699024700110","DOIUrl":"https://doi.org/10.3103/s8756699024700110","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>A technique for restoring images from an unmanned aerial vehicle (UAV) distorted by blur is considered. Images are reconstructed using the point spread function (PSF), calculated based on a priori information about the basic flight and photographing parameters, as well as the physical properties of the optical system used. The images are processed using well-known methods such as Wiener filtering, Richardson–Lucy deconvolution, Tikhonov filtering, and blind deconvolution.</p>","PeriodicalId":44919,"journal":{"name":"Optoelectronics Instrumentation and Data Processing","volume":"180 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141511458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-13DOI: 10.3103/s8756699024700353
Suthan Renuka, Chirathally Dyamanna Guruprakash
Abstract
Formal, machine-readable theories, taxonomy definitions, and connections to human-readable language make up ontology, the formal specification of conceptualization. In addition to methodical definitions, it offers axioms that guide the interpretation of words. Many other sorts of relationships, both structural and nonstructural, including inheritance, generalization, aggregation, and instantiation, are supported by an ontology. It is necessary to handle a number of security issues, including identity management, cryptography, trust, application security, authentication, access control, and privacy. Access control is the process of maintaining resource privacy, project-based group membership, and role specificity in accordance with the goals of the ontology under the proposal. This research examines and contrasts three different ontology-based access control strategies: attribute-based access control (ABAC), context-based access control (CBAC), and role-based access control (RBAC). I-RBAC, BRBAC, SA-ODC and RBACSE are the RBAC approaches used for comparison. For analysing the CBAC procedure, ACAIA, CAHMS, CASPSA and FBCAAC algorithms are used. Finally for evaluating the ABAC method, OABAC, FABAC, AWS-IoTAC and ABAC-PHR algorithms are employed. CASPSA, CAHMS, ACAIA and FBCAAC has a data retrieval time of 1.8, 2.4, 6.1, and 9.4 s. IRBAC, BRBAC, SA-ODC and RBACSE has a turn around time of 66.3, 79.1, 150.5, and 177.2 s respectively. According to the experimental results, attribute based access control systems perform better for securing healthcare data.
{"title":"Comparative Analysis of Ontology Based Data Access Control and Security Enhancement in Healthcare Application","authors":"Suthan Renuka, Chirathally Dyamanna Guruprakash","doi":"10.3103/s8756699024700353","DOIUrl":"https://doi.org/10.3103/s8756699024700353","url":null,"abstract":"<h3 data-test=\"abstract-sub-heading\">Abstract</h3><p>Formal, machine-readable theories, taxonomy definitions, and connections to human-readable language make up ontology, the formal specification of conceptualization. In addition to methodical definitions, it offers axioms that guide the interpretation of words. Many other sorts of relationships, both structural and nonstructural, including inheritance, generalization, aggregation, and instantiation, are supported by an ontology. It is necessary to handle a number of security issues, including identity management, cryptography, trust, application security, authentication, access control, and privacy. Access control is the process of maintaining resource privacy, project-based group membership, and role specificity in accordance with the goals of the ontology under the proposal. This research examines and contrasts three different ontology-based access control strategies: attribute-based access control (ABAC), context-based access control (CBAC), and role-based access control (RBAC). I-RBAC, BRBAC, SA-ODC and RBACSE are the RBAC approaches used for comparison. For analysing the CBAC procedure, ACAIA, CAHMS, CASPSA and FBCAAC algorithms are used. Finally for evaluating the ABAC method, OABAC, FABAC, AWS-IoTAC and ABAC-PHR algorithms are employed. CASPSA, CAHMS, ACAIA and FBCAAC has a data retrieval time of 1.8, 2.4, 6.1, and 9.4 s. IRBAC, BRBAC, SA-ODC and RBACSE has a turn around time of 66.3, 79.1, 150.5, and 177.2 s respectively. According to the experimental results, attribute based access control systems perform better for securing healthcare data.</p>","PeriodicalId":44919,"journal":{"name":"Optoelectronics Instrumentation and Data Processing","volume":"20 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141511465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}