Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 7 de 7
Filtrar
Mais filtros








Base de dados
Intervalo de ano de publicação
1.
PeerJ Comput Sci ; 10: e1847, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38660173

RESUMO

DNA steganography is a technique for securely transmitting important data using DNA sequences. It involves encrypting and hiding messages within DNA sequences to prevent unauthorized access and decoding of sensitive information. Biometric systems, such as fingerprinting and iris scanning, are used for individual recognition. Since biometric information cannot be changed if compromised, it is essential to ensure its security. This research aims to develop a secure technique that combines steganography and cryptography to protect fingerprint images during communication while maintaining confidentiality. The technique converts fingerprint images into binary data, encrypts them, and embeds them into the DNA sequence. It utilizes the Feistel network encryption process, along with a mathematical function and an insertion technique for hiding the data. The proposed method offers a low probability of being cracked, a high number of hiding positions, and efficient execution times. Four randomly chosen keys are used for hiding and decoding, providing a large key space and enhanced key sensitivity. The technique undergoes evaluation using the NIST statistical test suite and is compared with other research papers. It demonstrates resilience against various attacks, including known-plaintext and chosen-plaintext attacks. To enhance security, random ambiguous bits are introduced at random locations in the fingerprint image, increasing noise. However, it is important to note that this technique is limited to hiding small images within DNA sequences and cannot handle video, audio, or large images.

2.
PeerJ Comput Sci ; 9: e1259, 2023.
Artigo em Inglês | MEDLINE | ID: mdl-37346697

RESUMO

In smart cities, the fast increase in automobiles has caused congestion, pollution, and disruptions in the transportation of commodities. Each year, there are more fatalities and cases of permanent impairment due to everyday road accidents. To control traffic congestion, provide secure data transmission also detecting accidents the IoT-based Traffic Management System is used. To identify, gather, and send data, autonomous cars, and intelligent gadgets are equipped with an IoT-based ITM system with a group of sensors. The transport system is being improved via machine learning. In this work, an Adaptive Traffic Management system (ATM) with an accident alert sound system (AALS) is used for managing traffic congestion and detecting the accident. For secure traffic data transmission Secure Early Traffic-Related EveNt Detection (SEE-TREND) is used. The design makes use of several scenarios to address every potential problem with the transportation system. The suggested ATM model continuously modifies the timing of traffic signals based on the volume of traffic and anticipated movements from neighboring junctions. By progressively allowing cars to pass green lights, it considerably reduces traveling time. It also relieves traffic congestion by creating a seamless transition. The results of the trial show that the suggested ATM system fared noticeably better than the traditional traffic-management method and will be a leader in transportation planning for smart-city-based transportation systems. The suggested ATM-ALTREND solution provides secure traffic data transmission that decreases traffic jams and vehicle wait times, lowers accident rates, and enhances the entire travel experience.

3.
PLoS One ; 17(10): e0274764, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-36191011

RESUMO

The recent era has witnessed exponential growth in the production of multimedia data which initiates exploration and expansion of certain domains that will have an overwhelming impact on human society in near future. One of the domains explored in this article is content-based image retrieval (CBIR), in which images are mostly encoded using hand-crafted approaches that employ different descriptors and their fusions. Although utilization of these approaches has yielded outstanding results, their performance in terms of a semantic gap, computational cost, and appropriate fusion based on problem domain is still debatable. In this article, a novel CBIR method is proposed which is based on the transfer learning-based visual geometry group (VGG-19) method, genetic algorithm (GA), and extreme learning machine (ELM) classifier. In the proposed method, instead of using hand-crafted features extraction approaches, features are extracted automatically using a transfer learning-based VGG-19 model to consider both local and global information of an image for robust image retrieval. As deep features are of high dimension, the proposed method reduces the computational expense by passing the extracted features through GA which returns a reduced set of optimal features. For image classification, an extreme learning machine classifier is incorporated which is much simpler in terms of parameter tuning and learning time as compared to other traditional classifiers. The performance of the proposed method is evaluated on five datasets which highlight the better performance in terms of evaluation metrics as compared with the state-of-the-art image retrieval methods. Its statistical analysis through a nonparametric Wilcoxon matched-pairs signed-rank test also exhibits significant performance.


Assuntos
Algoritmos , Semântica , Humanos , Aprendizado de Máquina
4.
PeerJ Comput Sci ; 7: e814, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35721670

RESUMO

In recent years, the advent of cloud computing has transformed the field of computing and information technology. It has been enabling customers to rent virtual resources and take advantage of various on-demand services with the lowest costs. Despite the advantages of cloud computing, it faces several threats; an example is a distributed denial of service (DDoS) attack, which is considered among the most serious. This article presents real-time monitoring and detection of DDoS attacks on the cloud using a machine learning approach. Naïve Bayes, K-nearest neighbor, decision tree, and random forest machine learning classifiers have been selected to build a predictive model named "Real-Time DDoS flood Attack Monitoring and Detection RT-AMD." The DDoS-2020 dataset was constructed with 70,020 records to evaluate RT-AMD's accuracy. The DDoS-2020 contains three protocols for network/transport-level, which are TCP, DNS, and ICMP. This article evaluates the proposed model by comparing its accuracy with related works. Our model has shown improvement in the results and reached real-time attack detection using incremental learning. The model achieved 99.38% accuracy for the random forest in real-time on the cloud environment and 99.39% on local testing. The RT-AMD was evaluated on the NSL-KDD dataset as well, in which it achieved 99.30% accuracy in real-time in a cloud environment.

5.
Sensors (Basel) ; 22(6)2022 Mar 10.
Artigo em Inglês | MEDLINE | ID: mdl-35336347

RESUMO

In the current era of smart homes and smart grids, complex technical systems that allow for the automation of domestic functions are rapidly growing and becoming more widely available. A wide range of technologies and software applications are now available for use in smart homes, and many of them are free to use. They allow for communication between home appliances and their users, as well as the automation, monitoring, and remote-control capabilities of home appliances themselves. Unfortunately, a lot of previous research ignored security issues involving the great attention to detail of the data in a transmission session within the devices in smart home architectures, which is why this study proposed smart grid secured transmission flags suitable for preventing every bit of data transmission in a smart home. Secure Message Queueing Transport Protocol (MQTT) in Internet of Things (IoT) Smart Homes protocols was utilized; an experimental testbed was designed with a prototype involving the process of a smart home system and the sequences of the data transmission. The evaluation of the proposed strategies has shown an improved bi-directional secure resource constraint strategy for the smart home within data packet transmission at 70 to 80 mbps over secure MQTT. A number of concerns, including technological barriers, difficulties, challenges, and future trends, as well as the role of users, have been presented in this study, among others.


Assuntos
Automação , Tecnologia , Software
6.
PLoS One ; 14(8): e0220129, 2019.
Artigo em Inglês | MEDLINE | ID: mdl-31369585

RESUMO

One of the main concerns for online shopping websites is to provide efficient and customized recommendations to a very large number of users based on their preferences. Collaborative filtering (CF) is the most famous type of recommender system method to provide personalized recommendations to users. CF generates recommendations by identifying clusters of similar users or items from the user-item rating matrix. This cluster of similar users or items is generally identified by using some similarity measurement method. Among numerous proposed similarity measure methods by researchers, the Pearson correlation coefficient (PCC) is a commonly used similarity measure method for CF-based recommender systems. The standard PCC suffers some inherent limitations and ignores user rating preference behavior (RPB). Typically, users have different RPB, where some users may give the same rating to various items without liking the items and some users may tend to give average rating albeit liking the items. Traditional similarity measure methods (including PCC) do not consider this rating pattern of users. In this article, we present a novel similarity measure method to consider user RPB while calculating similarity among users. The proposed similarity measure method state user RPB as a function of user average rating value, and variance or standard deviation. The user RPB is then combined with an improved model of standard PCC to form an improved similarity measure method for CF-based recommender systems. The proposed similarity measure is named as improved PCC weighted with RPB (IPWR). The qualitative and quantitative analysis of the IPWR similarity measure method is performed using five state-of-the-art datasets (i.e. Epinions, MovieLens-100K, MovieLens-1M, CiaoDVD, and MovieTweetings). The IPWR similarity measure method performs better than state-of-the-art similarity measure methods in terms of mean absolute error (MAE), root mean square error (RMSE), precision, recall, and F-measure.


Assuntos
Algoritmos , Comportamento de Escolha , Comércio/normas , Comportamento do Consumidor/estatística & dados numéricos , Comportamento Cooperativo , Internet/normas , Modelos Estatísticos , Comércio/estatística & dados numéricos , Bases de Dados Factuais , Humanos
7.
Biomed Res Int ; 2019: 7151475, 2019.
Artigo em Inglês | MEDLINE | ID: mdl-31032361

RESUMO

Dementia directly influences the quality of life of a person suffering from this chronic illness. The caregivers or carers of dementia people provide critical support to them but are subject to negative health outcomes because of burden and stress. The intervention of mobile health (mHealth) has become a fast-growing assistive technology (AT) in therapeutic treatment of individuals with chronic illness. The purpose of this comprehensive study is to identify, appraise, and synthesize the existing evidence on the use of mHealth applications (apps) as a healthcare resource for people with dementia and their caregivers. A review of both peer-reviewed and full-text literature was undertaken across five (05) electronic databases for checking the articles published during the last five years (between 2014 and 2018). Out of 6195 searches yielded articles, 17 were quantified according to inclusion and exclusion criteria. The included studies distinguish between five categories, viz., (1) cognitive training and daily living, (2) screening, (3) health and safety monitoring, (4) leisure and socialization, and (5) navigation. Furthermore, two most popular commercial app stores, i.e., Google Play Store and Apple App Store, were searched for finding mHealth based dementia apps for PwD and their caregivers. Initial search generated 356 apps with thirty-five (35) meeting the defined inclusion and exclusion criteria. After shortlisting of mobile applications, it is observed that these existing apps generally addressed different dementia specific aspects overlying with the identified categories in research articles. The comprehensive study concluded that mobile health apps appear as feasible AT intervention for PwD and their carers irrespective of limited available research, but these apps have potential to provide different resources and strategies to help this community.


Assuntos
Demência/terapia , Aplicativos Móveis , Telemedicina , Cuidadores , Atenção à Saúde , Demência/epidemiologia , Instalações de Saúde , Humanos , Qualidade de Vida
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA