26 research outputs found

    RLIS: resource limited improved security beyond fifth generation networks using deep learning algorithms.

    Get PDF
    This study explores the feasibility of allocating finite resources beyond fifth generation networks for extended reality applications through the implementation of enhanced security measures via offloading analysis (RLIS). The quantification of resources is facilitated through the utilization of parameters, namely energy, capacity, and power, which are equipped with proximity constraints. These constraints are then integrated with activation functions in both multilayer perceptron and long short term memory models. Furthermore, the system model has been developed using vision-based computing, which involves managing data queues in terms of waiting periods to minimize congestion for data transmission with limited resources. The major significance of the proposed method is to utilize allocated spectrums for future generation networks by allocating necessary resources and therefore high usage of resources by all users can be avoided. In addition the advantage of the proposed method is secure the networks that operate beyond 5G where more number of users will try to share the allocated resources that needs to be provided with high security conditions

    An archetypal determination of mobile cloud computing for emergency applications using decision tree algorithm.

    Get PDF
    Numerous users are experiencing unsafe communications due to the growth of big network mediums, where no node communication is detected in emergency scenarios. Many people find it difficult to communicate in emergency situations as a result of such communications. In this paper, a mobile cloud computing procedure is implemented in the suggested technique in order to prevent such circumstances, and to make the data transmission process more effective. An analytical framework that addresses five significant minimization and maximization objective functions is used to develop the projected model. Additionally, all mobile cloud computing nodes are designed with strong security, ensuring that all the resources are allocated appropriately. In order to isolate all the active functions, the analytical framework is coupled with a machine learning method known as Decision Tree. The suggested approach benefits society because all cloud nodes can extend their assistance in times of need at an affordable operating and maintenance cost. The efficacy of the proposed approach is tested in five scenarios, and the results of each scenario show that it is significantly more effective than current case studies on an average of 86%

    Optimal design of solar/wind/battery and EV fed UPQC for power quality and power flow management using enhanced most valuable player algorithm

    Get PDF
    The behavior and performance of distribution systems have been significantly impacted by the presence of solar and wind based renewable energy sources (RES) and battery energy storage systems (BESS) based electric vehicle (EV) charging stations. This work designs the Unified Power Quality Conditioner (UPQC) through optimal selection of the active filter and PID Controller (PIDC) parameters using the enhanced most valuable player algorithm (EMVPA). The prime objective is to effectively address the power quality (PQ) challenges such as voltage distortions and total harmonic distortions (THD) of a distribution system integrated with UPQC, solar, wind, BESS and EV (U-SWBEV). The study also aims to manage the power flow between the RES, grid, EV, BESS, and consumer loads by artificial neuro-fuzzy interface system (ANFIS). Besides, this integration helps to have a reliable supply of electricity, efficient utilization of generated power, and effective fulfillment of the demand. The proposed scheme results in a THD of 4.5%, 2.26%, 4.09% and 3.98% for selected four distinct case studies with power factor to almost unity with an appropriate power sharing. Therefore, the study and results indicate that the ANFIS based power flow management with optimal design of UPQC addresses the PQ challenges and achieves the appropriate and effective sharing of power

    Biomedical Signals for Healthcare Using Hadoop Infrastructure with Artificial Intelligence and Fuzzy Logic Interpretation

    No full text
    In all developing countries, the application of biomedical signals has been growing, and there is a potential interest to apply it to healthcare management systems. However, with the existing infrastructure, the system will not provide high-end support for the transfer of signals by using a communication medium, as biomedical signals need to be classified at appropriate stages. Therefore, this article addresses the issues of physical infrastructure, using Hadoop-based systems where a four-layer model is created. The four-layer model is integrated with Fuzzy Interface System Algorithm (FISA) with low robustness, and data transfers in these layers are carried out with reference health data that are collected at various treatment centers. The performance of this new flanged system model aims to minimize the loss functionalities that are present in biomedical signals, and an activation function is introduced at the middle stages. The effectiveness of the proposed model is simulated by using MATLAB, using a biomedical signal processing toolbox, where the performance of FISA proves to be better in terms of signal strength, distance, and cost. As a comparative outcome, the proposed method overlooks the conventional methods for an average percentage of 78% in real-time conditions

    A quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems

    No full text
    Abstract Many researchers have been interested in healthcare cybersecurity for a long time since it can improve the security of patient and health record data. As a result, a lot of research is done in the field of cybersecurity that focuses on the safe exchange of health data between patients and the medical setting. It still has issues with high computational complexity, increased time consumption, and cost complexity, all of which have an impact on the effectiveness and performance of the complete security system. Hence this work proposes a technique called Consultative Transaction Key Generation and Management (CTKGM) to enable secure data sharing in healthcare systems. It generates a unique key pair based on random values with multiplicative operations and time stamps. The patient data is then safely stored in discrete blocks of hash values using the blockchain methodology. The Quantum Trust Reconciliation Agreement Model (QTRAM), which calculates the trust score based on the feedback data, ensures reliable and secure data transfer. By allowing safe communication between patients and the healthcare system based on feedback analysis and trust value, the proposed framework makes a novel contribution to the field. Additionally, during communication, the Tuna Swarm Optimization (TSO) method is employed to validate nonce verification messages. Nonce message verification is a part of QTRAM that helps verify the users during transmission. The effectiveness of the suggested scheme has been demonstrated by comparing the obtained findings with other current state-of-the-art models after a variety of evaluation metrics have been analyzed to test the performance of this security model

    Resistance–capacitance optimizer: a physics-inspired population-based algorithm for numerical and industrial engineering computation problems

    No full text
    Abstract The primary objective of this study is to delve into the application and validation of the Resistance Capacitance Optimization Algorithm (RCOA)—a new, physics-inspired metaheuristic optimization algorithm. The RCOA, intriguingly inspired by the time response of a resistance–capacitance circuit to a sudden voltage fluctuation, has been earmarked for solving complex numerical and engineering design optimization problems. Uniquely, the RCOA operates without any control/tunable parameters. In the first phase of this study, we evaluated the RCOA's credibility and functionality by deploying it on a set of 23 benchmark test functions. This was followed by thoroughly examining its application in eight distinct constrained engineering design optimization scenarios. This methodical approach was undertaken to dissect and understand the algorithm's exploration and exploitation phases, leveraging standard benchmark functions as the yardstick. The principal findings underline the significant effectiveness of the RCOA, especially when contrasted against various state-of-the-art algorithms in the field. Beyond its apparent superiority, the RCOA was put through rigorous statistical non-parametric testing, further endorsing its reliability as an innovative tool for handling complex engineering design problems. The conclusion of this research underscores the RCOA's strong performance in terms of reliability and precision, particularly in tackling constrained engineering design optimization challenges. This statement, derived from the systematic study, strengthens RCOA's position as a potentially transformative tool in the mathematical optimization landscape. It also paves the way for further exploration and adaptation of physics-inspired algorithms in the broader realm of optimization problems

    A comparative recognition research on excretory organism in medical applications using artificial neural networks

    Get PDF
    Purpose: In the contemporary era, a significant number of individuals encounter various health issues, including digestive system ailments, even during their advanced years. The major purpose of this study is based on certain observations that are made in internal digestive systems in order to prevent severe cause that usually occurs in elderly people. Approach: To solve the purpose of the proposed method the proposed system is introduced with advanced features and parametric monitoring system that are based on wireless sensor setups. The parametric monitoring system is integrated with neural network where certain control actions are taken to prevent gastrointestinal activities at reduced data loss. Results: The outcome of the combined process is examined based on four different cases that is designed based on analytical model where control parameters and weight establishments are also determined. As the internal digestive system is monitored the data loss that is present with wireless sensor network must be reduced and proposed approach prevents such data loss with an optimized value of 1.39%. Conclusion: Parametric cases were conducted to evaluate the efficacy of neural networks. The findings indicate a significantly higher effectiveness rate of approximately 68% when compared to the control cases

    A Proficient ZESO-DRKFC Model for Smart Grid SCADA Security

    No full text
    Smart grids are complex cyber-physical systems that incorporate smart devices’ communication capabilities into the grid to enable remote management and the control of power systems. However, this integration reveals numerous SCADA system flaws, which could compromise security goals and pose severe cyber threats to the smart grid. In conventional works, various attack detection methodologies are developed to strengthen the security of smart grid SCADA systems. However, they have several issues with complexity, slow training speed, time consumption, and inaccurate prediction outcomes. The purpose of this work is to develop a novel security framework for protecting smart grid SCADA systems against harmful network vulnerabilities or intrusions. Therefore, the proposed work is motivated to develop an intelligent meta-heuristic-based Artificial Intelligence (AI) mechanism for securing IoT-SCADA systems. The proposed framework includes the stages of dataset normalization, Zaire Ebola Search Optimization (ZESO), and Deep Random Kernel Forest Classification (DRKFC). First, the original benchmarking datasets are normalized based on content characterization and category transformation during preprocessing. After that, the ZESO algorithm is deployed to select the most relevant features for increasing the training speed and accuracy of attack detection. Moreover, the DRKFC technique accurately categorizes the normal and attacking data flows based on the optimized feature set. During the evaluation, the performance of the proposed ZESO-DRKFC method is validated and compared in terms of accuracy, detection rate, f1-score, and false acceptance rate. According to the results, it is observed that the ZESO-DRKFC mechanism outperforms other techniques with high accuracy (99%) by precisely spotting intrusions in the smart grid systems

    TasLA: An innovative Tasmanian and Lichtenberg optimized attention deep convolution based data fusion model for IoMT smart healthcare

    No full text
    The Internet of Medical Things (IoMT) bolstered the smart health care industry in present times by enabling quicker patient monitoring and disease diagnosis. However, there have been problems that need to be resolved using Artificial Intelligence (AI) methods. The major goal of this endeavor is to develop an IoMT-based data fusion system for multi-sensor smart healthcare network. To do this, a new optimization and deep learning approaches are being used in this work. In this research work, a unique smart healthcare framework, Tasmanian and Lichtenberg Optimized Attention Deep Convolution (TasLA) is developed for IoMT systems. This system uses an intelligent data fusion algorithms for collecting of medical data and the diagnosis of disorders. Here, data pretreatment and normalization processes are carried out in order to provide a dataset with balanced attribute information. The qualities or characteristics that will aid in classification are then selected using the most modern Tasmanian Devil Optimization (TDO) approach. The Attention Deep Convolution Classification (ADCC) algorithm is also used to classify the medical condition, thereby improving classification precision and reducing false predictions. To optimally compute the loss function during prediction, the Lichtenberg Optimization (LO) technique is employed to enhance classification performance. The effectiveness and results of the proposed TasLA model are validated and contrasted using various benchmark datasets such as Hungarian, Cleveland, Echocardiogram, and Z-Alizadeh
    corecore