3 research outputs found

    A novel nomadic people optimizer-based energy-efficient routing for WBAN

    Get PDF
    In response to user demand for wearable devices, several WBAN deployments now call for effective communication processes for remote data monitoring in real time. Using sensor networks, intelligent wearable devices have exchanged data that has benefited in the evaluation of possible security hazards. If smart wearables in sensor networks use an excessive amount of power during data transmission, both network lifetime and data transmission performance may suffer. Despite the network's effective data transmission, smart wearable patches include data that has been combined from several sources utilizing common aggregators. Data analysis requires careful network lifespan control throughout the aggregation phase. By using the Nomadic People Optimizer-based Energy-Efficient Routing (NPO-EER) approach, which effectively allows smart wearable patches by minimizing data aggregation time and eliminating routing loops, the network lifetime has been preserved in this research. The obtained findings showed that the NPO method had a great solution. Estimated Aggregation time, Energy consumption, Delay, and throughput have all been shown to be accurate indicators of the system's performance

    Detection of tamper forgery image in security digital mage

    No full text
    Every industry that uses digital photos is concerned about image security. Forensics and public safety have long relied on suspect photos, crime scene photos, biometric photos, and other images. As digital imaging has advanced, the use of digital images iun this field has grown significantly. While digital image processing has helped to develop many new approaches in forensic research, it has also simplified image manipulation. The public availability of various snipping image manipulation software has made digital image validity a problem. It's used as strong evidence in a variety of crimes, as well as documentation for a variety of reasons. The advancement of photo processing and editing software has simplified and made it more accessible to create and modify photographs. The most common types of picture forgery are copy-move forgery and splicing images. To conceal or display an error scenario, a portion of a photograph is duplicated and pasted further in the photograph, and splicing an image means two images in one image. This research looks at different types of digital image forgeries as well as forgery detection software. A review of existing approaches for detecting faked images was conducted

    A secure sharing control framework supporting elastic mobile cloud computingA secure sharing control framework supporting elastic mobile cloud computing

    No full text
    Inelastic mobile cloud computing (EMCC), mobile devices migrate some computing tasks to the cloud for execution according to current needs and seamlessly and transparently use cloud resources to enhance their functions. First, based on the summary of existing EMCC schemes, a generic EMCC framework is abstracted; it is pointed out that the migration of sensitive modules in the EMCC program can bring security risks such as privacy leakage and information flow hijacking to EMCC; then, a generic framework of elastic mobile cloud computing that incorporates risk management is designed, which regards security risks as a cost of EMCC and ensures that the use of EMCC is. Finally, it is pointed out that the difficulty of risk management lies in risk quantification and sensitive module labeling. In this regard, risk quantification algorithms are designed, an automatic annotation tool for sensitive modules of Android programs is implemented, and the accuracy of the automatic annotation is demonstrated through experiments
    corecore