-
181
Implementation of Personal Health Device Communication Protocol Applying ISO/IEEE 11073-20601
Published 2014-05-01“…Moreover, security is enhanced by applying the international symmetric key encryption standard, advanced encryption standard (AES), for secure data transmission from the weight sensor to gateway. …”
Get full text
Article -
182
Federated learning for digital twin applications: a privacy-preserving and low-latency approach
Published 2025-08-01“…To address these security and privacy threats, this paper proposes the FL-FedDT scheme—a privacy-preserving and low-latency FL method that employs an enhanced Paillier homomorphic encryption algorithm to safeguard the privacy of local device parameters without transmitting data to the server. …”
Get full text
Article -
183
Research on Modeling and Dynamic Characteristics of Complex Biological Neural Network Model considering BP Neural Network Method
Published 2021-01-01“…The BP neural network algorithm can be used to solve more complex dynamic behaviors and can optimize the global search. …”
Get full text
Article -
184
Integrated Protocols to Ensure Security Services in Wireless Sensor Networks
Published 2013-07-01“…The proposed protocols integrate public key and symmetric key algorithms to ensure optimal usage of sensors' energy and processing power to provide adequate security in next generation WSN. …”
Get full text
Article -
185
Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0
Published 2024-07-01“…Addressing this, this study introduces the ASCON algorithm for lightweight authenticated encryption with associated data, enhancing confidentiality, integrity, and authenticity within IoT limitations. …”
Get full text
Article -
186
Adaptive Dynamic Programming-Based Intelligent Finite-Time Flexible SMC for Stabilizing Fractional-Order Four-Wing Chaotic Systems
Published 2025-06-01“…The control strategy eliminates the need for explicit system models by exploiting the norm-bounded characteristics of chaotic system states. To optimize the parameters of the model-free FTF-SMC, a deep reinforcement learning framework based on the adaptive dynamic programming (ADP) algorithm is employed. …”
Get full text
Article -
187
Secure healthcare data sharing and attack detection framework using radial basis neural network
Published 2025-05-01“…The proposed authenticate access control mechanism (PA2C) safeguards data integrity as well as the security and dependability of EHR data sharing are improved by the use of smart contracts, encryption, and secure key management. On the other hand, the proposed intelligent voyage optimization algorithm-based Radial basis neural network (IntVO-RBNN) effectively detects the attacks in the network. …”
Get full text
Article -
188
Huffman coding-based data reduction and quadristego logic for secure image steganography
Published 2025-05-01“…To address these challenges, this study proposes a novel steganographic algorithm integrating two key innovations: (1) Enhancement of stego image quality via stego image’s segmentation into four images, reducing concentration-induced distortions, and (2) optimization of data embedding through Huffman coding through a lossless compression minimizing the embedding-induced distortions while maximizing payload capacity. …”
Get full text
Article -
189
FEXGBIDS: Federated XGBoost-Based Intrusion Detection System for In-Vehicle Network
Published 2025-01-01“…We use the BatchCrypt algorithm to batch encrypt first- and second-order gradients to reduce the computational and communication overhead of Paillier homomorphic encryption. …”
Get full text
Article -
190
TCCM: Trajectory Converged Chaff-Based Mix-Zone Strategy for Enhancing Location Privacy in VANET
Published 2025-01-01“…Additionally, the TCCM strategy incorporates a genetic algorithm to optimize mix zone placement and ensure a balance between privacy protection and resource efficiency. …”
Get full text
Article -
191
CONSTRUCTION OF SUBSTITUTION BOX (S-BOX) BASED ON IRREDUCIBLE POLYNOMIALS ON GF(2^8)
Published 2024-03-01“…In the field of modern encryption algorithms, the creation of S-Box is an essential element that plays an important role in maintaining data security in various industries. …”
Get full text
Article -
192
An online tool based on the Internet of Things and intelligent blockchain technology for data privacy and security in rural and agricultural development
Published 2025-07-01“…Central to this model is the proposed Quantum Neural Network + Bayesian Optimization (QNN + BO), a practiced algorithm that, when combined with methods like the Elliptic Curve Cryptography (ECC) and Coyote Optimization Algorithm (COA), guarantees secure data flow, processing, and storage. …”
Get full text
Article -
193
ApproximateSecret Sharing in Field of Real Numbers
Published 2025-07-01“…To address these issues, this paper proposes an innovative algorithm to optimize SSS via type-specific coding for real numbers. …”
Get full text
Article -
194
Analysis and Research on Intelligent Logistics Data under Internet of Things and Blockchain
Published 2024-12-01“…This stability is primarily attributed to the seamless integration of BC technology, which optimizes data packet transmission paths and mitigates waiting time. …”
Get full text
Article -
195
A Novel Approach to Strengthening Cryptography Using RSA, Efficient Domination and Fuzzy Logic
Published 2025-05-01“…Although it has many applications in problems in computation, it is only for cryptography in contexts involving efficient algorithms, combinatorial structures, and optimization for security that it finds uses. …”
Get full text
Article -
196
ECC Based Load Information Protection Scheme for Electric Vehicle Users
Published 2023-01-01“…On this basis, the load decomposition algorithm is designed as a test tool for the encryption scheme to decompose the encrypted power data. …”
Get full text
Article -
197
AgriChainSync: A Scalable and Secure Blockchain-Enabled Framework for IoT-Driven Precision Agriculture
Published 2024-01-01“…The proposed framework shows a dynamic data storage algorithm that optimizes storage decisions based on data characteristics and features. …”
Get full text
Article -
198
Enhancing Efficiency and Security in MTC Environments: A Novel Strategy for Dynamic Grouping and Streamlined Management
Published 2024-04-01“…Our proposed solution integrates advanced cryptographic methods, including an optimized Authenticated Message Authentication Code (AMAC) and lightweight encryption, sophisticated optimization algorithms for dynamic grouping, and an efficient, lightweight group management protocol. …”
Get full text
Article -
199
Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks
Published 2024-06-01“…This research aims to compare the key machine learning approaches, Namely Support Vector Machines (SVM), Random Forest (RF) and Decision Trees (DT), in their ability to classify Intrusion Detection Systems (IDS) via routing networks over distributed computing systems. In addition, Algorithms perform quality control to determine the optimal hyperplane for the given data, Find neighboring data points and preserve the structure of the tree. …”
Get full text
Article -
200
The Impact of AI Software on Financial Transactions
Published 2025-01-01“…To address these challenges, the paper proposes strengthening data protection through advanced encryption and access controls, improving algorithmic transparency with Explainable AI (XAI), and enhancing regulatory frameworks to monitor high-frequency trading. …”
Get full text
Article