咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Metaheuristics with Vector Qua... 收藏

Metaheuristics with Vector Quantization Enabled Codebook Compression Model for Secure Industrial Embedded Environment

作     者:Adepu Shravan Kumar S.Srinivasan 

作者机构:Department of Biomedical EngineeringSaveetha School of EngineeringSaveetha Institute of Medical and Technical SciencesSaveetha UniversitySaveetha NagarThandalamChennai602105India 

出 版 物:《Intelligent Automation & Soft Computing》 (智能自动化与软计算(英文))

年 卷 期:2023年第36卷第6期

页      面:3607-3620页

核心收录:

学科分类:08[工学] 080203[工学-机械设计及理论] 0802[工学-机械工程] 0811[工学-控制科学与工程] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

主  题:Codebook compression industrial internet of things lbg model metaheuristics vector quantization 

摘      要:At the present time,the Industrial Internet of Things(IIoT)has swiftly evolved and emerged,and picture data that is collected by terminal devices or IoT nodes are tied to the user s private *** use of image sensors as an automa-tion tool for the IIoT is increasingly becoming more *** to the fact that this organisation transfers an enormous number of photographs at any one time,one of the most significant issues that it has is reducing the total quantity of data that is sent and,as a result,the available bandwidth,without compromising the image *** compression in the sensor,on the other hand,expedites the transfer of data while simultaneously reducing bandwidth *** traditional method of protecting sensitive data is rendered less effective in an environment dominated by IoT owing to the involvement of third *** image encryp-tion model provides a safe and adaptable method to protect the confidentiality of picture transformation and storage inside an IIoT *** helps to ensure that image datasets are kept *** Linde–Buzo–Gray(LBG)methodology is an example of a vector quantization algorithm that is extensively used and a rela-tively new form of picture reduction known as vector quantization(VQ).As a result,the purpose of this research is to create an artificial humming bird optimi-zation approach that combines LBG-enabled codebook creation and encryption(AHBO-LBGCCE)for use in an IIoT *** the beginning,the AHBO-LBGCCE method used the LBG model in conjunction with the AHBO algorithm in order to construct the *** Burrows-Wheeler Transform(BWT)model is used in order to accomplish codebook *** addition,the Blowfish algorithm is used in order to carry out the encryption procedure so that security may be attained.A comprehensive experimental investigation is carried out in order to verify the effectiveness of the proposed algorithm in comparison to other *** experimental values ensure that the suggeste

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分