Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (36)

Search Parameters:
Keywords = MCC security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
39 pages, 30587 KiB  
Article
Hierarchical Swin Transformer Ensemble with Explainable AI for Robust and Decentralized Breast Cancer Diagnosis
by Md. Redwan Ahmed, Hamdadur Rahman, Zishad Hossain Limon, Md Ismail Hossain Siddiqui, Mahbub Alam Khan, Al Shahriar Uddin Khondakar Pranta, Rezaul Haque, S M Masfequier Rahman Swapno, Young-Im Cho and Mohamed S. Abdallah
Bioengineering 2025, 12(6), 651; https://doi.org/10.3390/bioengineering12060651 - 13 Jun 2025
Cited by 1 | Viewed by 838
Abstract
Early and accurate detection of breast cancer is essential for reducing mortality rates and improving clinical outcomes. However, deep learning (DL) models used in healthcare face significant challenges, including concerns about data privacy, domain-specific overfitting, and limited interpretability. To address these issues, we [...] Read more.
Early and accurate detection of breast cancer is essential for reducing mortality rates and improving clinical outcomes. However, deep learning (DL) models used in healthcare face significant challenges, including concerns about data privacy, domain-specific overfitting, and limited interpretability. To address these issues, we propose BreastSwinFedNetX, a federated learning (FL)-enabled ensemble system that combines four hierarchical variants of the Swin Transformer (Tiny, Small, Base, and Large) with a Random Forest (RF) meta-learner. By utilizing FL, our approach ensures collaborative model training across decentralized and institution-specific datasets while preserving data locality and preventing raw patient data exposure. The model exhibits strong generalization and performs exceptionally well across five benchmark datasets—BreakHis, BUSI, INbreast, CBIS-DDSM, and a Combined dataset—achieving an F1 score of 99.34% on BreakHis, a PR AUC of 98.89% on INbreast, and a Matthews Correlation Coefficient (MCC) of 99.61% on the Combined dataset. To enhance transparency and clinical adoption, we incorporate explainable AI (XAI) through Grad-CAM, which highlights class-discriminative features. Additionally, we deploy the model in a real-time web application that supports uncertainty-aware predictions and clinician interaction and ensures compliance with GDPR and HIPAA through secure federated deployment. Extensive ablation studies and paired statistical analyses further confirm the significance and robustness of each architectural component. By integrating transformer-based architectures, secure collaborative training, and explainable outputs, BreastSwinFedNetX provides a scalable and trustworthy AI solution for real-world breast cancer diagnostics. Full article
(This article belongs to the Special Issue Breast Cancer: From Precision Medicine to Diagnostics)
Show Figures

Figure 1

37 pages, 46669 KiB  
Article
ViX-MangoEFormer: An Enhanced Vision Transformer–EfficientFormer and Stacking Ensemble Approach for Mango Leaf Disease Recognition with Explainable Artificial Intelligence
by Abdullah Al Noman, Amira Hossain, Anamul Sakib, Jesika Debnath, Hasib Fardin, Abdullah Al Sakib, Rezaul Haque, Md. Redwan Ahmed, Ahmed Wasif Reza and M. Ali Akber Dewan
Computers 2025, 14(5), 171; https://doi.org/10.3390/computers14050171 - 2 May 2025
Viewed by 1743
Abstract
Mango productivity suffers greatly from leaf diseases, leading to economic and food security issues. Current visual inspection methods are slow and subjective. Previous Deep-Learning (DL) solutions have shown promise but suffer from imbalanced datasets, modest generalization, and limited interpretability. To address these challenges, [...] Read more.
Mango productivity suffers greatly from leaf diseases, leading to economic and food security issues. Current visual inspection methods are slow and subjective. Previous Deep-Learning (DL) solutions have shown promise but suffer from imbalanced datasets, modest generalization, and limited interpretability. To address these challenges, this study introduces the ViX-MangoEFormer, which combines convolutional kernels and self-attention to effectively diagnose multiple mango leaf conditions in both balanced and imbalanced image sets. To benchmark against ViX-MangoEFormer, we developed a stacking ensemble model (MangoNet-Stack) that utilizes five transfer learning networks as base learners. All models were trained with Grad-CAM produced pixel-level explanations. In a combined dataset of 25,530 images, ViX-MangoEFormer achieved an F1 score of 99.78% and a Matthews Correlation Coefficient (MCC) of 99.34%. This performance consistently outperformed individual pre-trained models and MangoNet-Stack. Additionally, data augmentation has improved the performance of every architecture compared to its non-augmented version. Cross-domain tests on morphologically similar crop leaves confirmed strong generalization. Our findings validate the effectiveness of transformer attention and XAI in mango leaf disease detection. ViX-MangoEFormer is deployed as a web application that delivers real-time predictions, probability scores, and visual rationales. The system enables growers to respond quickly and enhances large-scale smart crop health monitoring. Full article
(This article belongs to the Special Issue Deep Learning and Explainable Artificial Intelligence)
Show Figures

Figure 1

27 pages, 5373 KiB  
Article
Multi-Source Satellite Imagery and Machine Learning for Detecting Geological Formations in Cameroon’s Western Highlands
by Kacoutchy Jean Ayikpa, Valère-Carin Jofack Sokeng, Abou Bakary Ballo, Pierre Gouton and Koffi Fernand Kouamé
Signals 2025, 6(1), 12; https://doi.org/10.3390/signals6010012 - 11 Mar 2025
Viewed by 1802
Abstract
Accurate identification of geological formations is essential for understanding tectonic structures, planning mining activities, and sustainably managing natural resources. It goes beyond the scientific framework to play a key role in economic development, environmental preservation, and population security. This article proposes a study [...] Read more.
Accurate identification of geological formations is essential for understanding tectonic structures, planning mining activities, and sustainably managing natural resources. It goes beyond the scientific framework to play a key role in economic development, environmental preservation, and population security. This article proposes a study using machine learning to analyze different parameters from various sources of satellite imagery: multispectral optics (Landsat-8), radar (ALOS PALSAR), and soil and morphometric parameters (soil, altitude, slope, curvature, and shady). The data were preprocessed to remove atmospheric biases and harmonize spatial resolutions. Techniques such as principal component analysis, band ratios, and image fusion have made it possible to enrich imagery by highlighting spectral and textural characteristics. Finally, classifiers such as Random Forest, Gradient Boosting, and XGBoost (version 1.6.2) were used to evaluate the impact of each parameter on the classification. The results show that geographic parameters combined with PCA provide the best overall performance with Random Forest, achieving an accuracy of 55.29% and an MCC of 45.12% while ensuring a rapid training speed (3.6 s). The geographic parameters associated with the OLI spectrometric data show a good balance, with XGBoost achieving a slightly higher MCC (40.3%) with a moderate training time (7.9 s). On the other hand, the OLI spectrometric parameters coupled with PCA display significantly lower performance, with an accuracy of 45.05% and an MCC of 31.81% for Random Forest. These observations highlight the potential of geographic and geological parameters associated with suitable models to improve classification. The multi-source approach thus proves optimal for more robust and precise results. Full article
Show Figures

Figure 1

24 pages, 1666 KiB  
Review
An Overview of Distributed Firewalls and Controllers Intended for Mobile Cloud Computing
by Cyril Godwin Suetor, Daniele Scrimieri, Amna Qureshi and Irfan-Ullah Awan
Appl. Sci. 2025, 15(4), 1931; https://doi.org/10.3390/app15041931 - 13 Feb 2025
Viewed by 1139
Abstract
Mobile cloud computing (MCC) is a representation of the interaction between cloud computing and mobile devices, reshaping the utilisation of technology for consumers and businesses. This level of mobility and decentralisation of devices in MCC necessitates a highly secured framework to facilitate it. [...] Read more.
Mobile cloud computing (MCC) is a representation of the interaction between cloud computing and mobile devices, reshaping the utilisation of technology for consumers and businesses. This level of mobility and decentralisation of devices in MCC necessitates a highly secured framework to facilitate it. This literature review on distributed firewalls and controllers for mobile cloud computing reveals the critical need for a security framework tailored to the dynamic and decentralised nature of MCC. This study further emphasises the importance of integrating distributed firewalls with central controllers to address the unique security challenges in MCC, such as nomadic device behaviour and resource allocation optimisation. Additionally, it highlights the significance of Cloud Access Security Brokers (CASBs) in improving data security and ensuring compliance within mobile cloud applications. This review also addresses specific research questions related to security concerns, scalable framework development, and the effectiveness of distributed firewall and controller systems in MCC. It explores the complexities involved in merging Software-Defined Networking (SDN), Network Function Virtualisation (NFV), and CASB into a cohesive system, focusing on the need to resolve interoperability issues and maintain low latency and high throughput while balancing performance across distributed firewalls and controllers. The review also points to the necessity of privacy-preserving methods within CASB to uphold privacy standards in MCC. Furthermore, it identifies the integration of NFV and SDN as crucial for enhancing security and performance in MCC environments, and stresses the importance of future research directions, such as the incorporation of machine learning and edge computing, to further improve the security and efficiency of MCC systems. To the best of our knowledge, this review is the first to comprehensively examine the integration of these advanced technologies within the context of MCC. Full article
Show Figures

Figure 1

24 pages, 992 KiB  
Article
Obfuscated Malware Detection and Classification in Network Traffic Leveraging Hybrid Large Language Models and Synthetic Data
by Mehwish Naseer, Farhan Ullah, Samia Ijaz, Hamad Naeem, Amjad Alsirhani, Ghadah Naif Alwakid and Abdullah Alomari
Sensors 2025, 25(1), 202; https://doi.org/10.3390/s25010202 - 1 Jan 2025
Cited by 1 | Viewed by 2415
Abstract
Android malware detection remains a critical issue for mobile security. Cybercriminals target Android since it is the most popular smartphone operating system (OS). Malware detection, analysis, and classification have become diverse research areas. This paper presents a smart sensing model based on large [...] Read more.
Android malware detection remains a critical issue for mobile security. Cybercriminals target Android since it is the most popular smartphone operating system (OS). Malware detection, analysis, and classification have become diverse research areas. This paper presents a smart sensing model based on large language models (LLMs) for developing and classifying network traffic-based Android malware. The network traffic that constantly connects Android apps may contain harmful components that may damage these apps. However, one of the main challenges in developing smart sensing systems for malware analysis is the scarcity of traffic data due to privacy concerns. To overcome this, a two-step smart sensing model Syn-detect is proposed. The first step involves generating synthetic TCP malware traffic data with malicious content using GPT-2. These data are then preprocessed and used in the second step, which focuses on malware classification. This phase leverages a fine-tuned LLM, Bidirectional Encoder Representations from Transformers (BERT), with classification layers. BERT is responsible for tokenization, generating word embeddings, and classifying malware. The Syn-detect model was tested on two Android malware datasets: CIC-AndMal2017 and CIC-AAGM2017. The model achieved an accuracy of 99.8% on CIC-AndMal2017 and 99.3% on CIC-AAGM2017. The Matthew’s Correlation Coefficient (MCC) values for the predictions were 99% for CIC-AndMal2017 and 98% for CIC-AAGM2017. These results demonstrate the strong performance of the Syn-detect smart sensing model. Compared to the latest research in Android malware classification, the model outperformed other approaches, delivering promising results. Full article
(This article belongs to the Special Issue AI Technology for Cybersecurity and IoT Applications)
Show Figures

Figure 1

15 pages, 3595 KiB  
Article
Effects of a Multifunctional Cover Crop (LivinGro®) on Soil Quality Indicators in Zaragoza, Spain
by Javier González-Pérez, José Antonio Sillero-Medina, Paloma Hueso-González, José Damián Ruiz-Sinoga, Francisco Javier Peris-Felipo and Ana Lia Gayán-Quijano
Land 2025, 14(1), 27; https://doi.org/10.3390/land14010027 - 26 Dec 2024
Cited by 1 | Viewed by 1277
Abstract
Soil degradation is a significant threat to agricultural systems and contemporary societies worldwide, especially in the context of climate change. Proper management of agricultural systems is a priority for maintaining food security and achieving sustainable development. It is therefore important to assess the [...] Read more.
Soil degradation is a significant threat to agricultural systems and contemporary societies worldwide, especially in the context of climate change. Proper management of agricultural systems is a priority for maintaining food security and achieving sustainable development. It is therefore important to assess the efficacy of different interventions that are designed to improve the quality of agricultural soils. Measurements of physical, chemical, and biological indicators of soil quality can be used to examine the efficacy of strategies or methods that were designed to prevent soil degradation. We measured seven physicochemical indicators of soil quality at a representative experimental plot of nectarines in the province of Zaragoza (Spain) over three years (2020–2023) and compared the effect of a multifunctional cover crop (LivinGro® MCC, Basel, Switzerland) with conventional treatment (control) on soil quality. Soil samples were collected every two months from the treelines and inter-rows (paths for farming vehicles). In general, the MCC zones in the treelines and inter-rows had better soil health, especially in key indicators such as basal soil respiration, organic matter, nitrogen, and porosity. Climatic variability, especially seasonal differences in rainfall, also affected multiple soil indicators. During many sample periods, the MCC zones of the treelines and inter-rows had significantly increased soil organic matter, basal respiration, total nitrogen, nitrate, total porosity, and available water content, but the MCC and control zones had no significant differences in bulk density. The differences between the MCC zones and control zones, especially in basal soil respiration, were greater during the wet seasons. Our results indicate that the LivinGro® MCC prevented degradation of agricultural soils in a region with a continental Mediterranean climate. Full article
(This article belongs to the Section Land, Soil and Water)
Show Figures

Figure 1

23 pages, 9642 KiB  
Article
A Multi-Scale Feature Fusion Deep Learning Network for the Extraction of Cropland Based on Landsat Data
by Huiling Chen, Guojin He, Xueli Peng, Guizhou Wang and Ranyu Yin
Remote Sens. 2024, 16(21), 4071; https://doi.org/10.3390/rs16214071 - 31 Oct 2024
Viewed by 1350
Abstract
In the face of global population growth and climate change, the protection and rational utilization of cropland are crucial for food security and ecological balance. However, the complex topography and unique ecological environment of the Qinghai-Tibet Plateau results in a lack of high-precision [...] Read more.
In the face of global population growth and climate change, the protection and rational utilization of cropland are crucial for food security and ecological balance. However, the complex topography and unique ecological environment of the Qinghai-Tibet Plateau results in a lack of high-precision cropland monitoring data. Therefore, this paper constructs a high-quality cropland dataset for the YarlungZangbo-Lhasa-Nyangqv River region of the Qinghai-Tibet Plateau and proposes an MSC-ResUNet model for cropland extraction based on Landsat data. The dataset is annotated at the pixel level, comprising 61 Landsat 8 images in 2023. The MSC-ResUNet model innovatively combines multiscale features through residual connections and multiscale skip connections, effectively capturing features ranging from low-level spatial details to high-level semantic information and further enhances performance by incorporating depthwise separable convolutions as part of the feature fusion process. Experimental results indicate that MSC-ResUNet achieves superior accuracy compared to other models, with F1 scores of 0.826 and 0.856, and MCC values of 0.816 and 0.847, in regional robustness and temporal transferability tests, respectively. Performance analysis across different months and band combinations demonstrates that the model maintains high recognition accuracy during both growing and non-growing seasons, despite the study area’s complex landforms and diverse crops. Full article
(This article belongs to the Section Remote Sensing in Agriculture and Vegetation)
Show Figures

Figure 1

17 pages, 569 KiB  
Article
A Risk Assessment Framework for Mobile Apps in Mobile Cloud Computing Environments
by Noah Oghenefego Ogwara, Krassie Petrova, Mee Loong Yang and Stephen G. MacDonell
Future Internet 2024, 16(8), 271; https://doi.org/10.3390/fi16080271 - 29 Jul 2024
Cited by 1 | Viewed by 2028
Abstract
Mobile devices (MDs) are used by mobile cloud computing (MCC) customers and by other users because of their portability, robust connectivity, and ability to house and operate third-party applications (apps). However, the apps installed on an MD may pose data security risks to [...] Read more.
Mobile devices (MDs) are used by mobile cloud computing (MCC) customers and by other users because of their portability, robust connectivity, and ability to house and operate third-party applications (apps). However, the apps installed on an MD may pose data security risks to the MD owner and to other MCC users, especially when the requested permissions include access to sensitive data (e.g., user’s location and contacts). Calculating the risk score of an app or quantifying its potential harmfulness based on user input or on data gathered while the app is actually running may not provide reliable and sufficiently accurate results to avoid harmful consequences. This study develops and evaluates a risk assessment framework for Android-based MDs that does not depend on user input or on actual app behavior. Rather, an app risk evaluator assigns a risk category to each resident app based on the app’s classification (benign or malicious) and the app’s risk score. The app classifier (a trained machine learning model) evaluates the permissions and intents requested by the app. The app risk score is calculated by applying a probabilistic function based on the app’s use of a set of selected dangerous permissions. The results from testing of the framework on an MD with real-life resident apps indicated that the proposed security solution was effective and feasible. Full article
Show Figures

Figure 1

21 pages, 4312 KiB  
Article
Secure Aviation Control through a Streamlined ADS-B Perception System
by Qasem Abu Al-Haija and Ahmed Al-Tamimi
Appl. Syst. Innov. 2024, 7(2), 27; https://doi.org/10.3390/asi7020027 - 26 Mar 2024
Cited by 4 | Viewed by 3097
Abstract
Automatic dependent surveillance-broadcast (ADS-B) is the future of aviation surveillance and traffic control, allowing different aircraft types to exchange information periodically. Despite this protocol’s advantages, it is vulnerable to flooding, denial of service, and injection attacks. In this paper, we decided to join [...] Read more.
Automatic dependent surveillance-broadcast (ADS-B) is the future of aviation surveillance and traffic control, allowing different aircraft types to exchange information periodically. Despite this protocol’s advantages, it is vulnerable to flooding, denial of service, and injection attacks. In this paper, we decided to join the initiative of securing this protocol and propose an efficient detection method to help detect any exploitation attempts by injecting these messages with the wrong information. This paper focused mainly on three attacks: path modification, ghost aircraft injection, and velocity drift attacks. This paper aims to provide a revolutionary methodology that, even in the face of new attacks (zero-day attacks), can successfully detect injected messages. The main advantage was utilizing a recent dataset to create more reliable and adaptive training and testing materials, which were then preprocessed before using different machine learning algorithms to feasibly create the most accurate and time-efficient model. The best outcomes of the binary classification were obtained with 99.14% accuracy, an F1-score of 99.14%, and a Matthews correlation coefficient (MCC) of 0.982. At the same time, the best outcomes of the multiclass classification were obtained with 99.41% accuracy, an F1-score of 99.37%, and a Matthews correlation coefficient (MCC) of 0.988. Eventually, our best outcomes outdo existing models, but we believe the model would benefit from more testing of other types of attacks and a bigger dataset. Full article
(This article belongs to the Special Issue Industrial Cybersecurity)
Show Figures

Figure 1

19 pages, 4756 KiB  
Article
Logistic Regression Ensemble Classifier for Intrusion Detection System in Internet of Things
by Silpa Chalichalamala, Niranjana Govindan and Ramani Kasarapu
Sensors 2023, 23(23), 9583; https://doi.org/10.3390/s23239583 - 3 Dec 2023
Cited by 16 | Viewed by 2920
Abstract
The Internet of Things (IoT) is a powerful technology that connect its users worldwide with everyday objects without any human interference. On the contrary, the utilization of IoT infrastructure in different fields such as smart homes, healthcare and transportation also raises potential risks [...] Read more.
The Internet of Things (IoT) is a powerful technology that connect its users worldwide with everyday objects without any human interference. On the contrary, the utilization of IoT infrastructure in different fields such as smart homes, healthcare and transportation also raises potential risks of attacks and anomalies caused through node security breaches. Therefore, an Intrusion Detection System (IDS) must be developed to largely scale up the security of IoT technologies. This paper proposes a Logistic Regression based Ensemble Classifier (LREC) for effective IDS implementation. The LREC combines AdaBoost and Random Forest (RF) to develop an effective classifier using the iterative ensemble approach. The issue of data imbalance is avoided by using the adaptive synthetic sampling (ADASYN) approach. Further, inappropriate features are eliminated using recursive feature elimination (RFE). There are two different datasets, namely BoT-IoT and TON-IoT, for analyzing the proposed RFE-LREC method. The RFE-LREC is analyzed on the basis of accuracy, recall, precision, F1-score, false alarm rate (FAR), receiver operating characteristic (ROC) curve, true negative rate (TNR) and Matthews correlation coefficient (MCC). The existing researches, namely NetFlow-based feature set, TL-IDS and LSTM, are used to compare with the RFE-LREC. The classification accuracy of RFE-LREC for the BoT-IoT dataset is 99.99%, which is higher when compared to those of TL-IDS and LSTM. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

26 pages, 18358 KiB  
Article
Physical Layer Authenticated Image Encryption for IoT Network Based on Biometric Chaotic Signature for MPFrFT OFDM System
by Esam A. A. Hagras, Saad Aldosary, Haitham Khaled and Tarek M. Hassan
Sensors 2023, 23(18), 7843; https://doi.org/10.3390/s23187843 - 12 Sep 2023
Cited by 8 | Viewed by 2232
Abstract
In this paper, a new physical layer authenticated encryption (PLAE) scheme based on the multi-parameter fractional Fourier transform–Orthogonal frequency division multiplexing (MP-FrFT-OFDM) is suggested for secure image transmission over the IoT network. In addition, a new robust multi-cascaded chaotic modular fractional sine map [...] Read more.
In this paper, a new physical layer authenticated encryption (PLAE) scheme based on the multi-parameter fractional Fourier transform–Orthogonal frequency division multiplexing (MP-FrFT-OFDM) is suggested for secure image transmission over the IoT network. In addition, a new robust multi-cascaded chaotic modular fractional sine map (MCC-MF sine map) is designed and analyzed. Also, a new dynamic chaotic biometric signature (DCBS) generator based on combining the biometric signature and the proposed MCC-MF sine map random chaotic sequence output is also designed. The final output of the proposed DCBS generator is used as a dynamic secret key for the MPFrFT OFDM system in which the encryption process is applied in the frequency domain. The proposed DCBS secret key generator generates a very large key space of 22200. The proposed DCBS secret keys generator can achieve the confidentiality and authentication properties. Statistical analysis, differential analysis and a key sensitivity test are performed to estimate the security strengths of the proposed DCBS-MP-FrFT-OFDM cryptosystem over the IoT network. The experimental results show that the proposed DCBS-MP-FrFT-OFDM cryptosystem is robust against common signal processing attacks and provides a high security level for image encryption application. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

19 pages, 4073 KiB  
Article
Towards an Intelligent Intrusion Detection System to Detect Malicious Activities in Cloud Computing
by Hanaa Attou, Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, Mourade Azrour, Abdulatif Alabdultif and Naif Almusallam
Appl. Sci. 2023, 13(17), 9588; https://doi.org/10.3390/app13179588 - 24 Aug 2023
Cited by 67 | Viewed by 4181
Abstract
Several sectors have embraced Cloud Computing (CC) due to its inherent characteristics, such as scalability and flexibility. However, despite these advantages, security concerns remain a significant challenge for cloud providers. CC introduces new vulnerabilities, including unauthorized access, data breaches, and insider threats. The [...] Read more.
Several sectors have embraced Cloud Computing (CC) due to its inherent characteristics, such as scalability and flexibility. However, despite these advantages, security concerns remain a significant challenge for cloud providers. CC introduces new vulnerabilities, including unauthorized access, data breaches, and insider threats. The shared infrastructure of cloud systems makes them attractive targets for attackers. The integration of robust security mechanisms becomes crucial to address these security challenges. One such mechanism is an Intrusion Detection System (IDS), which is fundamental in safeguarding networks and cloud environments. An IDS monitors network traffic and system activities. In recent years, researchers have explored the use of Machine Learning (ML) and Deep Learning (DL) approaches to enhance the performance of IDS. ML and DL algorithms have demonstrated their ability to analyze large volumes of data and make accurate predictions. By leveraging these techniques, IDSs can adapt to evolving threats, detect previous attacks, and reduce false positives. This article proposes a novel IDS model based on DL algorithms like the Radial Basis Function Neural Network (RBFNN) and Random Forest (RF). The RF classifier is used for feature selection, and the RBFNN algorithm is used to detect intrusion in CC environments. Moreover, the datasets Bot-IoT and NSL-KDD have been utilized to validate our suggested approach. To evaluate the impact of our approach on an imbalanced dataset, we relied on Matthew’s Correlation Coefficient (MCC) as a normalized measure. Our method achieves accuracy (ACC) higher than 92% using the minimum features, and we managed to increase the MCC from 28% to 93%. The contributions of this study are twofold. Firstly, it presents a novel IDS model that leverages DL algorithms, demonstrating an improved ACC higher than 92% using minimal features and a substantial increase in MCC from 28% to 93%. Secondly, it addresses the security challenges specific to CC environments, offering a promising solution to enhance security in cloud systems. By integrating the proposed IDS model into cloud environments, cloud providers can benefit from enhanced security measures, effectively mitigating unauthorized access and potential data breaches. The utilization of DL algorithms, RBFNN, and RF has shown remarkable potential in detecting intrusions and strengthening the overall security posture of CC. Full article
(This article belongs to the Special Issue Security in Cloud Computing, Big Data and Internet of Things)
Show Figures

Figure 1

19 pages, 9454 KiB  
Article
R-Unet: A Deep Learning Model for Rice Extraction in Rio Grande do Sul, Brazil
by Tingyan Fu, Shufang Tian and Jia Ge
Remote Sens. 2023, 15(16), 4021; https://doi.org/10.3390/rs15164021 - 14 Aug 2023
Cited by 3 | Viewed by 2772
Abstract
Rice is one of the world’s three major food crops, second only to sugarcane and corn in output. Timely and accurate rice extraction plays a vital role in ensuring food security. In this study, R-Unet for rice extraction was proposed based on Sentinel-2 [...] Read more.
Rice is one of the world’s three major food crops, second only to sugarcane and corn in output. Timely and accurate rice extraction plays a vital role in ensuring food security. In this study, R-Unet for rice extraction was proposed based on Sentinel-2 and time-series Sentinel-1, including an attention-residual module and a multi-scale feature fusion (MFF) module. The attention-residual module deepened the network depth of the encoder and prevented information loss. The MFF module fused the high-level and low-level rice features at channel and spatial scales. After training, validation, and testing on seven datasets, R-Unet performed best on the test samples of Dataset 07, which contained optical and synthetic aperture radar (SAR) features. Precision, intersection, and union (IOU), F1-score, and Matthews correlation coefficient (MCC) were 0.948, 0.853, 0.921, and 0.888, respectively, outperforming the baseline models. Finally, the comparative analysis between R-Unet and classic models was completed in Dataset 07. The results showed that R-Unet had the best rice extraction effect, and the highest scores of precision, IOU, MCC, and F1-score were increased by 5.2%, 14.6%, 11.8%, and 9.3%, respectively. Therefore, the R-Unet proposed in this study can combine open-source sentinel images to extract rice timely and accurately, providing important information for governments to implement decisions on agricultural management. Full article
(This article belongs to the Special Issue State-of-the-Art in Land Cover Classification and Mapping)
Show Figures

Figure 1

28 pages, 3203 KiB  
Review
IoT-Based Big Data Secure Transmission and Management over Cloud System: A Healthcare Digital Twin Scenario
by Christos L. Stergiou, Maria P. Koidou and Konstantinos E. Psannis
Appl. Sci. 2023, 13(16), 9165; https://doi.org/10.3390/app13169165 - 11 Aug 2023
Cited by 16 | Viewed by 3177
Abstract
The Internet of Things (IoT) was introduced as a recently developed technology in the telecommunications field. It is a network made up of real-world objects, things, and gadgets that are enabled by sensors and software that can communicate data with one another. Systems [...] Read more.
The Internet of Things (IoT) was introduced as a recently developed technology in the telecommunications field. It is a network made up of real-world objects, things, and gadgets that are enabled by sensors and software that can communicate data with one another. Systems for monitoring gather, exchange, and process video and image data captured by sensors and cameras across a network. Furthermore, the novel concept of Digital Twin offers new opportunities so that new proposed systems can work virtually, but without differing in operation from a “real” system. This paper is a meticulous survey of the IoT and monitoring systems to illustrate how their combination will improve certain types of the Monitoring systems of Healthcare–IoT in the Cloud. To achieve this goal, we discuss the characteristics of the IoT that improve the use of the types of monitoring systems over a Multimedia Transmission System in the Cloud. The paper also discusses some technical challenges of Multimedia in IoT, based on Healthcare data. Finally, it shows how the Mobile Cloud Computing (MCC) technology, settled as base technology, enhances the functionality of the IoT and has an impact on various types of monitoring technology, and also it proposes an algorithm approach to transmitting and processing video/image data through a Cloud-based Monitoring system. To gather pertinent data about the validity of our proposal in a more safe and useful way, we have implemented our proposal in a Digital Twin scenario of a Smart Healthcare system. The operation of the suggested scenario as a Digital Twin scenario offers a more sustainable and energy-efficient system and experimental findings ultimately demonstrate that the proposed system is more reliable and secure. Experimental results show the impact of our proposed model depicts the efficiency of the usage of a Cloud Management System operated over a Digital Twin scenario, using real-time large-scale data produced from the connected IoT system. Through these scenarios, we can observe that our proposal remains the best choice regardless of the time difference or energy load. Full article
(This article belongs to the Special Issue Application of Data Analytics in Smart Healthcare)
Show Figures

Figure 1

17 pages, 1384 KiB  
Article
One Year of Outpatient Dialectical Behavioral Therapy and Its Impact on Neuronal Correlates of Attachment Representation in Patients with Borderline Personality Disorder Using a Personalized fMRI Task
by Ariane Flechsig, Dorothee Bernheim, Anna Buchheim, Martin Domin, Renate Mentel and Martin Lotze
Brain Sci. 2023, 13(7), 1001; https://doi.org/10.3390/brainsci13071001 - 28 Jun 2023
Cited by 5 | Viewed by 4143
Abstract
(1) Background: BPD is characterized by affect dysregulation, interpersonal problems, and disturbances in attachment, but neuroimaging studies investigating attachment representations in BPD are rare. No study has examined longitudinal neural changes associated with interventions targeting these impairments. (2) Methods: We aimed to address [...] Read more.
(1) Background: BPD is characterized by affect dysregulation, interpersonal problems, and disturbances in attachment, but neuroimaging studies investigating attachment representations in BPD are rare. No study has examined longitudinal neural changes associated with interventions targeting these impairments. (2) Methods: We aimed to address this gap by performing a longitudinal neuroimaging study on n = 26 patients with BPD treated with Dialectic Behavioral Therapy (DBT) and n = 26 matched healthy controls (HCs; post intervention point: n = 18 BPD and n = 23 HCs). For functional imaging, we applied an attachment paradigm presenting attachment related scenes represented in drawings paired with related neutral or personalized sentences from one’s own attachment narratives. In a prior cross-sectional investigation, we identified increased fMRI-activation in the human attachment network, in areas related to fear response and the conflict monitoring network in BPD patients. These were especially evident for scenes from the context of loneliness (monadic pictures paired with individual narrative sentences). Here, we tested whether these correlates of attachment representation show a near-to-normal development over one year of DBT intervention. In addition, we were interested in possible associations between fMRI-activation in these regions-of-interest (ROI) and clinical scores. (3) Results: Patients improved clinically, showing decreased symptoms of borderline personality organization (BPI) and increased self-directedness (Temperament and Character Inventory, TCI) over treatment. fMRI-activation was increased in the anterior medial cingulate cortex (aMCC) and left amygdala in BPD patients at baseline which was absent after intervention. When investigating associations between scores (BPI, TCI) and functional activation, we found significant effects in the bilateral amygdala. In contrast, aMCC activation at baseline was negatively associated with treatment outcome, indicating less effective treatment effects for those with higher aMCC activation at baseline. (4) Conclusions: Monadic attachment scenes with personalized sentences presented in an fMRI setup are capable of identifying increased activation magnitude in BPD. After successful DBT treatment, these increased activations tend to normalize which could be interpreted as signs of a better capability to regulate intensive emotions in the context of “social pain” towards a more organized/secure attachment representation. Amygdala activation, however, indicates high correlations with pre-treatment scores; activation in the aMCC is predictive for treatment gain. Functional activation of the amygdala and the aMCC as a response to attachment scenes representing loneness at baseline might be relevant influencing factors for DBT-intervention outcomes. Full article
(This article belongs to the Section Cognitive, Social and Affective Neuroscience)
Show Figures

Graphical abstract

Back to TopTop